On Mon, 1 May 2000 13:28:53 -0500 , "Dennis Duval" writes:
> It appears that the sending IP (207.190.23.59) is bogus.  I
> get no information on a reverse lookup.

... which really doesn't mean it's bogus, just not properly
configured.
 
> I don't see any way to stop this type of attack other than to be able to
> deny a connection from any IP address that does not have a valid MX record,
> or at least a valid reverse lookup.  But I have not figured out how to do
> that.

This won't stop "this kind of attack" because there
is nothing in the nature of this attack that requires
a non-reversed IP.  If you're worried about stopping
"this attacker," then use tcprules[1] to block connections
from the attacker's IP (or IP block).  I would only do
this after trying their abuse contacts.

Anyway, denying connections from non-reversed IPs
would require putting a shell-script wrapper around
the daemon which checks if TCPREMOTEHOST is set[1].
However, you may have reservations about doing this
on a high-volume server.

-- 
Chris Mikkelson  | "I have yet to see any problem, however complicated,
[EMAIL PROTECTED] | which, when you looked at it the right way, did not 
                 | become still more complicated."  -- Poul Anderson

[1] Assuming, of course, you use tcpserver.

Reply via email to