>Saturday, August 17, 2002 you wrote:
>LC> Dictionary spammers will typically open on SMTP session and then
>LC> send one msgs to 25 to 50 [EMAIL PROTECTED]
>
>     There must be some program they are trying to get around by
>     limiting the recipients like this.

Most MTA's have param to limit max RCPT TO per SMTP session.  I figure the 
spammers were hitting this too often, the ENTIRE session was being 
discarded by the recipient, so dropping to 25 "got under the radar" enough.

IMGate, as installed by me (not available in the config I give out for 
free), now includes capabilities to detect dictionary attacks, to blacklist 
the spamming ip's, and to reduce the errors per SMPT session to one, so 
after one error, IMGate immediately hangs up on the abuser, rather than 
passively returning a 5xx and expecting the sender to hang up.

>   This is definitely new to me.
>      Used to they'd just hit you with 1,000 or 2,000 rctp to's if
>      you'd let them but now they hit with 25 or so and quit.

yep, they've gotten more clever, but this particular advance wasn't rocket 
science.  I figure most spammers are as dumb as the are mean.  There was a 
Louisiana spammer in an article last week complaining that one year he made 
$12M spamming (hmm, if Darth Spammer calls on me, I'm going over to the 
Dark Side) but now he's down to $10K / week.

>      Plus the other thing they are doing is going right through the
>      secondary MX servers.

I always tell IMGate users to take IMail out of their MX records, since 
spammers hit all MX records, no matter what the MX preference value.

We are also seeing spammers scanning networks for SMTP service on port 25 
and spamming that.  So IMGate people need to block access to port 25 of 
their imail server.  They can use pop-before-smtp and send outbound through 
IMGate.

>LC> The next phase of IMGate will be to take the war from the SMTP
>LC> application level down to the tcp/ip protocol level where IMGate
>LC> will automatically
>
>     That's where it needs to be.

It's already there. Remember Dusty "ZZ Topper" Carden who used to help out 
here a lot a couple of years ago.  He runs 5 FreeBSD IMGate's and every one 
has ipfilter running with a list of 500+ blocked ip's.  Other IMGate users 
are also adding packet filtering to there boxes.

btw, I just installed an IMGate in Ohio last Thursday in front of a 
sendmail mailbox server.   To show you how nightmarish abuse has become, a 
few numbers from the its first day of operation:

Here is a partial list of the msg rejects per sending ip:

14748 24.232.148.6   <<<<<  fibertel.com.ar, we know you well
  6584 202.106.101.26
  6584 202.106.101.26
  2272 218.145.227.94
   841 64.86.155.135
   804 206.222.1.5
   798 203.154.95.135
   676 202.134.0.198
   653 64.27.167.226
   613 216.247.70.245
   516 64.251.23.133
   486 24.202.135.96
   462 168.234.193.154
   451 4.37.106.187
   415 200.69.220.189
   408 167.206.112.85
   388 209.25.238.162
   380 66.33.48.49
   318 67.36.239.193
   303 66.180.247.22
   300 151.197.50.222
   293 203.177.73.229
   285 200.72.23.50
   283 66.180.247.21
   282 66.134.56.234
   276 216.144.69.91
   276 168.103.197.139
   275 217.10.215.134

.. etc, etc, for 100's of lines

For these totals:

Grand Totals
------------
messages

    96534   received
    27735   delivered
        0   forwarded
      475   deferred  (4592  deferrals)
     2646   bounced
   115630   rejected  <<<<<<<<<<<<<!!!!!!!!

The categories of rejects break down like this:

       2 RBL dialups.relays.osirusoft.com
       6 RBL orbs.dorkslayers.com
      10 ACL from_senders_bogus
      13 SMTP invalid [EMAIL PROTECTED]
      44 RBL sbl.spamhaus.org
      49 SMTP invalid [EMAIL PROTECTED]
      75 RBL korea.services.net
      77 Other (ip's blacklisted for pipelining)
      85 RBL rbl-plus.mail-abuse.org
      90 ACL unauthorized relay
      99 ACL mta_clients_relay
     140 SMTP unauthorized pipelining
     218 RBL dynablock.wirehub.net
     286 ACL mta_clients_dict  blacked for dictionary attacks
     326 ACL body checks  mostly KLEZ
     399 SMTP Bad HELO   $domain, localhost, localhost.localdomain
     451 RBL proxies.relays.monkeys.com
     535 ACL from_senders_nxdomain
     755 DNS timeout for MTA PTR hostname (forged @sender.domain)
    1189 ACL to_recipients_dead  sending to dead accoutns
    1489 ACL mta_clients_hel  exceeded Hard Error Limit in one session
    1575 ACL header checks
    2256 RBL relays.ordb.org
    2637 RBL relays.osirusoft.com
    2859 DNS nxdomain for MTA PTR hostname (forged @sender.domain)
    3220 ACL from_senders_black
    3703 RBL blackholes.wirehub.net
    3845 ACL mta_clients_slet
    5016 ACL mta_clients_dead
    5301 DNS no A/MX for @sender.domain
    5567 ACL mta_clients_rbl
    6153 RBL bl.spamcop.net
    9685 ACL from_senders_clueless
   24253 ACL mta_clients_bogus
   26244 ACL from_senders_slet

I won't take the time/space to explain all those categories, just take it 
on board that anti-abuse battles are fought on an all-azimuth, multi-front 
war.

Arnold IMGatenegger sadistically likes to take them out in as many ways 
possible.  :))

Len

__________________________________________________________________
www.menandmice.com/DNS-training : DNS Training
BIND8NT.MEIway.com : ISC BIND for NT4 & W2K
IMGate.MEIway.com  : Build free, hi-perf, anti-abuse mail gateways


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to