Am Mon, 5 Dec 2016 20:52:21 -0500
schrieb Alex <mysqlstud...@gmail.com>:

> Hi,
> 
> I have a postfix-3.0.5 system with a few hundred users. They have
> access to submission, webmail, and dovecot to send and receive mail.
> 
> On occasion, user's local desktop are compromised, and with it their
> account on this system. This leads to their local desktop using the
> submission service to send hundreds or thousands of spam emails
> through this compromised account.
> 
> They're only stopped after the user receives a ton of bounce messages,
> or we happen to see it somehow while watching logs.
> 
> What mechanisms are available to say, control the number of messages
> sent per day or otherwise be made aware of a pattern of messages being
> sent by an account that could be indicative of account compromise?
> 
> Thanks,
> Alex

Hi Alex,

I use a policy deamon that registers every mail that is sent by our
servers. The metadata is stored in a SQL Database. Every two minutes
a cronjob is run which checks the metadata for which sasl_sender has
send how many mails. If a sasl_sender surpasses a certain threshold the
cronjob automatically blocks this user in our LDAP so that he can't
submit any more mails.

Reply via email to