-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Rik van Riel writes:
On Sat, 14 Aug 2004, Rob McEwen wrote:
Finally, Rik, even if you have to skills to do all this, Joe Wein may be able to do it faster and with less meticulous hand testing due to the extensive tools and knowledge he has developed. It if obvious from his web site that he had successfully dealt with all of these harder issues before.
One question though, how many GB/day of spamtrap mail is Joe Wein able to handle ? ;)
I may only be getting one GB/day now, but in the long run the only scalable solution will be to have the software that analyses the spam available to others.
Eg. it would be interesting to run it on the CBL spamtraps, which receive over an order of magnitude more spam than my spamtraps here ...
I'd be more than happy to send my spamtrap mail to Joe Wein though, either by nntpsend or by having him pull it from my nntp server here. The only condition would be that the mail in question isn't made available to others, since that would expose the spamtrap addresses, breaking a promise I made to the guy who pointed one of the spamtrap domains at me...
interesting...
It would be nice to define an efficient spamtrap-delivery system -- possibly not even SMTP or NNTP, just a protocol where a client (ie the one doing the pull-down) connects to a port, authenticates, and gets a continual mbox-formatted stream of messages until it chooses to disconnect.
(After all, in the spamtrap case, you just want the mails ASAP, not necessarily *all* the mails, just the freshest ones. also, "from"/"to" is immaterial because they're all going to the same destination -- the spamtrap.)
Maybe flooding over NNTP, treating a spamtrap as a USENET feed, is the way to do it?
- --j.