Re: [spamdyke-users] My logfile parser (Script)
Sure will, so here we go. Attached a modified qmlog script that can be run with the "-c" option to add colored output for most log entries in Qmail Toaster. If something is missing or doesn't match correctly it will have the FIXME tag before the line. When running in color mode less output will be disabled. Thanks for pointing the script out, will use that one now since I added the colors to it :D Maybe even recreate the output and remove the log file look with a tabled output. It's written on Bash 3.0.15 again, but with minor changes to the filters it can be easily ported to higher versions of Bash too (tried it out, but didn't finish the rewrite since I am running only 3.0.15 servers). Try it out on your system and let me know what you think! Cheers, Sebastian PS: Yay to Fridays! Eric Shubert wrote: Thanks. I'm sure you'll keep us posted! :) Sebastian Grewe wrote: After checking out the code in that script I think it might be easier for me to just start on my script and extend it's functionality to look for all lines in those logfiles instead of just spamdyke. I will see what I can do. Cheers, Sebastian Eric Shubert wrote: Sorry to say that I haven't had a chance to check out your script yet, Sebastian. :( Speaking of colored and filtered qmail logfiles though, there's a nice 'qmlog' script at qtp.qmailtoaster.com (part of the qmailtoaster-plus package). It allows easy viewing and searching of qmail (et al) logs. I'm wondering if your 'coloring and filtering' might be a nice enhancement to that script. Care to have a look into it? Sebastian Grewe wrote: I totally forgot about that - but I am not using the script to block them forever, just to monitor qmail when a large amount of connections is coming in (which happens ever so often). Even so I did turn off the blocking feature since qmail handles it just fine and connections clear up after a while. I was just concerned that legitimate e-mail wouldn't be coming through - but since they try to resend if no connection could be established that's not a concern anymore. So yeah, I use it to see what's being blocked and for what reason - even added whitelist matches now. It's basically just colored and filtered output of your qmail logfiles now :D Cheers, Sebastian Otto Berger wrote: you could also use fail2ban for that. You just have to specify a custom rule ("filter") for the spamdyke-log output. Then the sender ip will be released after a specified timeframe and not blocked forever ;). (IMHO it is still not a very good idea to block by firewall) Otto Sebastian Grewe schrieb: Hey Guys, I have been working on a simple bash script that will read from it's standard input and presents some statistics from the logfile in realtime (when used with "tail -f .." ). After a few days that we have been attacked by spambots I got curious how to avoid these things in the future. The script we use is able to count the denied connections per IP and, if desired, adds this IP to the Firewall to reject incoming connections (brutal, I know). As the firewalling is optional you might still be interested in it to run just to see what's going on. It's written for BASH 3.0.15 but with a little change in the pattern matcher it runs on higher versions too. To start it in live mode run it like this: tail -f /var/log/qmail/smtp/current | qmail_parser.sh and if you just want to scan some files and see what happened to this: cat /var/log/qmail/smtp/* | qmail_parser.sh Since it's BASH it's not very good when it comes to performance but does the trick well when used with "tail". Also it's not catching everything (yet) since I was looking for only some very specific lines in the logfile. Anyhow, try it out and tell me what you think - attached the current script to this mail. Cheers, Sebastian ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users #!/bin/bash # # Copyright (C) 2006-2008 Eric Shubert # # Utility for listing/searching qmail log files # Original script by Fabio Olaechea # # Future Enhancements # .) find .sed file w/out hard coded path # # # Change Log # 02/27/09 sebastian - added colored output function # 04/05/08 shubes - changed `` to $() # 10/17/07 shubes - fixed -t option # 12/17/06 shubes - added sed, grep, date/time parameters # 11/24/06 shubes - restructured, added numerous capabilities # 11/21/06 shubes - added -f option, thanks to phi...@ows.ch #
Re: [spamdyke-users] My logfile parser (Script)
