[Greylist-users] What timeouts should be used with greylisting

David F. Skoll dfs at roaringpenguin.com
Wed Jun 25 14:26:33 PDT 2003

On Wed, 25 Jun 2003, martin dempsey wrote:

> RBLs are weak when new ip addresses are used to spam. Greylists are
> weak when the same ip address is used for repeated spam. Combined
> they can work better than either alone since each attacks the others
> weakness.

Yes, you are right.  And that's why I fear we'll see spammers and
crackers working together.  If you own a farm of compromised machines,
you have ready access to new, but stable, IP addresses.


More information about the Greylist-users mailing list