Am 07.06.2014 09:59, schrieb Kai Krakow:
> Hello list!
> 
> Is there a way to prevent postfix from offering SASL auth (and that 
> includes 
> denying open relaying) to clients based on DNS RBL lookups? I've discovered 
> the option smtpd_sasl_exceptions_networks which allows to do that by adding 
> static subnet entries or adding a hash map.
> 
> The idea goes like this:
> 
>   * SASL auth is not offered -> no way to relay mail
>   * based on a DNS-RBL that lists ASs with known bad behavior
>   * based on a DNS-RBL that lists IPs which are known to run compromised
>     servers
> 
> I imagined a configuration like this:
> 
> smtpd_sasl_exceptions_networks =
>     reject_rbl_client z.mailspike.net=127.0.0.2
>     reject_rbl_client dnsbl-3.uceprotect.net
> 
> Apart from this maybe being a bad idea, it would open the possibility to 
> react to distributed brute force attacks and compromised passwords if an 
> appropriate DNS BL could be offered by someone.
> 
> Currently, I'd like to try out the idea but I'm not sure if the above 
> configuration accepts passing in DNS BLs. Any suggestions?
> 
> What could be the consequences of this? I'm interested in reading more 
> ideas. Maybe there's already another approach to successfully prevent bots 
> from using compromised mail user accounts?
> 
> 
> I outlined the same question here:
> http://serverfault.com/questions/602327/postfix-offer-sasl-authentication-based-on-rbl
> 

bad idea, perhaps good idea if you have your own rbl to sync brute
forcers ips to other servers

perhaps you like or get inspired by this

https://sys4.de/de/blog/2014/03/27/fighting-smtp-auth-brute-force-attacks/





Best Regards
MfG Robert Schetterer

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein

Reply via email to