>Why couldn't one just ACL the offending ip's at the border router?  Are the
>attacks from various ISP's?

Yes, here's the Top 30, mostly DSL and cable:

Host/Domain Summary: SMTPD Connections (top 30)
  connections  time conn.  avg./conn.  max. time  host/domain
  -----------  ----------  ----------  ---------  -----------
    12654       32:00:06          9s       247s   attbi.com
     9489       28:10:58         11s       299s   comcast.net
     6674       64:16:48         35s       117s   rima-tde.net
     6359       42:38:47         24s        58s   213.33.101.19
     6059        9:26:54          6s       267s   hinet.net
     5290       18:56:23         13s        64s   210.78.144.4
     4752       26:00:32         20s        98s   210.222.6.93
     4435        2:53:31          2s       119s   xxxxx.net < domain of IMGate
     4128       18:41:31         16s       103s   t-dialin.net
     4038        9:04:34          8s       426s   rr.com
     3526       11:34:43         12s       251s   61.159.235.36
     3282       21:11:20         23s       263s   prodigy.net.mx
     2968        4:43:52          6s        33s   200.222.209.196
     2846        3:57:32          5s       116s   yahoo.com
     2822        4:07:52          5s       265s   211.162.0.131
     2719       11:00:58         15s       271s   dsl-verizon.net
     2683        8:38:17         12s       102s   btopenworld.com
     2658        4:16:13          6s        45s   200.141.76.227
     2547       18:32:35         26s       269s   telesp.net.br
     2277       14:51:26         23s       265s   adelphia.net
     2183        3:52:11          6s        88s   swbell.net
     2157       10:59:42         18s       255s   ocn.ne.jp
     2129       10:37:08         18s        97s   bbtec.net
     2107       12:29:25         21s       265s   hkcable.com.hk
     2004       12:20:10         22s       136s   012.net.il
     1998        6:28:06         12s        89s   charter.com
     1967        9:05:43         17s       257s   blueyonder.co.uk
     1900        6:13:03         12s        47s   61.132.89.133
     1888        2:26:22          5s        52s   tpcper.com
     1731        8:55:29         19s       107s   bezeqint.net

and that goes of for 100's of IPs.

You can see here AOL's justification in wanting to block all "dynamic" 
subnets, and my reasoning in blocking  mta_clients_dul.regexp with

/(dsl|cable|client|user|pool|docsis|dial|dhcp|dyn|etc).*\..*\./ 554 ACL 
mta_clients_dul Send your outbound mail through the mail server of your ISP

... to kill 99.99% of the abuse, then whitelist the minuscule qty of IPs 
legit complainers.

This dictionary attack is not the only crap that comes from those 
IPs.  They are also huge sources of forged sender.domain and every other 
type of abuse.  Abuse from these networks will only get worse as DSL and 
cable, worldwide, becomes more popular.

what's great about IMGate using check_recipient_maps to block unknown 
recipients is that IMGate does it with very little load on IMGate, as seen 
by the average STMPD session times, aided by smtpd_hard_error_limit = 2 :

Per-Hour SMTPD Connection Summary
     hour        connections    time conn.    avg./conn.   max. time
     --------------------------------------------------------------------
     0000-0100      35610        109:03:59          11s         272s
     0100-0200      21272        46:04:52           8s         281s
     0200-0300      38512        127:45:55          12s         268s
     0300-0400      19685        35:16:43           6s         272s
     0400-0500      21940        50:17:14           8s         586s
     0500-0600      29657        93:31:34          11s         285s
     0600-0700      17235        26:58:46           6s         293s
     0700-0800      21554        44:40:50           7s         259s
     0800-0900      19859        43:57:53           8s         272s
     0900-1000      18434        36:07:39           7s         257s
     1000-1100      21569        38:32:58           6s         453s
     1100-1200      35510        124:34:55          13s         260s
     1200-1300      26171        63:56:26           9s         265s
     1300-1400      33237        116:13:01          13s         275s
     1400-1500      17778        22:07:16           4s         260s
     1500-1600      19351        31:18:53           6s         369s
     1600-1700      39735        148:01:25          13s         269s
     1700-1800      38355        148:30:27          14s         479s
     1800-1900      28918        77:14:58          10s         271s
     1900-2000      23543        39:26:38           6s         274s
     2000-2100      19042        34:36:49           7s         268s
     2100-2200      13086        25:55:04           7s         268s
     2200-2300      14068        29:33:13           8s         490s
     2300-2400      14330        34:11:57           9s         278s


    7804 ACL from_senders_imgfx
   24134 SMTP sender address unverifiable
  198539 SMTP Exceeded Hard Error Limit after RCPT <<<<<<<<<<<<<
  812706 ACL to_relay_recipients unknown recipient
===============================
1090057 TOTAL


Len



Reply via email to