Thank you.
I would just be using it myself as an addition to other blocklists that I already maintain, not publicly releasing it as an add-on. It would be useless to most people, too resource-intensive, and too much work for someone to set up and oversee, unless they had a level of hatred for spammers rivaling my own.
This is something I do for free because I detest people who foul the Internet with malice. I actually own domains whose sole reason for existence is to trap hackers, crackers, spammers, and other Internet miscreants. One might call it an obsession.
Also, my Perl sucks. The script(s) will be in PHP or just shell scripts.
I’d share the scripts with anyone else crazy enough to want to do it, however. But they wouldn’t be available as plug-ins, modules, or anything else along those lines.
As for the difficulty of scripting, it wouldn’t be that hard. There are at least two ways. One would be to use Procmail to pipe the incoming spam to a script that would extract and insert the sending IP address into the database. That was my original idea.
The other way would be to alias those addresses to a single email address (for example, spamtrap@domain.tld
), which would treat all incoming mail as spam, extract the IP addresses, and add them to the database. That would be easier for people to use if they just want to contribute to the project with minimal effort. All they have to do is set up the aliases. It’s actually the option I’m leaning toward this morning.
As an aside, I set up the rest of the reporting system (that is, the intrusion-detection and Web-based traps) on my home office development server last night; and by this morning, there were more than 300 emails and text messages reporting malicious activity waiting for me. It’s a jungle out there.
Richard