I wonder how people on the list deal with joe job attacks?

  Right now I accept all incoming messages which are addressed to
 valid recipients on the domains I host *AND* all incoming bounces.

  Accepting bounces blindly means that I wake up to 3000 forced
 bounce messages at least once every three weeks.  Right now I
 "solve" this problem by filing all bounce messages into a dedicated
 bounce folder, via procmail.

  I've considered just DENYing bounces after a threshold; if more
 than X bounces for a given sender have been received in an hour
 just rejecting them.  That seems safe on the basis that if I typo
 an address it would only trigger one bounce from my sender address
 and that would be beneath the threshold.

  But at the same time that seems like a hack that is prone to failure,
 so I'd love to hear more useful suggestions.  (I guess the ultimate
 solution is to sign outgoing messages via one of the anti-bounce
 protocols - but I'm a little reluctant to go down that path due to
 the number of machines I'd need to update and the suspicion that
 I'd miss one or two.)

  FWIW the pattern seems to be addresses matching:

    [a-za-z]+[0-...@example.com

  To date I've never received a faked sender address which didn't end
 in a digit.  And for each incoming attack I average between 500 and
 5000 bounces typically addressed to less than ten fake addresses.

  (Which is why I think a simple count/period approach would be a
 useful countermeasure.)

Steve
-- 
Debian GNU/Linux System Administration
http://www.debian-administration.org/

Reply via email to