Hi Alice,

On Sun, May 1, 2016, at 08:44 AM, Alice Wonder wrote:
> If the IP is on a blacklist I use, I just let the blacklist deal with it via 
> reject.

Generally, I do too.  TBH, it's those new-not-yet-on-a-list IPs that got my 
attention on this.

>  I'm somewhat conservative with the blacklists, many of them 
> are too aggressive with adding IP addresses that aren't actually 
> spammers, and that's bad in my opinion.

I agree with the opinion.  My experience has been few-to-zero FPs.  I 
understand that's partly luck.

> If the IP is not on a blacklist but I have received multiple spam from 
> it in short period, I just block the IP the firewall - but only for 
> three days. If it happens again then I firewall that IP for a week.

I've put in place Fail2ban for just such instances.  Tho, I'm mulling over the  
how-many-per-time policy that works best for me.

> I prefer firewall because if an IP is acting badly, it may be hacked and 
> may try compromising other services I run.

Fair point, tho the rest of my firewall is already pretty tight.

> Everything else I just let SpamAssassin assign a score to and let the 
> user receiving it filter how they see fit.

For the stuff that gets that far, agreed.

> Interestingly, I have one server fairly recently set up that breaks the 
> rules by only allowing TLS connections.
> 
> So far that has done an amazing job at preventing these mass mailers 
> from even connecting, with only a few legitimate connections rejected 
> (stuff like some wordpress blog notifications set up to use qmail with 
> no TLS have been rejected)
> 
> Of course it probably won't be too long until the mass mailers start 
> using TLS, but I'm enjoying the lower spam volume in the present ;)

I've come across that approach more and more.  Definitely possible to cause a 
lot of breakage -- so not an option for the big ISPs I suppose -- but for 
smaller, company & personal servers, I've been reading a bunch of "well worth 
the risk" sort of comments.

> For restrictions that are not IP based - I believe reject is better on 
> the off chance that the filters are wrong and it is false positive.
> That way the sender can notify me of a problem. With just discard, they 
> don't know it never got to where it is going.

I have some helo checks, etc that are, in my book, "definites", but I get your 
point.

> It's just data, it can't act by itself, so yes it is safe to accept the 
> whole thing and trash it.

That's fair re: the safety part; only other issue, I suppose, is the 
performance/load of accepting a 'large' message.

> You can't scan the payload with your malware checker if it isn't there, 

Yep

> but if you are so confident an IP is sending you bad stuff like that - 
> just firewall the IP to prevent it from trying to exploit other services 
> you have running.

Thinking about it, REJECT as policy, with Fail2Ban for the nastier stuff seems 
like a good mix.

> In my opinion. Which others may have valid disagreements with.

Appreciated! That's what I was asking for.

Jason

Reply via email to