On Tue, Jan 31, 2012 at 09:44:22PM -0600, /dev/rob0 wrote: > On Tue, Jan 31, 2012 at 08:54:33PM -0600, Noel Jones wrote: > > On 1/31/2012 8:30 PM, l...@airstreamcomm.net wrote: > > > What we were thinking was using RBLs to dynamically block known > > > malicious IPs before allowing SMTP Auth to occur, hopefully > > > seeing a decrease in spam. Not sure if this would have > > > unintended consequences, which is why I am consulting the list. > > > > That would probably cause a huge number of false positives; a > > support desk nightmare. > > > > Many "consumer" IPs are listed on the popular RBLs. As a > > consequence, legit users may be unable to send mail because their > > dynamic IP was used by a spambot at some point in the past. > > > > I don't know of any RBLs that would be useful on incoming > > authenticated mail. > > Even a locally-maintained private DNSBL is the wrong approach. When > spam is detected from an authenticated account, revoke the > credentials. You have no other good choice. Even after the user's > system is purged of the ratware, you cannot be sure that these > credentials were not forwarded to the botnet's control node[s].
Yes, however in our practice, there is good reasons to "block" the IP too (if it's not our IP, then of course we have the chance to solve the situation better with contacting the current user of the IP - anyway, "not our IP pool" is quite a good sign that smtp username/passwd is used illegally from there; for sure not always, but there is a good chance for that): * it's fairly common that the IP tries to abuse another smtp user of ours then in the future * it helps decrease the load of the submit server: even if revoke user's crendentials, it has the cost (which is maybe more than using a locally stored mail submission IP blacklist like stuff) that user must be checked, etc. The "evil" IP still tries to send mail for hours (or even days - in our practice again) even after revokation of user's credentials, which can consume resources of the submit server. [that was the reason I thought about using postscreen for mail submission but only for BL features and using a "local" BL, so postfix smtpd processes, smtp auth stuffs etc are not under load because of these abusers/spammers] We usually revoke submit user's credentials (of course), we inform the user about the problem, and we block (with a locally stored list) of the IP which abused the mail account, _if_ the IP does not seems to be part of our IP pool, and either not the IP of "neighbour ISPs" in our country (which is quite common that users use different local ISPs using the same ISP's mail submission service though) and also seems to be a dynamic IP pool somewhere or no PTR record, etc etc. For sure, it's quite a "manual" work, and not always done just in extreme cases when the IP does "really evil things". > > You can test this yourself by inserting "warn_if_reject > > reject_rbl_client zen.spamhaus.org" just before > > permit_sasl_authenticated. Then watch your logs for > > reject_warning: from legit connections. (this is a > > logging-only function; the client is not rejected and > > sees no additional messages.) > > Perhaps a slightly less insane ;) test would be to check > xbl.spamhaus.org at that point. But hotels and public hotspots are > often listed there. You might catch a few bad users, but you will > *not* have reasonable protection for clean users. Of course I only wrote about a "local RBL" which is maintained by ourselves for this purpose, not a general-purpose public BL.