Thanks. I'm sure you'll keep us posted! :) Sebastian Grewe wrote: > After checking out the code in that script I think it might be easier > for me to just start on my script and extend it's functionality to look > for all lines in those logfiles instead of just spamdyke. > > I will see what I can do. > > Cheers, > Sebastian > > Eric Shubert wrote: >> Sorry to say that I haven't had a chance to check out your script yet, >> Sebastian. :( >> >> Speaking of colored and filtered qmail logfiles though, there's a nice >> 'qmlog' script at qtp.qmailtoaster.com (part of the qmailtoaster-plus >> package). It allows easy viewing and searching of qmail (et al) logs. >> I'm wondering if your 'coloring and filtering' might be a nice >> enhancement to that script. Care to have a look into it? >> >> Sebastian Grewe wrote: >> >>> I totally forgot about that - but I am not using the script to block >>> them forever, just to monitor qmail when a large amount of connections >>> is coming in (which happens ever so often). Even so I did turn off >>> the blocking feature since qmail handles it just fine and connections >>> clear up after a while. I was just concerned that legitimate e-mail >>> wouldn't >>> be coming through - but since they try to resend if no connection could >>> be established that's not a concern anymore. >>> >>> So yeah, I use it to see what's being blocked and for what reason - even >>> added whitelist matches now. >>> >>> It's basically just colored and filtered output of your qmail logfiles >>> now :D >>> >>> Cheers, >>> Sebastian >>> >>> Otto Berger wrote: >>> you could also use fail2ban for that. You just have to specify a custom rule ("filter") for the spamdyke-log output. Then the sender ip will be released after a specified timeframe and not blocked forever ;). (IMHO it is still not a very good idea to block by firewall) Otto Sebastian Grewe schrieb: > Hey Guys, > > I have been working on a simple bash script that will read from it's > standard input and presents some statistics from the logfile in realtime > (when used with "tail -f .." ). > After a few days that we have been attacked by spambots I got curious > how to avoid these things in the future. The script we use is able to > count the denied connections > per IP and, if desired, adds this IP to the Firewall to reject incoming > connections (brutal, I know). As the firewalling is optional you might > still be interested in it to run just > to see what's going on. > > It's written for BASH 3.0.15 but with a little change in the pattern > matcher it runs on higher versions too. To start it in live mode run it > like this: > > tail -f /var/log/qmail/smtp/current | qmail_parser.sh > > and if you just want to scan some files and see what happened to this: > > cat /var/log/qmail/smtp/* | qmail_parser.sh > > Since it's BASH it's not very good when it comes to performance but does > the trick well when used with "tail". Also it's not catching everything > (yet) since I was looking for only > some very specific lines in the logfile. Anyhow, try it out and tell me > what you think - attached the current script to this mail. > > Cheers, > Sebastian > > > > > ___ > spamdyke-users mailing list > spamdyke-users@spamdyke.org > http://www.spamdyke.org/mailman/listinfo/spamdyke-users > > ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users >> >> -- -Eric 'shubes' ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] My logfile parser (Script)
After checking out the code in that script I think it might be easier for me to just start on my script and extend it's functionality to look for all lines in those logfiles instead of just spamdyke. I will see what I can do. Cheers, Sebastian Eric Shubert wrote: > Sorry to say that I haven't had a chance to check out your script yet, > Sebastian. :( > > Speaking of colored and filtered qmail logfiles though, there's a nice > 'qmlog' script at qtp.qmailtoaster.com (part of the qmailtoaster-plus > package). It allows easy viewing and searching of qmail (et al) logs. > I'm wondering if your 'coloring and filtering' might be a nice > enhancement to that script. Care to have a look into it? > > Sebastian Grewe wrote: > >> I totally forgot about that - but I am not using the script to block >> them forever, just to monitor qmail when a large amount of connections >> is coming in (which happens ever so often). Even so I did turn off >> the blocking feature since qmail handles it just fine and connections >> clear up after a while. I was just concerned that legitimate e-mail >> wouldn't >> be coming through - but since they try to resend if no connection could >> be established that's not a concern anymore. >> >> So yeah, I use it to see what's being blocked and for what reason - even >> added whitelist matches now. >> >> It's basically just colored and filtered output of your qmail logfiles >> now :D >> >> Cheers, >> Sebastian >> >> Otto Berger wrote: >> >>> you could also use fail2ban for that. You just have to specify a custom >>> rule ("filter") for the spamdyke-log output. Then the sender ip will be >>> released after a specified timeframe and not blocked forever ;). >>> >>> (IMHO it is still not a very good idea to block by firewall) >>> >>> Otto >>> >>> Sebastian Grewe schrieb: >>> >>> Hey Guys, I have been working on a simple bash script that will read from it's standard input and presents some statistics from the logfile in realtime (when used with "tail -f .." ). After a