Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 29 May 2003 09:40:02 -0500
From:      Kirk Strauser <kirk@strauser.com>
To:        freebsd-questions@freebsd.org
Subject:   Re: Spammers forged my address - help unbury me from bounces?
Message-ID:  <87r86hx1dp.fsf@pooh.honeypot.net>
In-Reply-To: <5.2.0.9.2.20030529085433.017db528@mail.servplex.com> (Peter Elsner's message of "Thu, 29 May 2003 08:57:10 -0500")
References:  <5.2.0.9.2.20030529085433.017db528@mail.servplex.com>

next in thread | previous in thread | raw e-mail | index | archive | help
--=-=-=
Content-Transfer-Encoding: quoted-printable

At 2003-05-29T13:57:10Z, Peter Elsner <peter@servplex.com> writes:

> This sounds like a dictionary attack.  They simply put your domain in and
> run through hundreds of names and prepend it to your domain.  One or more
> is bound to go through...

I think you misread it a bit.  They were sending out hundreds of thousands
of emails to *other* mailservers with forged headers like:

  From: Michelle@honeypot.net

The problem wasn't that they were sending all of the messages to *me*; I
would've shut that down in a heartbeat.  The real issue was that the all of
the addresses they tried to send to that weren't reachable bounced, and
since my domain was in the From: line, I was being deluged with tens of
thousands of bounce messages from thousands of MXes around the world.

Now I have thousands of lines in my maillog like:

    May 29 09:38:04 kanga sm-mta[13551]: h4TEc2DY013551: ruleset=3Dcheck_rc=
pt, arg1=3D<Michelle@honeypot.net>, relay=3Dns2.computerland.pl [62.89.69.3=
], reject=3D550 5.0.0 <Michelle@honeypot.net>... This account was spoofed b=
y some jackass spammer.It doesn't exist.
    May 29 09:38:04 kanga sm-mta[13551]: h4TEc2DY013551: from=3D<>, size=3D=
3804, class=3D0, nrcpts=3D0, proto=3DESMTP, daemon=3DMTA, relay=3Dns2.compu=
terland.pl [62.89.69.3]
    May 29 09:38:05 kanga sm-mta[13551]: h4TEc2DZ013551: ruleset=3Dcheck_rc=
pt, arg1=3D<Michelle@honeypot.net>, relay=3Dns2.computerland.pl [62.89.69.3=
], reject=3D550 5.0.0 <Michelle@honeypot.net>... This account was spoofed b=
y some jackass spammer.It doesn't exist.
    May 29 09:38:05 kanga sm-mta[13551]: h4TEc2DZ013551: from=3D<>, size=3D=
3804, class=3D0, nrcpts=3D0, proto=3DESMTP, daemon=3DMTA, relay=3Dns2.compu=
terland.pl [62.89.69.3]
    May 29 09:38:14 kanga sm-mta[13559]: h4TEcDDY013559: ruleset=3Dcheck_rc=
pt, arg1=3D<Erin@honeypot.net>, relay=3Ddemrel02.henkel.de [193.96.101.29],=
 reject=3D550 5.0.0 <Erin@honeypot.net>... This account was spoofed by some=
 jackass spammer.It doesn't exist.
    May 29 09:38:14 kanga sm-mta[13559]: h4TEcDDY013559: from=3D<>, size=3D=
4096, class=3D0, nrcpts=3D0, proto=3DESMTP, daemon=3DMTA, relay=3Ddemrel02.=
henkel.de [193.96.101.29]

but at least I'm not spending my disk or bandwidth to process those bounce
messages - I only have a waste a single TCP connection.
=2D-=20
Kirk Strauser

--=-=-=
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQA+1hvC5sRg+Y0CpvERAsbjAKCg5QoO8xJ0te3bjbZHd6xV4mGeRQCfdQgh
wvOfe4W8ZpqosOAHDOdeulI=
=//aB
-----END PGP SIGNATURE-----
--=-=-=--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?87r86hx1dp.fsf>