I have an outgoing-only mail server for our customers called
smtp.lightlink.com.  It only allows relaying from local IP's,
and known virtual domains if remote users wish to use it.

We were fine when we were running pop before smtp authentication, but I was forced to also allow SASL authentication.

More and more people are having their passwords compromised, I have no idea how it happens, one person had it compromised twice in one day after I changed it the first time.

There are no false tries on the user account, until the spam starts coming in with the correct password, then its 64,000 pieces of mail forever and ever until I stop it.

    So one, how are passwords being compromised with out brute force
attacks showing up on the server?

    What do I do to catch this in the bud?

    1.) I have a barracuda which I could use as a smart out-going host
from smtp.lightlink.com.

It will quarantine and rate limit, but it won't tell me what's going on unless I look, it won't stop the spam, and it blocks and can not handle those that wish to send large mailings legitmately through smtp.lightlink.com. It just clogs up and slows WAY down. Besides I hate barracuda.

    3.) Are there ways in postfix to detect the abuse, and close
the account?  Or what?  White papers?  Pointers to RTFM?

4.) Perl, write my own perl code and count the SASL's coming in and lock the account when it does something stupid?

    It's happening about once or twice a month now and our mail
server usually gets blacklisted every time it does.

    Thanks in advance,

    Homer W Smith
    CEO Lightlink, aka still a stupid newbie after 20 years...

------------------------------------------------------------------------
Homer Wilson Smith   Clean Air, Clear Water,    Art Matrix - Lightlink
(607) 277-0959       A Green Earth, and Peace,  Internet, Ithaca NY
ho...@lightlink.com  Is that too much to ask?   http://www.lightlink.com

Reply via email to