few days that we have been attacked by spambots I got curious how to avoid these things in the future. The script we use is able to count the denied connections per IP and, if desired, adds this IP to the Firewall to reject incoming connections (brutal, I know). As the firewalling is optional you might still be interested in it to run just to see what's going on. It's written for BASH 3.0.15 but with a little change in the pattern matcher it runs on higher versions too. To start it in live mode run it like this: tail -f /var/log/qmail/smtp/current | qmail_parser.sh and if you just want to scan some files and see what happened to this: cat /var/log/qmail/smtp/* | qmail_parser.sh Since it's BASH it's not very good when it comes to performance but does the trick well when used with "tail". Also it's not catching everything (yet) since I was looking for only some very specific lines in the logfile. Anyhow, try it out and tell me what you think - attached the current script to this mail. Cheers, Sebastian ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users >>> ___ >>> spamdyke-users mailing list >>> spamdyke-users@spamdyke.org >>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >>> >>> > > > ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] spam analysis
I've found that using DynDNS services along with a regular dynamic address is more affordable than going the static IP route (no pun intended). Such a service level is adequate for most SMBs, but not appropriate for mission critial environments. Joe Canner wrote: > Sorry, I ignored the first part of your post. Our mail server is already > in-house with a static IP. However, the outbound mail service idea may be a > useful way to approach this problem. If it gets worse and the ISP doesn't > do anything about it, that may be worth investigating. > > -Original Message- > From: spamdyke-users-boun...@spamdyke.org > [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Eric Shubert > Sent: Friday, February 27, 2009 15:40 > To: spamdyke-users@spamdyke.org > Subject: Re: [spamdyke-users] spam analysis > > A possible solution to this problem is to bring your mail server > in-house, and/or use an affordable outbound mail service such as > DynDNS's Mailhop Outbound. If you don't have a static IP address > in-house, DynDNS's CustomDNS service solves that problem affordably. > > Disclaimer: I'm not associated with DynDNS, but I do use and recommend > their services. > > Joe Canner wrote: >> Yes, Level 1 protection seems reasonable. We passed level 1 but failed >> level 2 and 3 because of other clients using our ISP. I've only had one >> recipient so far block us because of this, but I fear this might be just > the >> beginning. >> >> I agree that ISPs should take some responsibility for their clients' spam. >> I hope our ISP will respond to our complaint. >> >> -Original Message- >> From: spamdyke-users-boun...@spamdyke.org >> [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Kulkarni > Shantanu >> Sent: Friday, February 27, 2009 14:44 >> To: spamdyke users >> Subject: Re: [spamdyke-users] spam analysis >> >> yes, but i use their level 1 protection. level 2 & 3 are indeed >> aggressive. but i am also of the opinion that isps are partly responsible >> for their clients using their bandwidth to spam and they should >> blacklist these customers and take legal action against them. >> >> Shantanu > > -- -Eric 'shubes' ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] spam analysis
Sorry, I ignored the first part of your post. Our mail server is already in-house with a static IP. However, the outbound mail service idea may be a useful way to approach this problem. If it gets worse and the ISP doesn't do anything about it, that may be worth investigating. -Original Message- From: spamdyke-users-boun...@spamdyke.org [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Eric Shubert Sent: Friday, February 27, 2009 15:40 To: spamdyke-users@spamdyke.org Subject: Re: [spamdyke-users] spam analysis A possible solution to this problem is to bring your mail server in-house, and/or use an affordable outbound mail service such as DynDNS's Mailhop Outbound. If you don't have a static IP address in-house, DynDNS's CustomDNS service solves that problem affordably. Disclaimer: I'm not associated with DynDNS, but I do use and recommend their services. Joe Canner wrote: > Yes, Level 1 protection seems reasonable. We passed level 1 but failed > level 2 and 3 because of other clients using our ISP. I've only had one > recipient so far block us because of this, but I fear this might be just the > beginning. > > I agree that ISPs should take some responsibility for their clients' spam. > I hope our ISP will respond to our complaint. > > -Original Message- > From: spamdyke-users-boun...@spamdyke.org > [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Kulkarni Shantanu > Sent: Friday, February 27, 2009 14:44 > To: spamdyke users > Subject: Re: [spamdyke-users] spam analysis > > yes, but i use their level 1 protection. level 2 & 3 are indeed > aggressive. but i am also of the opinion that isps are partly responsible > for their clients using their bandwidth to spam and they should > blacklist these customers and take legal action against them. > > Shantanu -- -Eric 'shubes' ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] My logfile parser (Script)
