On 05/01/2016 07:20 AM, jaso...@mail-central.com wrote:
I'm clear this has been asked a gazillion times; feels like I've now read half 
the posts.

For incoming mail that matches with high-confidence a known bot/mass-mailer 
restriction, is it 'best' to

   DISCARD or REJECT?

If the IP is on a blacklist I use, I just let the blacklist deal with it via reject. I'm somewhat conservative with the blacklists, many of them are too aggressive with adding IP addresses that aren't actually spammers, and that's bad in my opinion.

Unfortunately that means I still get a lot of spam.

If the IP is not on a blacklist but I have received multiple spam from it in short period, I just block the IP the firewall - but only for three days. If it happens again then I firewall that IP for a week.

I prefer firewall because if an IP is acting badly, it may be hacked and may try compromising other services I run.

Everything else I just let SpamAssassin assign a score to and let the user receiving it filter how they see fit.

That's the way I handle it, may not be best

-=-

Interestingly, I have one server fairly recently set up that breaks the rules by only allowing TLS connections.

So far that has done an amazing job at preventing these mass mailers from even connecting, with only a few legitimate connections rejected (stuff like some wordpress blog notifications set up to use qmail with no TLS have been rejected)

Of course it probably won't be too long until the mass mailers start using TLS, but I'm enjoying the lower spam volume in the present ;)

-=-

For restrictions that are not IP based - I believe reject is better on the off chance that the filters are wrong and it is false positive.

That way the sender can notify me of a problem. With just discard, they don't know it never got to where it is going.

> But, for bots that are sending nasty -- and sometimes large --
> attachment payloads, is is wise/safe to let that attachment etc. onto
> my server at all?  even if it's gonna get trashed?

It's just data, it can't act by itself, so yes it is safe to accept the whole thing and trash it.

You can't scan the payload with your malware checker if it isn't there, but if you are so confident an IP is sending you bad stuff like that - just firewall the IP to prevent it from trying to exploit other services you have running.

In my opinion. Which others may have valid disagreements with.

Reply via email to