home.social

#spamd — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #spamd, aggregated by home.social.

  1. Running #OpenBSD 7.8 ​:openbsd:​

    DNS:
    #nsd (3 Master Zones), #DNSSEC & #DANE (RFC6698) + #unbound
    Firewall:
    #pf with auto-fed tables (IPS-style), spambot-tarpitting & service rate limits.
    Mail:
    #smtpd (Multi-domain, RFC8461/MTA-STS) + #rspamd (DKIM) + #dovecot (IMAPS-only).
    Spam-Defense:
    #spamd with auto-SPF-walk (no more greylisting issues).
    Web:
    #relayd (TLS-Terminator, HSTS, CSP) + #httpd (NIP-05, Autoconfig, security.txt).
    Performance: Lightweight "Fail2Ban" via 1-liner shell script (No Python crap!).

    #Nostr Relay in Rust building...

    #SelfHosted #SysAdmin #Security #Privacy

  2. Running #OpenBSD 7.8 ​:openbsd:​

    DNS:
    #nsd (3 Master Zones), #DNSSEC & #DANE (RFC6698) + #unbound
    Firewall:
    #pf with auto-fed tables (IPS-style), spambot-tarpitting & service rate limits.
    Mail:
    #smtpd (Multi-domain, RFC8461/MTA-STS) + #rspamd (DKIM) + #dovecot (IMAPS-only).
    Spam-Defense:
    #spamd with auto-SPF-walk (no more greylisting issues).
    Web:
    #relayd (TLS-Terminator, HSTS, CSP) + #httpd (NIP-05, Autoconfig, security.txt).
    Performance: Lightweight "Fail2Ban" via 1-liner shell script (No Python crap!).

    #Nostr Relay in Rust building...

    #SelfHosted #SysAdmin #Security #Privacy

  3. Running #OpenBSD 7.8 ​:openbsd:​

    DNS:
    #nsd (3 Master Zones), #DNSSEC & #DANE (RFC6698) + #unbound
    Firewall:
    #pf with auto-fed tables (IPS-style), spambot-tarpitting & service rate limits.
    Mail:
    #smtpd (Multi-domain, RFC8461/MTA-STS) + #rspamd (DKIM) + #dovecot (IMAPS-only).
    Spam-Defense:
    #spamd with auto-SPF-walk (no more greylisting issues).
    Web:
    #relayd (TLS-Terminator, HSTS, CSP) + #httpd (NIP-05, Autoconfig, security.txt).
    Performance: Lightweight "Fail2Ban" via 1-liner shell script (No Python crap!).

    #Nostr Relay in Rust building...

    #SelfHosted #SysAdmin #Security #Privacy

  4. Running #OpenBSD 7.8 ​:openbsd:​

    DNS:
    #nsd (3 Master Zones), #DNSSEC & #DANE (RFC6698) + #unbound
    Firewall:
    #pf with auto-fed tables (IPS-style), spambot-tarpitting & service rate limits.
    Mail:
    #smtpd (Multi-domain, RFC8461/MTA-STS) + #rspamd (DKIM) + #dovecot (IMAPS-only).
    Spam-Defense:
    #spamd with auto-SPF-walk (no more greylisting issues).
    Web:
    #relayd (TLS-Terminator, HSTS, CSP) + #httpd (NIP-05, Autoconfig, security.txt).
    Performance: Lightweight "Fail2Ban" via 1-liner shell script (No Python crap!).

    #Nostr Relay in Rust building...

    #SelfHosted #SysAdmin #Security #Privacy

  5. Running #OpenBSD 7.8 ​:openbsd:​

    DNS:
    #nsd (3 Master Zones), #DNSSEC & #DANE (RFC6698) + #unbound
    Firewall:
    #pf with auto-fed tables (IPS-style), spambot-tarpitting & service rate limits.
    Mail:
    #smtpd (Multi-domain, RFC8461/MTA-STS) + #rspamd (DKIM) + #dovecot (IMAPS-only).
    Spam-Defense:
    #spamd with auto-SPF-walk (no more greylisting issues).
    Web:
    #relayd (TLS-Terminator, HSTS, CSP) + #httpd (NIP-05, Autoconfig, security.txt).
    Performance: Lightweight "Fail2Ban" via 1-liner shell script (No Python crap!).

    #Nostr Relay in Rust building...

    #SelfHosted #SysAdmin #Security #Privacy

  6. I added a few more translations of the phrase "The rest is trash" to the spamtraps at nxdomain.no/~peter/traplist.sh (see nxdomain.no/~peter/the_rest_is or bsdly.blogspot.com/2026/02/the).

    If you want further translations added, please let me know (with translation in your message).

    #spamtraps #greytrapping #spamd #openbsd #freebsd #antispam #imaginaryfriends #localization #cybercrime

    The list without wrapper text is available as bsdly.net/~peter/sortlist.txt (BIG! -- 22975800 entries as of right now, will increase)

  7. Following up on previous, the LinkedIn discussion revealed that there are people who have not heard about greylisting.

    So here is my 2012 piece with updates, "In The Name Of Sane Email: Setting Up OpenBSD's spamd(8) With Secondary MXes In Play - A Full Recipe" nxdomain.no/~peter/in_the_name

    #spamd #antispam #spamd.conf #OpenBSD #blocklists #blacklists #greytrapping #greylisting #spam

  8. The symptoms of what I take to have been a #phishing campaign aimed at users in #japan are no longer that visible in the backscatter.

    But they will be visible as new #imaginaryfriends in the published #spamtraps list we user for our our #openbsd #spamd #graytrapping, see nxdomain.no/~peter/traplist.sh and nxdomain.no/~peter/spammers_be (with the total now inching in the direction of the 5 million mark)

  9. The other horribly nonsensical thing I saw during the last 24 hours was the error messages GNU Emacs emits when it is faced with a file of a size that exceeds its expected per-buffer memory allocation.

    Fortunately a sane solution was found for that particular problem (split that big hand generated log into smaller pieces) - search for "this log directory" in nxdomain.no/~peter/traplist.sh #spamtraps #greyptrapping #spamd #antispam #cybercrime #imaginaryfriends

  10. For some reason I just looked up my now just over 2 year old piece "The Things Spammers Believe - A Tale of 300,000 Imaginary Friends" nxdomain.no/~peter/spammers_be (prettified, tracked bsdly.blogspot.com/2022/09/the) and realized that number will soon roll past the next big round marker. #spamtraps #traplist #spam #antispam #openbsd #pf #spamd #cybercrime #bottomfeeders #imaginaryfriends