Re: BCP on throttling outbound mail

2012-07-25 Thread Ansgar Wiechers
On 2012-07-25 Mark Blackman wrote: > On 25 Jul 2012, at 10:09, Ansgar Wiechers wrote: >> Please re-read what I wrote, particularly the second half of it. Is >> "Joseph Zebediah Average 4/1/1999" really a strong password? > > It is a strong password, unless you believe attackers would regard > that

Re: BCP on throttling outbound mail

2012-07-25 Thread Stan Hoeppner
On 7/25/2012 4:09 AM, Ansgar Wiechers wrote: > Indeed there isn't much disagreement on what forms a strong password (in > principle). I do fail to see how this could be enforced on a technical > level, though. Use a plugin such as: http://www.html-form-guide.com/web-form-widget/web-form-password-

Re: BCP on throttling outbound mail

2012-07-25 Thread Stan Hoeppner
On 7/24/2012 6:24 PM, mouss wrote: > anvil is not an anti-spam solution. it's measure against "clients gone > crazy". Precisely. And that's how I advised the OP to us it: Plug the artery until surgery can be performed. Surgery in this case being disabling the account and setting a strong passw

Re: BCP on throttling outbound mail

2012-07-25 Thread Mark Blackman
On 25 Jul 2012, at 10:09, Ansgar Wiechers wrote: > Mark, > > > Please re-read what I wrote, particularly the second half of it. Is > "Joseph Zebediah Average 4/1/1999" really a strong password? It is a strong password, unless you believe attackers would regard that format as a promising format

Re: BCP on throttling outbound mail

2012-07-25 Thread Ansgar Wiechers
Mark, On 2012-07-25 Mark Blackman wrote: > On 25 Jul 2012, at 08:20, Ansgar Wiechers wrote: >> On 2012-07-25 mouss wrote: >>> oh come on! the "users" excuse is wa too old. if your software accepts >>> weak passwords, then the problem is with the software, not the user. >> >> I'd have to disagree

Re: BCP on throttling outbound mail

2012-07-25 Thread Mark Blackman
On 25 Jul 2012, at 08:20, Ansgar Wiechers wrote: > On 2012-07-25 mouss wrote: >> Le 24/07/2012 08:37, Stan Hoeppner a écrit : >>> You'd think humans beings would be smart enough to follow directions >>> and use strong passwords, AV software, etc, and not fall for phishing >>> scams. Your adversar

Re: BCP on throttling outbound mail

2012-07-25 Thread Ansgar Wiechers
On 2012-07-25 mouss wrote: > Le 24/07/2012 08:37, Stan Hoeppner a écrit : >> You'd think humans beings would be smart enough to follow directions >> and use strong passwords, AV software, etc, and not fall for phishing >> scams. Your adversary in this war isn't the spammers, it's not the >> technol

Re: BCP on throttling outbound mail

2012-07-24 Thread mouss
Le 24/07/2012 08:37, Stan Hoeppner a écrit : > On 7/24/2012 12:44 AM, CSS wrote: >> >> On Jul 24, 2012, at 1:24 AM, Stan Hoeppner wrote: >> >>> On 7/23/2012 4:16 PM, CSS wrote: >>> I'd like to take some measures to limit what an authenticated sender can do but not limit legitimate use. >

Re: BCP on throttling outbound mail

2012-07-24 Thread CSS
On Jul 24, 2012, at 6:23 AM, Len Conrad wrote: > At 04:16 PM 7/23/2012, you wrote: >> Hello, >> >> Sorry for the broad question, but is there any sort of best common practice >> these days regarding limiting outbound email? We recently had a customer's >> account compromised (not sure if it wa

Re: BCP on throttling outbound mail

2012-07-24 Thread Wietse Venema
Len Conrad: > I've been using postfwd.org for rate-limiting outbound senders, > and inbound senders and IPs, plus lots of other inbound filtering, > for a 2+ years. It killed our horrible problem of cracked passwords. I think that dedicated tools such as postfwd and the like are the way to go. Th

Re: BCP on throttling outbound mail

2012-07-24 Thread Len Conrad
At 04:16 PM 7/23/2012, you wrote: >Hello, > >Sorry for the broad question, but is there any sort of best common practice >these days regarding limiting outbound email? We recently had a customer's >account compromised (not sure if it was brute-forced or keylogged) and then >the perp proceeded t

Re: BCP on throttling outbound mail

2012-07-24 Thread Stan Hoeppner
On 7/24/2012 2:08 AM, CSS wrote: > Perhaps I'm misunderstanding this, but I was under the impression that the > anvil limits were all enforced on a per-connection or per-IP limit. I'm > really after something that can track a particular sasl-authenticated user > and punish them (and not other

Re: BCP on throttling outbound mail

2012-07-24 Thread CSS
On Jul 24, 2012, at 2:37 AM, Stan Hoeppner wrote: > On 7/24/2012 12:44 AM, CSS wrote: >> >> On Jul 24, 2012, at 1:24 AM, Stan Hoeppner wrote: >> >>> On 7/23/2012 4:16 PM, CSS wrote: >>> I'd like to take some measures to limit what an authenticated sender can do but not limit legitim

Re: BCP on throttling outbound mail

2012-07-23 Thread Stan Hoeppner
On 7/24/2012 12:44 AM, CSS wrote: > > On Jul 24, 2012, at 1:24 AM, Stan Hoeppner wrote: > >> On 7/23/2012 4:16 PM, CSS wrote: >> >>> I'd like to take some measures to limit what an authenticated sender can do >>> but not limit legitimate use. >> >> See: >> http://www.postfix.org/postconf.5.html#

Re: BCP on throttling outbound mail

2012-07-23 Thread CSS
On Jul 24, 2012, at 1:24 AM, Stan Hoeppner wrote: > On 7/23/2012 4:16 PM, CSS wrote: > >> I'd like to take some measures to limit what an authenticated sender can do >> but not limit legitimate use. > > See: > http://www.postfix.org/postconf.5.html#smtpd_client_connection_rate_limit > > You w

Re: BCP on throttling outbound mail

2012-07-23 Thread Stan Hoeppner
On 7/23/2012 4:16 PM, CSS wrote: > I'd like to take some measures to limit what an authenticated sender can do > but not limit legitimate use. See: http://www.postfix.org/postconf.5.html#smtpd_client_connection_rate_limit You would apply this to your submission service, eg: 587 inet n

BCP on throttling outbound mail

2012-07-23 Thread CSS
Hello, Sorry for the broad question, but is there any sort of best common practice these days regarding limiting outbound email? We recently had a customer's account compromised (not sure if it was brute-forced or keylogged) and then the perp proceeded to use their credentials to smtp-auth the