On Thu, Mar 14, 2013 at 11:47:18AM +0000, Elaconta.com Webmaster wrote:
> Elaconta.com Webmaster wrote:
> >Benny Pedersen wrote:
> >>Elaconta.com Webmaster skrev den 2013-03-14 11:48:
> >>
> >>>Specifically, if a user sends 100 emails and more than 25 of those
> >>>are send to non-existing users, disable email relaying for that user
> >>>for half an hour, for instance.
> >>
> >>i say reject_unverified_recipient one more time
> >>
> >>should i give links to pypolicyd-spf ?
> >>
> >>sending 100000000 emails does change spf records ?
> >>
> >>if you want another way of solving use rsyslog with sql query
> >>from tempfails/hardfails on random recipient domains, and from
> >>that sql logs block that sender local that spammed to it,
> >>impossible to use reject_unverified_recipient or just ignoreing
> >>the problem ?

> >I'll look into reject_unverified_recipient, thanks for your 
> >insight.

That's abusive toward other sites. I wouldn't recommend that.

> Also for more clarification: We require authentication for all of 
> our email users, and have hourly email sending quotas in place.

I don't think your quotas are strict enough, and rather than being 
renewed hourly, perhaps it should be a one-time trigger to block all 
further sending by those credentials. Bear in mind that these aren't 
your users sending mail to their friends -- this is malware which has
seized your users' machine and is using their stored credentials to 
spew spam to victims. Yes, you will inconvenience your users, but 
surely their malware has violated their ToS? (Rewrite your ToS if 
necessary. Hold users accountable for such abuse.)

> But there's nothing stopping auth'ed users from sending emails to
> lots of non-existent users, and that affects the email server's
> reputation negatively.

Once abuse has occurred, you can bet more will follow. Don't allow 
spew to continue.

> Hence our trying to reduce to amount of emails send to non-existent 
> emails.

I think you'd also find that URIBL content filtering of submitted 
mail very effective. This malware almost always tries to get victims 
to look at spammy links.
-- 
  http://rob0.nodns4.us/ -- system administration and consulting
  Offlist GMX mail is seen only if "/dev/rob0" is in the Subject:

Reply via email to