Hey Eric, As I undestand it qmlog is just a tool to find a specific logfile entry if you are looking for certain times where a connection has been made. My script is just checking for spamdyke output, and only specific output at that. I also am using a while loop to read the lines in instead of just tail so I can process them. I will have a quick look and see if I am able to add it - usually I just write stuff - not used to changing other peoples code :P Cheers, Sebastian Eric Shubert wrote: > Sorry to say that I haven't had a chance to check out your script yet, > Sebastian. :( > > Speaking of colored and filtered qmail logfiles though, there's a nice > 'qmlog' script at qtp.qmailtoaster.com (part of the qmailtoaster-plus > package). It allows easy viewing and searching of qmail (et al) logs. > I'm wondering if your 'coloring and filtering' might be a nice > enhancement to that script. Care to have a look into it? > > Sebastian Grewe wrote: > >> I totally forgot about that - but I am not using the script to block >> them forever, just to monitor qmail when a large amount of connections >> is coming in (which happens ever so often). Even so I did turn off >> the blocking feature since qmail handles it just fine and connections >> clear up after a while. I was just concerned that legitimate e-mail >> wouldn't >> be coming through - but since they try to resend if no connection could >> be established that's not a concern anymore. >> >> So yeah, I use it to see what's being blocked and for what reason - even >> added whitelist matches now. >> >> It's basically just colored and filtered output of your qmail logfiles >> now :D >> >> Cheers, >> Sebastian >> >> Otto Berger wrote: >> >>> you could also use fail2ban for that. You just have to specify a custom >>> rule ("filter") for the spamdyke-log output. Then the sender ip will be >>> released after a specified timeframe and not blocked forever ;). >>> >>> (IMHO it is still not a very good idea to block by firewall) >>> >>> Otto >>> >>> Sebastian Grewe schrieb: >>> >>> Hey Guys, I have been working on a simple bash script that will read from it's standard input and presents some statistics from the logfile in realtime (when used with "tail -f .." ). After a few days that we have been attacked by spambots I got curious how to avoid these things in the future. The script we use is able to count the denied connections per IP and, if desired, adds this IP to the Firewall to reject incoming connections (brutal, I know). As the firewalling is optional you might still be interested in it to run just to see what's going on. It's written for BASH 3.0.15 but with a little change in the pattern matcher it runs on higher versions too. To start it in live mode run it like this: tail -f /var/log/qmail/smtp/current | qmail_parser.sh and if you just want to scan some files and see what happened to this: cat /var/log/qmail/smtp/* | qmail_parser.sh Since it's BASH it's not very good when it comes to performance but does the trick well when used with "tail". Also it's not catching everything (yet) since I was looking for only some very specific lines in the logfile. Anyhow, try it out and tell me what you think - attached the current script to this mail. Cheers, Sebastian ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users >>> ___ >>> spamdyke-users mailing list >>> spamdyke-users@spamdyke.org >>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >>> >>> > > > ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] spam analysis
We actually have a block of static IPs, so that is not our problem. I suspect our ISP uses the same Class B network that we are on to also provide dynamic IP addresses to residential customers. There may also be commercial customers with static IPs engaged in spamming for all I know. -Original Message- From: spamdyke-users-boun...@spamdyke.org [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Eric Shubert Sent: Friday, February 27, 2009 15:40 To: spamdyke-users@spamdyke.org Subject: Re: [spamdyke-users] spam analysis A possible solution to this problem is to bring your mail server in-house, and/or use an affordable outbound mail service such as DynDNS's Mailhop Outbound. If you don't have a static IP address in-house, DynDNS's CustomDNS service solves that problem affordably. Disclaimer: I'm not associated with DynDNS, but I do use and recommend their services. Joe Canner wrote: > Yes, Level 1 protection seems reasonable. We passed level 1 but failed > level 2 and 3 because of other clients using our ISP. I've only had one > recipient so far block us because of this, but I fear this might be just the > beginning. > > I agree that ISPs should take some responsibility for their clients' spam. > I hope our ISP will respond to our complaint. > > -Original Message- > From: spamdyke-users-boun...