> Somebody  suggested  using  SBL  or  one of the blacklists, I forget
> which.  I'm  looking  at  ways to do that without involving the mail
> server.

That's a much better pursuit than _accepting messages_ in order to see
whether the IP should be/have been allowed to connect.

Still,  this  kind  of anomaly detection usually does directly involve
the  mail server in some fashion (either in real-time via Black Ice or
similar wrappers or via tailing actual MTA logs off the box). With the
right  setup,  blocking  at the edge can be the end action (via SSH or
SNMP  or  what-have-you).  The detection _can_ be done via a dedicated
Snort  box,  but if you've only got one monitor port and one (or zero)
IDSes,  chances  are  you'll  want the logs to originate from the host
itself. And it _could_ be done on a router itself, but we all know how
great  is,  for  example,  Cisco's  mastery  of SMTP; thanks, I'll let
someone else decide what's legit traffic. :)

Tailing  logs  safely from a non-mail box and performing trusted DNSBL
lookups  on  everything  that  connects  is another interesting way of
doing things, and probably can be done in closer to real-time than the
more  sophisticated  anomaly regexes/greps. Then again, by definition,
it is not actually responding to locally observed behavior.

--Sandy


------------------------------------
Sanford Whiteman, Chief Technologist
Broadleaf Systems, a division of
Cypress Integrated Systems, Inc.
e-mail: [EMAIL PROTECTED]

SpamAssassin plugs into Declude!
    http://www.mailmage.com/download/software/freeutils/SPAMC32/Release/

---
[This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)]

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.

Reply via email to