On 8/26/2012 11:49 PM, li...@sbt.net.au wrote:
> On Mon, August 27, 2012 6:27 am, Reindl Harald wrote:
> 
>>> Aug 27 06:00:03 postfix/anvil[4396]: statistics: max connection rate
>>> 15/1800s for (smtp:27.115.112.50) at Aug 27 05:59:14
>>> Aug 27 06:00:03 postfix/anvil[4396]: statistics: max connection count 1
>>> for (smtp:27.115.112.50) at Aug 27 05:50:26 Aug 27 06:00:03
>>> postfix/anvil[4396]: statistics: max cache size 51 at Aug
>>> 27 05:59:47
>>>
>>
>> why do you niot read what you post?
>>
>> ONE connection from 27.115.112.50
>> where do you see excess?
> 
> Reindl, thanks
> 
> sorry, doesn't this mean to warn me of 'high-er' connect rates: 15/1800s ?
> 
> "max connection rate 15/1800s "

15 connections in 30 minutes hardly constitutes an attack.
Most likely just a broken spam-bot.

Reasonable choices are:

1) just ignore it.  A few extra one-at-a-time connections are
unlikely to have any noticeable effect on postfix.  Eventually the
client will stop trying.

2) block the IP via firewall or null-route.  Understand that
blocking them is more about not seeing this in your logs, and less
about protecting your system.  Postfix doesn't really care.


> so what do I look for in anvil output ?


The anvil "statistics:" log entries show the peak rate during the
last $anvil_status_update_time.  Look for numbers *far* greater than
normal.  "Normal" will vary by site and mail load. Low-volume sites
may benefit from a higher anvil_status_update_time instead of the
default 10m, to reduce the noise in the log.

Also look for log entries containing "limit exceeded:", which
indicates anvil throttled the client.  Note these messages don't
necessarily indicate abuse, rather it could be that client has a lot
of legit mail to deliver, and/or your limits are set too low.  If
you frequently see these from legit clients, raise your limits.



  -- Noel Jones

Reply via email to