Am 15.11.2016 um 14:09 schrieb Volker Cordes:

Good afternoon Volker,
dear List.

We had a similar incident last year. What I then did was to parse the
logfiles on a daily basis to check where the logins occur from. We have a
customer base from Germany mainly (except business travelling people), so I
compiled a list of most probable ip ranges/dyn dialup domains, against whom
I grep -v the logfile entries and then get a mail each midnight of the ones
not matching those expectations.

I can see that geo blocking may be a solution, but with globally travelling
people it's not really an option. Same applies to a lot of changes of ips
(if they come from the same range, e.g. provider).

I know it's far from perfect, but from an 80:20 approach a good one. You can
probably put in (much) more effort to produce a maybe more reliable,
automated approch of some kind. And yes, it was a pure reactive measure and
ofcourse did not prevent setting off spams until we noticed (actually it
never happened since then, so I can't really tell)...

> Hello,
> 
> I just stopped our server from sending out spam mails. A password from
> one of our customers was hacked or somehow leaked so that the mails were
> sent by an authenticated user. Now I was wondering if it is possible to
> block users that authenticate themselves from a lot of different IP
> addresses in a short timespan or to implement blocking using
> geoip-services (99% of our customers are based in germany).
> 
> Thanks,
> Volker
> 
> 

===========================================================================
Note:  this message was  send by me *only* if the  eMail message contains a
correct pgp signature corresponding to my address at  flo...@floppy.org. Do
you need my  PGP  public key? Check out http://www.floppy.org or send me an
email with  the subject "send pgp public key" to  this address of mine.Thx!

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to