Apparently we (our mail server) got targeted by a zombie network
since suddenly there were some 30000 hosts on spamd's whitelist,
continously some 600 connections to spamd, and only mails to
unknown users coming in. The network connection was flooded,
the web server sluggish, downloads creeped, basically
nothing worked.

Can spamd do anything about zombie hosts? They behave like
normal MTAs so they will pass spamd's behavioural tests, right?

Now I analyze the greylist, do some heuristics on the
sender address (among other things) and trap the bad hosts.
The trapped hosts are then copied to a pf table to be blocked
in the firewall. Tarpitting them through spamd is simply
too much work for the mail server, but blocking works fine.

Here come the questions:

* Does anyone know of a good strategy against zombie network
spam attacks?

* To make the greylist heuristics validate recepients and
blacklist hosts that send to invalid recepients would
blacklist valid MTAs that send bounces of mails with 
fake sender addresses to me, right? And that would be
too cruel, or? Because it would certainly decrease
the spam amount.

* To make the greylist herustics validate the hosts
by reverse DNS PTR lookup and then forward A lookup
is apparetly a debatable issue according to the 
current thread "running mail server at home".
But if it is (fairly) common practice it would
be a simple thing to do, and certainly decrease
spam volume. But would it be to narrow?

-- 

/ Raimo Niskanen, Erlang/OTP, Ericsson AB

Reply via email to