@spamdyke.org > [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Kulkarni Shantanu > Sent: Friday, February 27, 2009 14:44 > To: spamdyke users > Subject: Re: [spamdyke-users] spam analysis > > yes, but i use their level 1 protection. level 2 & 3 are indeed > aggressive. but i am also of the opinion that isps are partly responsible > for their clients using their bandwidth to spam and they should > blacklist these customers and take legal action against them. > > Shantanu -- -Eric 'shubes' ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] My logfile parser (Script)
Sorry to say that I haven't had a chance to check out your script yet, Sebastian. :( Speaking of colored and filtered qmail logfiles though, there's a nice 'qmlog' script at qtp.qmailtoaster.com (part of the qmailtoaster-plus package). It allows easy viewing and searching of qmail (et al) logs. I'm wondering if your 'coloring and filtering' might be a nice enhancement to that script. Care to have a look into it? Sebastian Grewe wrote: > I totally forgot about that - but I am not using the script to block > them forever, just to monitor qmail when a large amount of connections > is coming in (which happens ever so often). Even so I did turn off > the blocking feature since qmail handles it just fine and connections > clear up after a while. I was just concerned that legitimate e-mail > wouldn't > be coming through - but since they try to resend if no connection could > be established that's not a concern anymore. > > So yeah, I use it to see what's being blocked and for what reason - even > added whitelist matches now. > > It's basically just colored and filtered output of your qmail logfiles > now :D > > Cheers, > Sebastian > > Otto Berger wrote: >> you could also use fail2ban for that. You just have to specify a custom >> rule ("filter") for the spamdyke-log output. Then the sender ip will be >> released after a specified timeframe and not blocked forever ;). >> >> (IMHO it is still not a very good idea to block by firewall) >> >> Otto >> >> Sebastian Grewe schrieb: >> >>> Hey Guys, >>> >>> I have been working on a simple bash script that will read from it's >>> standard input and presents some statistics from the logfile in realtime >>> (when used with "tail -f .." ). >>> After a few days that we have been attacked by spambots I got curious >>> how to avoid these things in the future. The script we use is able to >>> count the denied connections >>> per IP and, if desired, adds this IP to the Firewall to reject incoming >>> connections (brutal, I know). As the firewalling is optional you might >>> still be interested in it to run just >>> to see what's going on. >>> >>> It's written for BASH 3.0.15 but with a little change in the pattern >>> matcher it runs on higher versions too. To start it in live mode run it >>> like this: >>> >>> tail -f /var/log/qmail/smtp/current | qmail_parser.sh >>> >>> and if you just want to scan some files and see what happened to this: >>> >>> cat /var/log/qmail/smtp/* | qmail_parser.sh >>> >>> Since it's BASH it's not very good when it comes to performance but does >>> the trick well when used with "tail". Also it's not catching everything >>> (yet) since I was looking for only >>> some very specific lines in the logfile. Anyhow, try it out and tell me >>> what you think - attached the current script to this mail. >>> >>> Cheers, >>> Sebastian >>> >>> >>> >>> >>> ___ >>> spamdyke-users mailing list >>> spamdyke-users@spamdyke.org >>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >>> >> ___ >> spamdyke-users mailing list >> spamdyke-users@spamdyke.org >> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >> -- -Eric 'shubes' ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] My logfile parser (Script)
I totally forgot about that - but I am not using the script to block them forever, just to monitor qmail when a large amount of connections is coming in (which happens ever so often). Even so I did turn off the blocking feature since qmail handles it just fine and connections clear up after a while. I was just concerned that legitimate e-mail wouldn't be coming through - but since they try to resend if no connection could be established that's not a concern anymore. So yeah, I use it to see what's being blocked and for what reason - even added whitelist matches now. It's basically just colored and filtered output of your qmail logfiles now :D Cheers, Sebastian Otto Berger wrote: > you could also use fail2ban for that. You just have to specify a custom > rule ("filter") for the spamdyke-log output. Then the sender ip will be > released after a specified timeframe and not blocked forever ;). > > (IMHO it is still not a very good idea to block by firewall) > > Otto > > Sebastian Grewe schrieb: > >> Hey Guys, >> >> I have been working on a simple bash script that will read from it's >> standard input and presents some statistics from the logfile in realtime >> (when used with "tail -f .." ). >> After a few days that we have been attacked by spambots I got curious >> how to avoid these things in the future. The script we use is able to >> count the denied connections >> per IP and, if desired, adds this IP to the Firewall to reject incoming >> connections (brutal, I know). As the firewalling is optional you might >> still be interested in it to run just >> to see what's going on. >> >> It's written for BASH 3.0.15 but with a little change in the pattern >> matcher it runs on higher versions too. To start it in live mode run it >> like this: >> >> tail -f /var/log/qmail/smtp/current | qmail_parser.sh >> >> and if you just want to scan some files and see what happened to this: >> >> cat /var/log/qmail/smtp/* | qmail_parser.sh >> >> Since it's BASH it's not very good when it comes to performance but does >> the trick well when used with "tail". Also it's not catching everything >> (yet) since I was looking for only >> some very specific lines in the logfile. Anyhow, try it out and tell me >> what you think - attached the current script to this mail. >> >> Cheers, >> Sebastian >> >> >> >> >> ___ >> spamdyke-users mailing list >> spamdyke-users@spamdyke.org >> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >> > ___ > spamdyke-users mailing list > spamdyke-users@spamdyke.org > http://www.spamdyke.org/mailman/listinfo/spamdyke-users > ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] spam analysis
A possible solution to this problem is to bring your mail server in-house, and/or use an affordable outbound mail service such as DynDNS's Mailhop Outbound. If you don't have a static IP address in-house, DynDNS's CustomDNS service solves that problem affordably. Disclaimer: I'm not associated with DynDNS, but I do use and recommend their services. Joe Canner wrote: > Yes, Level 1 protection seems reasonable. We passed level 1 but failed > level 2 and 3 because of other clients using our ISP. I've only had one > recipient so far block us because of this, but I fear this might be just the > beginning. > > I agree that ISPs should take some responsibility for their clients' spam. > I hope our ISP will respond to our complaint. > > -Original Message- > From: spamdyke-users-boun...@spamdyke.org > [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Kulkarni Shantanu > Sent: Friday, February 27, 2009 14:44 > To: spamdyke users > Subject: Re: [spamdyke-users] spam analysis > > yes, but i use their level 1 protection. level 2 & 3 are indeed > aggressive. but i am also of the opinion that isps are partly responsible > for their clients using their bandwidth to spam and they should > blacklist these customers and take legal action against them. > > Shantanu -- -Eric 'shubes' ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] spam analysis
Yes, Level 1 protection seems reasonable. We passed level 1 but failed level 2 and 3 because of other clients using our ISP. I've only had one recipient so far block us because of this, but I fear this might be just the beginning. I agree that ISPs should take some responsibility for their clients' spam. I hope our ISP will respond to our complaint. -Original Message- From: spamdyke-users-boun...@spamdyke.org [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Kulkarni Shantanu Sent: Friday, February 27, 2009 14:44 To: spamdyke users Subject: Re: [spamdyke-users] spam analysis yes, but i use their level 1 protection. level 2 & 3 are indeed aggressive. but i am also of the opinion that isps are partly responsible for their clients using their bandwidth to spam and they should blacklist these customers and take legal action against them. Shantanu -- * Joe Canner [090227 19:43]: > I'm not a big fan of UCEProtect right now, as their list blocks our outgoing > mail because our ISP is associated with large amounts of spam. This > methodology, while no doubt effective at blocking spam, must generate a lot > of false positives because of this "guilt by association" philosophy. Our > ISP is one of the 3 or 4 largest ISPs in Morocco, so I am not confident that > they will do anything that will convince UCEProtect to un-blacklist them. > > -Original Message- > From: spamdyke-users-boun...@spamdyke.org > [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Kulkarni Shantanu > Sent: Friday, February 27, 2009 12:23 > To: spamdyke-users@spamdyke.org > Subject: [spamdyke-users] spam analysis > > Hi, > i am happily using spamdyke on few of my mail servers. i have put a small > page on > comparison of some easy spam blocking ways. please do check it out at, > http://www.shantanukulkarni.org/spam_analysis.html > > Shantanu > -- > > > ___ > spamdyke-users mailing list > spamdyke-users@spamdyke.org > http://www.spamdyke.org/mailman/listinfo/spamdyke-users > > ___ > spamdyke-users mailing list > spamdyke-users@spamdyke.org > http://www.spamdyke.org/mailman/listinfo/spamdyke-users ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] spam analysis
