Am 06.01.2014 17:45, schrieb Simon B:
> 
> On 6 Jan 2014 17:41, <post...@pupat-ghestem.net
> <mailto:post...@pupat-ghestem.net>> wrote:
>>
>> On 1/6/2014 5:32 PM, Mike McGinn wrote:
>>>
>>> On Monday, January 06, 2014 10:12:38 Roland Plüss wrote:
>>>>
>>>> A couple of days ago my mail server got attacked by a spammer. As it
>>>> looks like he managed to compromise the password of one of the users on
>>>> the system and SASL authenticated using the account to send spam. I
>>>> blocked the attacking IP and changed the password of the affected user.
>>>> Still the spammer managed to send out quite a lot of mails because due
>>>> to permit_sasl_authenticated letting him pass by. Now to deal with this
>>>> situation in the future I would like to automatically lock down an
>>>> account if an unusual amount of mails are sent like 60 per minute or so.
>>>> I could though not figure out if postfix is able to do this or how to
>>>> get this done. Any ideas?
>>>
>>> Welcome to the club.
>>> I had an account get compromised on Christmas Day and got my server
>>> blacklisted. Changed the password.
>>>
>>> Now in my dovecot logs I see login for this account from various IP
> addresses
>>> in Russia and the former Soviet republics. These seem to be from some
> sort of
>>> botnet as they come in bursts from different IP addresses. I have
> been adding
>>> the CIDRs for these networks to my firewall as they show up.
>>>
>>> I am not a mail guy, but I find knowing how to use a firewall comes
> in handy.
>>>
>> I use fail2ban to block bots trying to guess passwords. Any IP that
> enters a wrong password more than a certain number of time is banned for
> 10 minutes. Any such IP that gets banned too much this way gets banned
> for a week.
>>
>> I get attempts from pretty much all over the world (US, Europe,
> Russia, China, India, ....)
> 
> Lately I've seen botnets get wise to this.
> 
> I have one from Comcast that makes one attempt every 35 minutes.  Which
> means it never gets blocked.  But it will also take him millions of
> years to get lucky...
> 
> Simon
> 

off topic, my last geoip spambot analyse

http://sys4.de/de/blog/2014/01/05/spambot-auswertung-mit-geoip/

and my blocking method

http://sys4.de/de/blog/2012/12/28/botnets-mit-rsyslog-und-iptables-recent-modul-abwehren/

sorry german only, but how it works should be understandable anyway


Best Regards
MfG Robert Schetterer

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Axel von der Ohe, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein

Reply via email to