My logs tell me that the spamtrap topic is a favorite, and more likely than not somebody who read the announcement will also take a peek at the traplist itself. So while I'm slowly preparing a post about something else entirely (which what I feel is actually a lot more interesting), it can't hurt to fill you in on what I've been doing to keep track of spammer behavior.
It's a quiet life, at least by surface appearances. In between the steady stream of mainly confidential tasks handled at Datadok and the odd request to bsdly.net for services of one kind or the other, I focus on getting the book done, chapter by chapter.
The traplist is slowly expanding. The collection process itself is automated for all the tedious tasks. The "Unknown user" entries from my mail server logs as a source of traplist material almost dried up, so I started looking at the greylists directly.
After sampling my greylists at random intervals for a while, a short shell script now dumps the data to somewhere safe ten past every full hour, notes the number of grey entries and TRAPPED entries, and dumps the TRAPPED IP addresses to a file which is available to the world from the traplist page. The list is comfortably short at most times. I imagine somebody with beefier bandwidth or a more widely known domain would have more hosts trapped at any time.
The file with currently trapped hosts gets overwritten each time the script runs. There is an outside chance that the other generated data might be useful in future research, and storage is cheap these days, so I keep the data around.
Observing the greylists reveal some odd things, like a certain Taiwanese host which tried, on August 1st, 2007, to send roughly a thousand messages to one address in a domain elsewhere, using generated From: addresses at every host name and IP address in our local network. They probably thought they'd found an open relay. Spamd's "250 This is hurting you more than it is hurting me." probably did not register with them as an outright rejection, much like it fools a number of web available open relay detectors.
The conclusions still stand, though. They echo the conclusions from the malware paper (*): the spammers are working harder at sending their trash mainly because we are as close as does not matter to always correctly detecting and dealing with their junk traffic.
I keep wondering if even the few minutes' worth of work a day updating the traplist is worth it, since we are catching essentially all spam anyway. Then at intervals, one or more of the generated, made up addresses from the list actually turns up in my greylist dumps.
(*) Whenever the "The silent network" paper comes up in discussions, it looks like depending on who you are, it's either way too long or too short. At twenty-few pages it's too long for the attention span of the loudmouth self-appointed SMTP experts you may encounter on web forums and mailing lists, and too short (read: not a book) to carry much weight with a decision maker who will not read much more than the executive summary anyway. Making that article morph into a book is on my list of Things To Look Into Later If Time Allows And It Still Makes Sense Then.
If you're still there after reading all this: Click the ads already. Make somebody else pay for your entertainment.
CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
expires: Thu, 09 Oct 2025 09:49:12 GMT
date: Thu, 09 Oct 2025 09:49:12 GMT
cache-control: private, max-age=0
last-modified: Thu, 09 Oct 2025 07:08:28 GMT
etag: W/"594acd3837bcad4733f66b2e8a29b42ef3ecdf2e811bede8e607c8a562519352"
content-encoding: gzip
x-content-type-options: nosniff
x-xss-protection: 1; mode=block
content-length: 15398
server: GSE
alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
That grumpy BSD guy: We see your every move, spammer
skip to main |
skip to sidebar
Field notes and occasional musings by Peter on Stuff that happens, from a free software perspective, mainly OpenBSD, FreeBSD.
Saturday, August 4, 2007
We see your every move, spammer
Subscribe to:
Post Comments (Atom)
About Me

- Peter N. M. Hansteen
- Bergen, Norway
- Puffyist, daemon charmer, penguin wrangler. Wrote The Book of PF (3rd ed out now, see https://www.nostarch.com/pf3), rants on sanity in IT (lack of) at https://bsdly.blogspot.com/. Please read https://www.bsdly.net/~peter/rentageek.html before contacting.
Buy The Book of PF
The Book of PF, 4th edition is available for preorder.
The Book of PF, 3rd edition is available directly from No Starch Press, as well as through good bookstores.
The Book of PF, 3rd edition is available directly from No Starch Press, as well as through good bookstores.
Post, tweet, follow
Upcoming Talks
At EuroBSDcon 2025: Network Management with the OpenBSD Packet Filter Toolset session, Zagreb, Croatia. You can register for the conference and tutorial by following the links from the conference Registration and Prices page.
Follow me on Twitter
Friends
Links to other nice sites
Popular Posts
-
It fell to the UK Tories to actually implement the Nanny State. Too bad Nanny Tory does not want kinds to read up on tech web sites, or civi...
-
Did you think that OpenBSD is suitable only for firewalls and high-security servers? Think again. Here are my steps to transform a modern m...
-
Continuing the tradition started by Michael Lucas with the Absolute OpenBSD, 2nd edition auction , I will be auctioning off the first signed...
-
The robots currently at work knocking around for your guessable password could easily be repurposed to guess your Unicode password currently...
-
Against ridiculous odds and even after gaining some media focus, the botnet dubbed The Hail Mary Cloud apparently succeeded in staying unde...
-
Have you ever wanted to know what's really going on in your network? Some free tools with surprising origins can help you to an almost ...
-
Much has been written about a purported OpenSSH vulnerability. On closer inspection, the reports actually got most of their facts wrong. Rea...
-
Once you've installed your OpenBSD system, packages are there to make your life easier. A works for me/life is good guide for your wee...
-
Running your service on a non-standard port buys you an equivalent of two more characters in your password. Will that save you any trouble a...
-
The takeaway: don't pretend your appointment book can handle your email. And don't blame the Internet for all the compatibility issu...
No comments:
Post a Comment
Note: Comments are moderated. On-topic messages will be liberated from the holding queue at semi-random (hopefully short) intervals.
I invite comment on all aspects of the material I publish and I read all submitted comments. I occasionally respond in comments, but please do not assume that your comment will compel me to produce a public or immediate response.
Please note that comments consisting of only a single word or only a URL with no indication why that link is useful in the context will be immediately recycled so those poor electrons get another shot at a meaningful existence.
If your suggestions are useful enough to make me write on a specific topic, I will do my best to give credit where credit is due.