[EMAIL PROTECTED] wrote:
> I have a FreeBSD machine running qmail, SpamAssassin and ClamAV.  The machine 
> is receiving 200,000 e-mail messages per day, courtesy of Rumpelstiltskin 
> attacks from thousands of different IP addresses each day, and SpamAssassin 
> appears to be overwhelmed.  I have about 50,000 e-mail messages in my qmail 
> queue and the queue is growing by more than 1,000 e-mail messages per hour.  
>
> I want to temporarily disable SpamAssassin to free up enough resources to let 
> the mail queue clear.  How do I do that?  
>
> If anyone knows how to temporarily disable ClamAV too, I'd be ecstatic to 
> learn how to do that too.  
>
> I've read Life with qmail and the SpamAssassin documentation at 
> http://spamassassin.apache.org/ but I'm not connecting the dots.  
> Unfortunately, I didn't set up this machine and I don't have a good grasp of 
> qmail, SpamAssassin and ClamAV.  
>
> Thanks in advance for any guidance and all practical suggestions you can 
> offer.  
>   
First: I know very little about qmail setups. I find qmail very
difficult to keep track of due to the large number of third party
patches that "everyone" seems to use.

Well, the exact method of disabling spamassasin is going to depend on
exactly how SA was "connected" to qmail in the first place.. 

>From what I recall, some folks directly add it to the qmail-queue
process (using a patch to cause this to happen in the first place). You
might want to look at your QMAILQUEUE environment variable, and see what
it points to. Check to see if that's pointing to spamassassin, spamc, or
some script that calls one or the other. From there, modifying that
script, or re-pointing it to one that doesn't call SA, should disable SA.


After you get your queue cleared, your first priority should be fixing
your qmail to not blindly accept all messages and validate recipients at
the time of the SMTP RCPT TO: command like a sane MTA.

Blind accepting is going to cause you permanent problems due to the
common nature of Rumpelstiltskin attacks. Also, all the misdirected
bounces your server generates as a result are likely to get you
blacklisted in spamcop.

Again, I'm no qmail expert, but spamcop does have some advice pointing
to patches that try to fix qmail's default "accept everything and sort
it out after it's been queued" behavior.

http://spamcop.net/fom-serve/cache/329.html


Yes, the really simple accept-everything approach is part of why DJB can
claim qmail is hard to exploit for code execution. If there's very
little code involved in the SMTP connection handling, there's less code
to try to exploit. Unfortunately, this design also makes it really easy
to abuse to DoS the qmail server or abuse it to perform mail-bounce
attacks on everyone else. Such attacks are really common as an accident
of modern spamming practices, so patching qmail so it no longer does
this is critical to making your mailserver survive.

>
>
>   

Reply via email to