Nice thinking.

I like the way Gmane.org controls submissions. They restrict the frequency that a given user can send out messages. This is done by throttling the send queue to only allow one message to go out every so often (a minute or so I'm thinking) per user. If a user submits more messages than they're allowed, excess messages simply sit in the send queue and trickle out at the acceptable rate.

I'd very much like to see a throttle put on qmail-remote which would allow a per-user interval to be specified. When abuse occurs, the send queue would grow noticably, which could easily be monitored.

This doesn't address compromised accounts specifically, but it controls a common bad thing that happens when an account is compromised.

Thoughts?

--
-Eric 'shubes'

On 02/03/2013 11:14 AM, Sebastian Grewe wrote:
Hey,

How about doing a threshold scan for users. See what their baseline is and then 
start reporting when you see some unexpected high amount of mails going out. 
I'd think that's usually a good sign for spammy behavior. Even with an already 
high amount of mails the baseline would still help to see if their is an usual 
peak.

Just my two cents but I'd be interested in this too because it just recently 
happened to me as well. Come to think of it I might go and try to write a 
Nagios plugin for it some day... I guess with are large amount of users this 
will get difficult.

Cheers,
Sebastian

On 03.02.2013, at 18:59, South Computers <[email protected]> wrote:

Looking for ideas on detecting compromised accounts, especially for smtp 
submission. While there are programs available to detect failed login attempts 
(fail2ban, etc), what if the person already has / knows the correct password, such 
as from a keylogger, or another account hacked elsewhere (for example twitter a 
couple of days ago). I had a user whose account was being used to sending spam 
today, managed to find it & shut it down, but wondering if there might be a 
good way to attempt to find / prevent things before they get out of hand. I 
manually checked their computer for trojans / rootkits, found nothing, and it was 
not an easy password, so must have been the same passwrod they used elsewhere that 
was hacked. Hopefully anyway...

Just random initial thoughts:

Track the different ips a user is connecting from. If there are over x number 
of logins within x period of time from x number of ip addresses, then disable 
the account, or generate a random new password for it, and maybe add a block in 
iptables. Perhaps also adding ip location to it on some way, so if logins are 
coming from multiple countries in a short period of time, it could also be 
detected.

Just thinking out loud to the group...   Thoughts welcomed, or suggestions if 
there is already something out there like this.

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]





---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to