On Fri, 28 Feb 2003, Mike Beattie wrote:
Mike Beattie
ZL4TXK, IRLP Node 6184
Be warned, I might call you on that tonight. :-) Ive got no idea what our local node number is though.. In terms of spam, ive adopted essentially the same policy as Nathan Ward pointed out, which has been useful so far - except for the completely noncooperative nature of the one network I can positively identify as having sold an address on my domain in their spamlist... So the second part of my personal system is to actively do the following: 1) Watch my web server logs for crawlers from 'dodgy' networks. (read: *.cn, *.kr, *.br etc) 2) Firewall said networks from my MTA/Webserver (same box) entirely 3) Look up individual spam source IPs with whois, send abuse complaints in the first instance.. 4) Block spamming MTA (smtp only) in the second instance. 5) skip step 3 where source IP is *.cn. *.kr, *.br, or where spam type is persistant. The amount of spam ive dealt with of late has dropped significantly as a result of the above. Essentially what ive done is built my own RBL, because at least this way im personally responsible for what gets blocked and what is permitted, and not at the whim of some 3rd party block list... And personally while I see TMDA as quite effective, I also see it as a serious inconvenience. Mark.