mail/spamd - The NetBSD Packages Collection

OpenBSD spam deferral daemon

Tarpits like spamd are fake SMTP servers, which accept connections but don't
deliver mail. Instead, they keep the connections open and reply very slowly.
If the peer is patient enough to actually complete the SMTP dialogue (which
will take ten minutes or more), the tarpit returns a 'temporary error' code
(4xx), which indicates that the mail could not be delivered successfully and
that the sender should keep the mail in his queue and retry again later.
If the spammer does, the same procedure repeats. Until, after several attempts,
wasting both his queue space and socket handles for several days, the spammer
gives up. The resources the spamd server has to waste to do this are minimal.

If the sender is badly configured, an uncooperative recipient might actually
delay his entire queue handling for several minutes each time he connects to
the tarpit. And many spammers use badly configured open relays.

Build dependencies

pkgtools/mktools pkgtools/cwrappers

Runtime dependencies

(none)

Binary packages

OSArchitectureVersion
NetBSD 10.0aarch64spamd-20060330nb2.tgz
NetBSD 10.0aarch64spamd-20060330nb2.tgz
NetBSD 10.0aarch64ebspamd-20060330nb2.tgz
NetBSD 10.0aarch64ebspamd-20060330nb2.tgz
NetBSD 10.0alphaspamd-20060330nb2.tgz
NetBSD 10.0alphaspamd-20060330nb2.tgz
NetBSD 10.0earmv6hfspamd-20060330nb2.tgz
NetBSD 10.0earmv6hfspamd-20060330nb2.tgz
NetBSD 10.0earmv6hfspamd-20060330nb2.tgz
NetBSD 10.0earmv7hfspamd-20060330nb2.tgz
NetBSD 10.0earmv7hfspamd-20060330nb2.tgz
NetBSD 10.0earmv7hfspamd-20060330nb2.tgz
NetBSD 10.0i386spamd-20060330nb2.tgz
NetBSD 10.0i386spamd-20060330nb2.tgz
NetBSD 10.0m68kspamd-20060330nb2.tgz
NetBSD 10.0powerpcspamd-20060330nb2.tgz
NetBSD 10.0powerpcspamd-20060330nb2.tgz
NetBSD 10.0powerpcspamd-20060330nb2.tgz
NetBSD 10.0sparc64spamd-20060330nb2.tgz
NetBSD 10.0sparc64spamd-20060330nb2.tgz
NetBSD 10.0sparcspamd-20060330nb2.tgz
NetBSD 10.0sparcspamd-20060330nb2.tgz
NetBSD 10.0vaxspamd-20060330nb2.tgz
NetBSD 10.0vaxspamd-20060330nb2.tgz
NetBSD 10.0x86_64spamd-20060330nb2.tgz
NetBSD 10.0x86_64spamd-20060330nb2.tgz
NetBSD 9.0aarch64spamd-20060330nb2.tgz
NetBSD 9.0aarch64spamd-20060330nb2.tgz
NetBSD 9.0alphaspamd-20060330nb2.tgz
NetBSD 9.0alphaspamd-20060330nb2.tgz
NetBSD 9.0earmv4spamd-20060330nb2.tgz
NetBSD 9.0earmv6hfspamd-20060330nb2.tgz
NetBSD 9.0earmv6hfspamd-20060330nb2.tgz
NetBSD 9.0earmv6hfspamd-20060330nb2.tgz
NetBSD 9.0earmv7hfspamd-20060330nb2.tgz
NetBSD 9.0earmv7hfspamd-20060330nb2.tgz
NetBSD 9.0earmv7hfspamd-20060330nb2.tgz
NetBSD 9.0i386spamd-20060330nb2.tgz
NetBSD 9.0i386spamd-20060330nb2.tgz
NetBSD 9.0m68kspamd-20060330nb2.tgz
NetBSD 9.0powerpcspamd-20060330nb2.tgz
NetBSD 9.0powerpcspamd-20060330nb2.tgz
NetBSD 9.0powerpcspamd-20060330nb2.tgz
NetBSD 9.0sparc64spamd-20060330nb2.tgz
NetBSD 9.0x86_64spamd-20060330nb2.tgz
NetBSD 9.0x86_64spamd-20060330nb2.tgz
NetBSD 9.3x86_64spamd-20060330nb2.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.