Good answer Brandon. We also use RBLs (our users can opt out) and this cuts down over 60% of our potential messages delivered (based on RBL blocks v. delivered messages) based on last week's stats. We use TrendMicro (was MAPS) and SpamHaus. TrendMicro has a newer QIL which is designed to be used to tempfail connections, addresses on there are short lived and they target botnets.

I believe spamhaus is still free for small sites.

DSPAM is great filtering software, and highly effective when trained. We get pretty good accuracy even when using a shared global dictionary. But the user burden of checking the quarantine is high and many users don't do it. We have some giant Spam folders on our email servers, and the 'cost' of FPs is high. We try to reduce the acceptance of spam and then filter the remainder (multi-layered solution).

Also filtering is expensive server-wise, rejecting connections based on IPs is much cheaper. We process over 5 million connections per day.

gab

On Aug 22, 2007, at 6:49 PM, Brandon Macmillan wrote:

Surely you are joking? So the first time that an AOL user sends you a
single spam email you want to stop receiving email from ALL AOL users?
Talk about swatting a fly with a flamethrower. Or do you want to block
it based upon the sender's original IP address from the message headers? You know that spammers usually forge those? You're just going to end up
blocking the large legitimate email providers and not stop the army of
spam zombies that are out there. You would be better off implementing
something like a DNSBL or DHUL list on your firewall. We (a med/large
ISP) block any email from Dynamic IP addresses, this greatly cuts down
on the spam zombie traffic.

Also remember that with IP tables the longer your table is the more
"hops" that the packets must pass through before hitting your -j ACCEPT rule, if you implement it as you suggested below your IP Table will grow
and grow and grow and your network performance and latency will get
worse and worse and worse.

Brandon

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Raj
Sent: Wednesday, August 22, 2007 12:09 PM
To: [email protected]
Subject: [dspam-users] blocking ips of spam source in firewall

Hi

i want to block the ips of spam sources immediately as soon as dspam
detects them as spam

dspam does a logs these ips correctly into my /var/log/maillog file so i
know that things are working correctly

on the linux console i use the following command to block an ip address

/sbin/iptables -I INPUT -s 111.111.111.111 -j DROP

this code snippet below is from the dspam source ie dspam.c file in the
src directory

the variable called "ip" contains the ip address which is logged to the
maillog file

i understand that just a single line is required after the last line to
execute the command but i am not sure of the C syntax

can someone help me ?

###########

int tracksource(DSPAM_CTX *CTX) {
  char ip[32];

  if (!dspam_getsource (CTX, ip, sizeof (ip)))
  {
if (CTX->totals.innocent_learned + CTX- >totals.innocent_classified >
2500) {
      if (CTX->result == DSR_ISSPAM &&
          _ds_match_attribute(agent_config, "TrackSources", "spam")) {
        FILE *file;
        char dropfile[MAX_FILENAME_LENGTH];
        LOG (LOG_INFO, "spam detected from %s", ip);


###########

thanks
raj






Reply via email to