On 22 Oct 2016, at 14:30, Paul Schmehl wrote:
--On October 22, 2016 at 1:51:12 PM -0400 Bill Cole
<postfixlists-070...@billmail.scconsult.com> wrote:
On 22 Oct 2016, at 12:19, Paul Schmehl wrote:
I would make one suggestion. I would reject the attempt silently.
No
sense in tipping off the spammer to what he needs to do to work
around
it. Just use REJECT with no explanation.
That's a nice hypothesis but it doesn't seem to play out in reality.
I've
been emitting specific (and yes, sometimes snarky) rejection messages
on
a variety of systems for all sorts of access rules, in part so I can
keep
track of what rules are being hit easily. I have never seen any hint
that
spammers behaving in grossly fraudulent ways (like EHLO arguments
that
claim to be the server they're talking to) substantively change their
behavior in response to those messages. Keep in mind that essentially
ANY
idiosyncratically wrong EHLO argument seen only from spammers has
been
configured intentionally by someone who has no idea how cheap,
simple,
and reliable it is to reject spam on that basis. These are
cognitively
impaired spammers, not smart ones. The smart ones try very hard to
look
very normal and legitimate, not to stand out as something starkly
different from any legitimate mail.
And you don't think this spammer fits into the latter category? He's
clearly doing something very clever that is not the usual brute force
cram-it-down-your-throat spam run.
Not so much. Spambots have been doing authenticated port 587 submission
for a dozen years. It's easier to do in volume today because there have
been huge sever-side compromises of auth credentials and uncountable
hordes of PC's infected with information-thief malware of one sort or
another. Finding a working account & password is done by brute force
now, with bots testing known pairs against a server until one matches.
For example, last week I had a bot test auth for a dozen different
"tagged" addresses against my IMAP, POP3, and submission servers on 2
IPs (primary and secondary MX records, both actually on the same host)
within less than 2 minutes. All of those addresses were given in
supposed confidence to exactly one commercial entity each, most of whom
have had publicized breaches in recent years. They've automated
targeted account compromise.
So sure: you could put an unexpressive unique ID into each REJECT rule
instead of a clear(ish) explanation. They would make their catches
trackable in logs but keep the spammer from knowing exactly why a
rejection happened. It's just not clear that it matters. They are doing
something pointless that makes them easy to catch and they have
automated every aspect of their spamming.