I wonder how people on the list deal with joe job attacks?
Right now I accept all incoming messages which are addressed to
valid recipients on the domains I host *AND* all incoming bounces.
Accepting bounces blindly means that I wake up to 3000 forced
bounce messages at least once every three weeks. Right now I
"solve" this problem by filing all bounce messages into a dedicated
bounce folder, via procmail.
I've considered just DENYing bounces after a threshold; if more
than X bounces for a given sender have been received in an hour
just rejecting them. That seems safe on the basis that if I typo
an address it would only trigger one bounce from my sender address
and that would be beneath the threshold.
But at the same time that seems like a hack that is prone to failure,
so I'd love to hear more useful suggestions. (I guess the ultimate
solution is to sign outgoing messages via one of the anti-bounce
protocols - but I'm a little reluctant to go down that path due to
the number of machines I'd need to update and the suspicion that
I'd miss one or two.)
FWIW the pattern seems to be addresses matching:
[a-za-z]+[[email protected]
To date I've never received a faked sender address which didn't end
in a digit. And for each incoming attack I average between 500 and
5000 bounces typically addressed to less than ten fake addresses.
(Which is why I think a simple count/period approach would be a
useful countermeasure.)
Steve
--
Debian GNU/Linux System Administration
http://www.debian-administration.org/