yes, but i use their level 1 protection. level 2 & 3 are indeed aggressive. but i am also of the opinion that isps are partly responsible for their clients using their bandwidth to spam and they should blacklist these customers and take legal action against them. Shantanu -- * Joe Canner [090227 19:43]: > I'm not a big fan of UCEProtect right now, as their list blocks our outgoing > mail because our ISP is associated with large amounts of spam. This > methodology, while no doubt effective at blocking spam, must generate a lot > of false positives because of this "guilt by association" philosophy. Our > ISP is one of the 3 or 4 largest ISPs in Morocco, so I am not confident that > they will do anything that will convince UCEProtect to un-blacklist them. > > -Original Message- > From: spamdyke-users-boun...@spamdyke.org > [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Kulkarni Shantanu > Sent: Friday, February 27, 2009 12:23 > To: spamdyke-users@spamdyke.org > Subject: [spamdyke-users] spam analysis > > Hi, > i am happily using spamdyke on few of my mail servers. i have put a small > page on > comparison of some easy spam blocking ways. please do check it out at, > http://www.shantanukulkarni.org/spam_analysis.html > > Shantanu > -- > > > ___ > spamdyke-users mailing list > spamdyke-users@spamdyke.org > http://www.spamdyke.org/mailman/listinfo/spamdyke-users > > ___ > spamdyke-users mailing list > spamdyke-users@spamdyke.org > http://www.spamdyke.org/mailman/listinfo/spamdyke-users ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] spam analysis
I'm not a big fan of UCEProtect right now, as their list blocks our outgoing mail because our ISP is associated with large amounts of spam. This methodology, while no doubt effective at blocking spam, must generate a lot of false positives because of this "guilt by association" philosophy. Our ISP is one of the 3 or 4 largest ISPs in Morocco, so I am not confident that they will do anything that will convince UCEProtect to un-blacklist them. -Original Message- From: spamdyke-users-boun...@spamdyke.org [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Kulkarni Shantanu Sent: Friday, February 27, 2009 12:23 To: spamdyke-users@spamdyke.org Subject: [spamdyke-users] spam analysis Hi, i am happily using spamdyke on few of my mail servers. i have put a small page on comparison of some easy spam blocking ways. please do check it out at, http://www.shantanukulkarni.org/spam_analysis.html Shantanu -- ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
[spamdyke-users] spam analysis
Hi, i am happily using spamdyke on few of my mail servers. i have put a small page on comparison of some easy spam blocking ways. please do check it out at, http://www.shantanukulkarni.org/spam_analysis.html Shantanu -- ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users
Re: [spamdyke-users] My logfile parser (Script)
you could also use fail2ban for that. You just have to specify a custom rule ("filter") for the spamdyke-log output. Then the sender ip will be released after a specified timeframe and not blocked forever ;). (IMHO it is still not a very good idea to block by firewall) Otto Sebastian Grewe schrieb: > Hey Guys, > > I have been working on a simple bash script that will read from it's > standard input and presents some statistics from the logfile in realtime > (when used with "tail -f .." ). > After a few days that we have been attacked by spambots I got curious > how to avoid these things in the future. The script we use is able to > count the denied connections > per IP and, if desired, adds this IP to the Firewall to reject incoming > connections (brutal, I know). As the firewalling is optional you might > still be interested in it to run just > to see what's going on. > > It's written for BASH 3.0.15 but with a little change in the pattern > matcher it runs on higher versions too. To start it in live mode run it > like this: > > tail -f /var/log/qmail/smtp/current | qmail_parser.sh > > and if you just want to scan some files and see what happened to this: > > cat /var/log/qmail/smtp/* | qmail_parser.sh > > Since it's BASH it's not very good when it comes to performance but does > the trick well when used with "tail". Also it's not catching everything > (yet) since I was looking for only > some very specific lines in the logfile. Anyhow, try it out and tell me > what you think - attached the current script to this mail. > > Cheers, > Sebastian > > > > > ___ > spamdyke-users mailing list > spamdyke-users@spamdyke.org > http://www.spamdyke.org/mailman/listinfo/spamdyke-users ___ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users