http://bugzilla.spamassassin.org/show_bug.cgi?id=3042

           Summary: DoS attack possible with blackhole dns server
           Product: Spamassassin
           Version: 2.63
          Platform: PC
        OS/Version: Linux
            Status: NEW
          Severity: major
          Priority: P3
         Component: Libraries
        AssignedTo: [EMAIL PROTECTED]
        ReportedBy: [EMAIL PROTECTED]


Last days we suffered a denial of service of SA. We use SA as a pm module 
called by MailScanner.

A misconfigured mailbox forwarding loop generated about 1-5 new error mails per 
second. This mails contained IP addresses of the internal network of the sender 
domain in the Received: header lines. When SA performed its common tests it 
tried to resolve this IP addresses but the authoritative nameserver(s) did not 
answer. Every request timed out two times with 3-4 seconds each. So SA needs 
about 20 seconds to process one email!

Consequently the incoming queue growed until our MTA stalled completely.

When spammers configure their nameserver in the same way and flood us with spam 
they can melt down all SA-Installations.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to