Hello all,

Talking about the customer outgoing SMTP servers, where customers connect and are forced to SMTPAuth before they can send mail out to the Internet. We use LDAP for SMTPAuth verification.

Occasionally, a customer account is compromised, and used for sending large volumes of spam.

We have a system in place that detects this, and immediately sets the LDAP "accountStatus" to "disabled".

However, quite often the 3rd party involved uses software that can use pipelining, and simply keeps sending mail, even though the SMTPAuth account has been stopped.

Naturally, we can simply restart Postfix, thereby dropping all connections and forcing SMTPAuth again. But this is rather undesirable, and unattractive.

Are there other solutions to consider?

Can we add something similar to the "smtpd_client_restrictions" or "smtpd_recipient_restrictions", and adding a new rule-entry which would simply confirm that the "SMTPAuth LDAP 'user' used way back, is still accountStatus=enabled" ?

Or, can we set a maximum limit on number of pipelining emails allowed, say, 50, that at least we still have the spammers get cut off, but retain the efficiency of pipelining.

Should we simply disable pipelining on the SMTP clusters? Customers "probably" are not negatively affected by this setting.



--
Jorgen Lundman       | <lund...@lundman.net>
Unix Administrator   | +81 (0)3 -5456-2687 ext 1017 (work)
Shibuya-ku, Tokyo    | +81 (0)90-5578-8500          (cell)
Japan                | +81 (0)3 -3375-1767          (home)

Reply via email to