<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<div class="moz-cite-prefix">Howard Leadmon via Dxspider-support je
7.9.2022 ob 9:15 napisal:</div>
<div class="moz-cite-prefix"><br>
</div>
<div class="moz-cite-prefix">I am sure that Dirk and Lee are in
discussions on how to move forward with the security approach in
their dxcluster programmes. It will be much more difficult with
systems on the network where the software is no longer maintained!
Thanks to Kin EA3CV I already have a beta version in testing for
TOR IPs spotter/spot exclusion on my box.</div>
<div class="moz-cite-prefix"><br>
</div>
<div class="moz-cite-prefix">73<br>
Dan S50U</div>
<div class="moz-cite-prefix"><br>
</div>
<div class="moz-cite-prefix"><br>
</div>
<div class="moz-cite-prefix"><br>
</div>
<blockquote type="cite"
cite="mid:b79f3b3c-e4fc-fec5-387c-4c1c3ead5e85@leadmon.net">
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
I agree Dan, but at the same time I think I like Dirk's idea of
giving traffic a rating. If it flows with the tag it's from a
site with registration, it has one rating, and if it comes with an
unknown node, or a site without registration, then it has a
different rating. Allow the nodes to decide what they accept,
and pass based on settings or filters. I think of this like the
issues here in the US with robocalls's and the carriers now forced
to send calls with an attestation rating based the authenticity of
the call.<br>
<br>
It may not totally solve the problem, but I think it will very
much make a dent into the issue.<br>
<br>
<br>
Another possible help might be creating an RBL (Realtime
Blackhole List) like email operations do to combat spam. If the
spots keep an IP as part of the message, it should be easy to take
known offenders IP's and put them in this list that is used by any
desired. Then if desired an expiry timer could be set to remove
it after some preset time. Again, maybe not perfect, but
another way to combat the issue..<br>
<br>
<br>
<pre class="moz-signature" cols="72">---
Howard Leadmon - WB3FFV
PBW Communications, LLC
<a class="moz-txt-link-freetext" href="http://www.pbwcomm.com" moz-do-not-send="true">http://www.pbwcomm.com</a>
</pre>
<div class="moz-cite-prefix">On 9/6/2022 1:31 AM, Danilo Brelih
via Dxspider-support wrote:<br>
</div>
<blockquote type="cite"
cite="mid:462724420.31788026.1662442290782.JavaMail.zimbra@users.siol.net">
<meta http-equiv="content-type" content="text/html;
charset=UTF-8">
<div style="font-family: arial,helvetica,sans-serif; font-size:
12pt; color: #000000">
<div><br data-mce-bogus="1">
</div>
<div>> I have run registration since its inception during
9/11. I like the idea of making it the default option. It
takes little time to do.</div>
<div><br data-mce-bogus="1">
</div>
<div>I agree but pork can enter the dx network from a system
not called DXSpider!</div>
<div><br data-mce-bogus="1">
</div>
<div>73 Dan S50U</div>
<div><br>
</div>
</div>
<br>
<fieldset class="moz-mime-attachment-header"></fieldset>
<pre class="moz-quote-pre" wrap="">_______________________________________________
Dxspider-support mailing list
<a class="moz-txt-link-abbreviated moz-txt-link-freetext" href="mailto:Dxspider-support@tobit.co.uk" moz-do-not-send="true">Dxspider-support@tobit.co.uk</a>
<a class="moz-txt-link-freetext" href="https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support" moz-do-not-send="true">https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support</a>
</pre>
</blockquote>
<br>
<br>
<fieldset class="moz-mime-attachment-header"></fieldset>
<pre class="moz-quote-pre" wrap="">_______________________________________________
Dxspider-support mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Dxspider-support@tobit.co.uk">Dxspider-support@tobit.co.uk</a>
<a class="moz-txt-link-freetext" href="https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support">https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support</a>
</pre>
</blockquote>
<br>
</body>
</html>