You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spamassassin.apache.org by Justin Mason <jm...@jmason.org> on 2005/07/26 05:09:08 UTC
CEAS upshot
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Well, I got back safe and sound from CEAS and the one-day hackathon on
Saturday night. It was great to meet everyone over the course of those 4
days or so, esp Duncan Findlay and Bill Stearns (neither of whom I'd met
before!)
My notes on the various talks are here, if anyone's curious:
http://taint.org/2005/07/25/080041a.html
I couldn't see much that we can use in SpamAssassin, unfortunately ;)
But it was great for the "hallway track" alone...
- --j.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Exmh CVS
iD8DBQFC5alTMJF5cimLx9ARAsj9AJ43DKfBqbdUWE7HbhK+FApjfZPhzACfbZe1
ZjWB0MUJ9Nrh3yHVbKp3DnA=
=521b
-----END PGP SIGNATURE-----
Re: CEAS upshot
Posted by Jeff Chan <je...@surbl.org>.
On Monday, July 25, 2005, 8:09:08 PM, Justin Mason wrote:
> My notes on the various talks are here, if anyone's curious:
> http://taint.org/2005/07/25/080041a.html
Thanks for sharing your notes. Regarding:
> Searching For John Doe: Finding Spammers and Phishers: MS'
> antispam attorney, Aaron Kornblum, had a good talk discussing
> their recent court cases. Notably, he found one cases where an
> Austrian domain owner had set up a redirector site which
> sounded like it was expressly set up for spam use -- news to me
> (and worrying).
Music to *our* ears. Let's hope spammers all register their own
redirection domains... so we can blacklist them!
> Stopping Outgoing Spam by Examining Incoming Server Logs:
> Richard Clayton's talk. Well worth a read. It's an interesting
> technique for ISPs -- detecting outgoing spam by monitoring
> hits to your MX from your own dialup pools which uses known
> ratware patterns.
Potentially useful, yes, but didn't he give a similar talk last
year?
Jeff C.