Cassidy Larson:
> We had an incident today where we had a user with a compromised
> machine. Their email/pass made it back to some botnet which proceeded
> to SASL auth to our mail servers and send numerous spam messages from
> many different hosts. The spamming hosts didnt trigger our
> smtpd_client_recipient_rate_limit setting, because of the many
> different hosts (all with the same SASL user authenticated) that they
> used.
> 
> This got me wondering if there's any easy way to have anvil report
> stats based on the authenticated SASL username, in addition to the
> remote IP address?

Not at the moment, but a policy daemon could notice that (too) many
connections use the same sasl_username attribute value.

> This would help me prevent/monitor potential addresses that are being
> used by a botnet system to relay mails through my mail server.
> 
> Or even better if there was a way to make a similar feature like the
> "smtpd_client_recipient_rate_limit" setting that'd
> match/restrict/prevent based on the authenticated SASL username?
> 
> Thoughts? Suggestions?

Maybe a good idea. This would hook into the AUTH command and after
successful AUTH, do an anvil query for the sasl_username value.

It's not a lot of code, but I don't have a lot of time, either.

        Wietse

Reply via email to