ylmf-pc is a known brute force attack.  Why they're using all the same helo
string is beyond me, but this has been going on for over a year.

I don't think that there's a way to drop a connection based on HELO, though
I'll yield to Thomas' input on that.

I'm no expert but I believe that it should be possible to craft some code
in the getline function within the perl code that when a helo that matches
something hard coded or from a file is found, that you could drop the
connection, something like DenySMTPStrictEarly does.



On Mon, Mar 2, 2015 at 10:47 AM, Phil Cook <pc...@gsiag.com> wrote:

> What would be the best way to block EHLO ylmf-pc? I see a lot of auth
> attempts from this host but the ip changes, so blocking the ip doesn't work
> for long.
>
>
> ------------------------------------------------------------------------------
> Dive into the World of Parallel Programming The Go Parallel Website,
> sponsored
> by Intel and developed in partnership with Slashdot Media, is your hub for
> all
> things parallel software development, from weekly thought leadership blogs
> to
> news, videos, case studies, tutorials and more. Take a look and join the
> conversation now. http://goparallel.sourceforge.net/
> _______________________________________________
> Assp-user mailing list
> Assp-user@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/assp-user
>
------------------------------------------------------------------------------
Dive into the World of Parallel Programming The Go Parallel Website, sponsored
by Intel and developed in partnership with Slashdot Media, is your hub for all
things parallel software development, from weekly thought leadership blogs to
news, videos, case studies, tutorials and more. Take a look and join the 
conversation now. http://goparallel.sourceforge.net/
_______________________________________________
Assp-user mailing list
Assp-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-user

Reply via email to