> Regarding that trouble-ticket, concerning a very well-known issue, i like to 
> get your opinions.
> http://www.hostpoint.ch/support.php?subCatID=CASU3&mod=det&tid=52
> 
> Does anyone of you out there has a "fit for all purpose"-solution to such 
> things? We had a similar attack a few weeks ago and solved it with some 
> additional hardware to open more incoming slots. That worked fine and was a 
> proof for our infrastructure concept. But: Are there better solutions 
> available? Do we really have to add hardware + hardware + hardware while the 
> bandwith on the user's side is continously growing?

My solution to this problem (which I called email-harvesting), and other 
threats is 
documented here:

http://www.dudes.ch/spamtracker/

I have in the meantime revised the approach slightly to no longer need sendmail
source changes (I'm now doing the whole functionality within MIMEDefang). I've
also added some optimization which boils down to:
- the MySQL database contains the addresses that are supposed to be blocked,
  including a possible expiration for that block
- small script runs in cron every 5 min and reads the list of all currently
  blocked addresses, and dumps it into an ipfw2 table
- there's an ipfw rule that forwards incoming SMTP connections to port 26 for
  source-addresses that match the previously populated ipfw table
- on port 26 finally there's a little daemon who's only purpose is to cache the
  contents of the MySQL table and answer with a 421 error and the error message
  stored for that particular block. The connection is then dropped, without 
forking
  at all.
- during the time when an address is blocked until the firewall is updated, 
sendmail
  rejects the now blocked connections with a config rule.

If there is general interest, I'll document the new version.

Of course, there's also a rate-limit per source IP configured for incoming SMTP
connections in ipfw. 

These measures combined should give you very high resistance to such attacks,
but you need to be able to determine within the SMTP handshake phase (at RCPT 
TO) 
whether the target email address is valid or not (and not just whether the 
domain is
local). For some mail system setups, this could be tricky.

Oh, and of course, you have to run sendmail for this particular implementation:)

Cheers,
Markus

_______________________________________________
swinog mailing list
[email protected]
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog

Antwort per Email an