[Mimedefang] dictionary attacks looking for a valid user

Steffen Kaiser skmimedefang at smail.inf.fh-bonn-rhein-sieg.de
Fri Dec 16 03:33:13 EST 2005


On Thu, 15 Dec 2005, David F. Skoll wrote:

> Jan Pieter Cornet wrote:
>
>> An easier solution might be to have a process tail(1) your logfile and
>> take action on the information there. I think I've even seen something
>> like that: more than x invalid recipients, and you're firewalled away.
>
> That's much easier.  I have a script I run for a similar purpose:  It
> firewalls off anyone who attempts to log in via SSH with an invalid
> password.  There are lots of SSH brute-forcers around.

After reading these two paragraphes some worrying struck me:

In opposite to SSH connections you cannot assume that the attacker sits on 
"the other side" of a SMTP communication. Maybe the server just relays 
the mail or is an huge mail hoster (say, hotmail, gmail, aol), you cannot 
firewall them off, just because one Black Sheep is abusing the service?!
Will you really try to differ between home/zombie senders and huge relay 
systems, esp. because you do not have no headers to take into account?

Actually, there was a patch for sendmail posted to comp.mail.sendmail for 
a feature "drop connection if number of bad recipients exceeds n". 
http://groups.google.com/group/comp.mail.sendmail/browse_thread/thread/5203bd02a5d9f8f3

Bye,

-- 
Steffen Kaiser


More information about the MIMEDefang mailing list