You are not logged in. Login Now
 0-24   19-43   44-68   69-93   94-118   119-143   144-149    
 
Author Message
25 new of 149 responses total.
bhoward
response 44 of 149: Mark Unseen   Jan 9 07:09 UTC 2006

We could declare a emergency moratorium on mail privileges for new
users but allow existing users to keep their mail privileges until
outbound mail limits can be implemented.  Any spammers with existing
accounts would either lie low or quickly be identified and locked.

This might allow us a respite to get off the blacklists and focus
on fixing mail.
keesan
response 45 of 149: Mark Unseen   Jan 9 14:23 UTC 2006

Is there a new spammer this week?  Comcast at least lets you know why they
bounced your mail (RBL).  Would it be fair to allow unlimited outbound mail
to members but only maybe 100K per day for others?  Or would spammers find
some way to sign up for 1000 new addresses?
ric
response 46 of 149: Mark Unseen   Jan 9 17:21 UTC 2006

You'd be surprised at how many spam messages you could fit into 100k.
ric
response 47 of 149: Mark Unseen   Jan 9 17:26 UTC 2006

Oh, one thing you'll want to remember is that people could write a spam script
in perl, and execute it from the web, so the email would be generated by the
"nobody" "apache" or "httpd" user - depending on how apache is configured
here.


Ah, I see it's "www"
aruba
response 48 of 149: Mark Unseen   Jan 10 02:41 UTC 2006

How could you execute a spam script from the web?
cross
response 49 of 149: Mark Unseen   Jan 10 04:42 UTC 2006

Via a CGI script.  Fortunately, I think grex is configured NOT to allow
normal users to execute CGI scripts out of their personal web directories.
albaugh
response 50 of 149: Mark Unseen   Jan 10 17:13 UTC 2006

Is it not also possible, perhaps probable, that SPAM is being sent with a
spoofed from address of @cyberspace.org, and that is accounting for the
blacklisting?  Or is the blacklisting smart enough to know where the mail
actually originated from?
krj
response 51 of 149: Mark Unseen   Jan 10 17:36 UTC 2006

Nobody intelligent acts on the basis of a From: line in spam;
such lines are all presumed to be forged.  Mail recipient 
programs know the IP address they are receiving the mail from.
 
krj
response 52 of 149: Mark Unseen   Jan 10 17:40 UTC 2006

If bhoward's proposal in resp:44 can be quickly implemented (with
user groups?), it should be done to buy staff time to work on a better
fix.
ric
response 53 of 149: Mark Unseen   Jan 10 18:04 UTC 2006

re 49 - ah, yes, grex doesn't allow php or cgi scripts in home directories.

re 50 - Ken is right in #51 .. peole forge from addresses all the time, and
spam blockers (and those who write spam blocking software) all all aware of
this.  Black listing is pretty much always IP based.  Even if you receive a
million spams from the Ann Arbor Observer, and they did NOT forge their from
address... their IP address would be blacklisted, not the organization.  So
if they changed their IP address they could start sending spam again - until
that was also blacklisted.
krj
response 54 of 149: Mark Unseen   Jan 10 21:10 UTC 2006

I should have phrased #51 as "Nobody knowledgable..." rather than 
"Nobody intelligent..."
cross
response 55 of 149: Mark Unseen   Jan 11 02:12 UTC 2006

Regarding #54; You shouldn't assume that the people who run either ISPs or
blacklists are either.
bhoward
response 56 of 149: Mark Unseen   Jan 11 15:04 UTC 2006

Just to let you know...

Pending next weeks discussion at the BOD meeting, I have implemented
an initial throttle on email for newusers.  

The net effect of this is that all grex users as of this evening,
will see no change to their mail access.  Any newuser account created
from this evening onward, will not be able to send mail to external
sites until their account has been added to a file containing a
list of authorized users.  Mail within grex continues to be available
to all users.

Note, this has been implemented on an emergency basis in order to
give staff time to stabilize the situation from a technical standpoint
until the BOD are able to discuss this issue next week.
cross
response 57 of 149: Mark Unseen   Jan 11 18:38 UTC 2006

Outstanding.
bhoward
response 58 of 149: Mark Unseen   Jan 11 19:11 UTC 2006

Don't start dancing yet...it needs to settle in and I wasn't all
that familiar with exim when the grex spam problem really started
to explode recently.

I'm watching the logs and doing further tests carefully as my mailer
science skills have rusted a bit since the mispent days of my hacking
youth when I used to do this for a living (and for some strange
reason, actually liked hacking on mail systems).
cross
response 59 of 149: Mark Unseen   Jan 11 19:49 UTC 2006

True, but there's a big difference between upas and what passes for
mailers these days.  :-)
tod
response 60 of 149: Mark Unseen   Jan 11 21:46 UTC 2006

re #56
THANKS!!!
keesan
response 61 of 149: Mark Unseen   Jan 12 00:07 UTC 2006

How do you plan to authorize new users?
bhoward
response 62 of 149: Mark Unseen   Jan 12 01:24 UTC 2006

I've proposed three ways:
    o write a program that presents a CAPCHA which if correctly
      entered, will add said user to the list of authorized
      mail users.

    o Automatically vest newuser accounts with mail privs after 
      a hold down period (currently suggested at 48 hours) has
      elapsed.

    o Some combination of the above two.
kingjon
response 63 of 149: Mark Unseen   Jan 12 01:55 UTC 2006

I thought the question was "how do you plan to authorize them *in this
temporary stopgap measure*?" 

aruba
response 64 of 149: Mark Unseen   Jan 12 03:39 UTC 2006

Thanks Bruce!  Great job.  And thanks also to STeve for dealing with the
spammers.
bhoward
response 65 of 149: Mark Unseen   Jan 12 05:02 UTC 2006

Re#63 Sindi didn't indicate what time frame she meant; I don't
intend to do a lot about adding newusers in the interim.  If a
newuser thinks to send mail to staff, we'll certainly add them but
my priority is on implementing mechanisms to adding them or delegate
the support load for doing so out to the individual users.

As a next step, I'm looking at:
   * Changing /usr/local/etc/exim.outbound to a dbm file (I used a
   flat file for yesterdays change but that is hard to update
   efficiently)

   * Writing monitoring script to periodically count up how much
   mail has been sent by each person that has sent mail in the last
   24 hours and automatically throw anyone over the limit on the
   explicitly depermitted list.  Removal of offenders from said
   will be a manual process.

   * Thinking about how to flesh my CAPCHA prototype script into a
   proper secure setuid C program and also how to implement the 48
   (or N) hour hold down if that is what the BOD or membership
   decide to go for.
naftee
response 66 of 149: Mark Unseen   Jan 12 05:32 UTC 2006

whoa ! 
bruce is great
mary
response 67 of 149: Mark Unseen   Jan 12 10:35 UTC 2006

Thanks so much, Bruce!
ric
response 68 of 149: Mark Unseen   Jan 12 16:52 UTC 2006

great work bruce.

BTW, it's CAPTCHA
 0-24   19-43   44-68   69-93   94-118   119-143   144-149    
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss