[Greylist-users] What timeouts should be used with greylisting
David F. Skoll
dfs at roaringpenguin.com
Wed Jun 25 14:26:33 PDT 2003
On Wed, 25 Jun 2003, martin dempsey wrote:
> RBLs are weak when new ip addresses are used to spam. Greylists are
> weak when the same ip address is used for repeated spam. Combined
> they can work better than either alone since each attacks the others
> weakness.
Yes, you are right. And that's why I fear we'll see spammers and
crackers working together. If you own a farm of compromised machines,
you have ready access to new, but stable, IP addresses.
--
David.
More information about the Greylist-users
mailing list