You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spamassassin.apache.org by Justin Mason <jm...@jmason.org> on 2005/07/26 05:09:08 UTC

CEAS upshot

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Well, I got back safe and sound from CEAS and the one-day hackathon on
Saturday night.  It was great to meet everyone over the course of those 4
days or so, esp Duncan Findlay and Bill Stearns (neither of whom I'd met
before!)

My notes on the various talks are here, if anyone's curious:

  http://taint.org/2005/07/25/080041a.html

I couldn't see much that we can use in SpamAssassin, unfortunately ;)
But it was great for the "hallway track" alone...

- --j.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Exmh CVS

iD8DBQFC5alTMJF5cimLx9ARAsj9AJ43DKfBqbdUWE7HbhK+FApjfZPhzACfbZe1
ZjWB0MUJ9Nrh3yHVbKp3DnA=
=521b
-----END PGP SIGNATURE-----


Re: CEAS upshot

Posted by Jeff Chan <je...@surbl.org>.
On Monday, July 25, 2005, 8:09:08 PM, Justin Mason wrote:
> My notes on the various talks are here, if anyone's curious:

>   http://taint.org/2005/07/25/080041a.html

Thanks for sharing your notes.  Regarding:

> Searching For John Doe: Finding Spammers and Phishers: MS'
> antispam attorney, Aaron Kornblum, had a good talk discussing
> their recent court cases. Notably, he found one cases where an
> Austrian domain owner had set up a redirector site which
> sounded like it was expressly set up for spam use -- news to me
> (and worrying).

Music to *our* ears.  Let's hope spammers all register their own
redirection domains...   so we can blacklist them!

> Stopping Outgoing Spam by Examining Incoming Server Logs:
> Richard Clayton's talk. Well worth a read. It's an interesting
> technique for ISPs -- detecting outgoing spam by monitoring
> hits to your MX from your own dialup pools which uses known
> ratware patterns. 

Potentially useful, yes, but didn't he give a similar talk last
year? 

Jeff C.