Thanks again to all who respond to my questions.

I am still seeing a high number of continuous
connections of RCPT TO emails.  I'm assuming that its
our wonderful bots out there having as much fun as
then can cause.

My question is this;
Tarpitting is removed from the latest invocation of
the toaster (I assume) in lieu of greylisting.  But
I've seen information that says that if there is a
slight 1 second or 2 second delay on the SMTP
connection that a BOT might label you as too slow for
them and move on.

To be honest, with the latest version of toaster, when
you connect to port 25 its immediate.  WAY to fast if
you ask me.

Is there a way to slow this down to thwart some of the
bot connections?


I am also assuming the following is what happens when
a connection is made: (roughly that is)

1) sockets open via qmail-smtpd
2) chkuser validates user, if no user, dropped or
bounced (I prefer bounced)at MTA level.
3) if accepted, greylisting then spam checking
4) delivery of message.

on step 2,  with CHKUSER working perfectly,  I've
noticed that many of the connections are almost
dictionary attacks.
Example:  [EMAIL PROTECTED]
          [EMAIL PROTECTED]
          etc.

CHKUSER IS bouncing them and qmail-spamt is creating a
directory for the IP address. (taken fromt he default
information in documentation (someplace)
SPAMT configuration file:

::1501:120000::1000::::
.

But sometimes the connections keep flying in. 
Again, I've read from research done, that the BOTS
**ARE** looking for fast SMTP connections.

Doesn't this quick connection authentication and
dropping actually cause more dammage than good?

Maybe I'm missing something and will gladly post
configuration files as requested.

ONE last thing,
I knoe its a pain but with a DNS caching server on
each external machine (in a cluster) that is an MX for
a domain, DNS lookups are rather quick.
Isnt't here a way to ONLY accept email/connections
from VALID DNS lookups?

Case in point:
I am seeing a LOT of  .local domain names that are
just NOT valid domain names.  In many cases its the
name given from a box that is infected.  I am assuming
this because many of the .local names are machine
names and/or user names.
Example:
from <::> remote <rme-srv-10.RME.local:unknown:[IP
REMOVED TO PROTECT INNOCENT]> rcpt <> 

When you do a lookup on the IP address the names do
NOT match.  Why can't we bounce or drop these
connections that are NOT matching ?

Yeah I know, many DNS managers do not keep up with the
reverse names, etc etc etc.  So what?  I think I'd
rather ONLY get emails from VALID forward and backward
lookup machines and MX servers than bogus ones.

Thanks for any information and help.

Nitch.


 
____________________________________________________________________________________
Finding fabulous fares is fun.  
Let Yahoo! FareChase search your favorite travel sites to find flight and hotel 
bargains.
http://farechase.yahoo.com/promo-generic-14795097

Reply via email to