Hi! I run a heavily loaded email server which receives several connections per second. Testing antispam and antivirus for each message received consumes a lot of CPU, as you may imagine. I would want to drop connections from ofenders (IP addresses that have sent several messages with high punctuation spam during a certain period) for some time (let it be 10 minutes).
I currently parse the logfile of spamassassin and issue "shorewall drop" and "shorewall allow" commands with a perl script, but I feel that the "timeout" should be controlled by a "recent" match (so offenders trying to reconnect get bigger timeouts). Can this be achieved with shorewall? Regards ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2008. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/ _______________________________________________ Shorewall-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-users
