Hi Rob,

I don't currently have this problem but I did have something similar with systems trying dictionary attacks on my SSH connections. The links I've listed below [1][2][3] all attack the problem by setting up the Linux firewall to kill connections which try too hard to connect to the SSH port. This technique could be adapted so that too many connections to the SMTP port within say a minute effectively blacklists that IP address for ten minutes.

There is a technique called 'door knocking' where you tap out a secret knock before attempting to connect to the SMTP server... it is effective but not very practical.

I suppose a simpler technique might be to open another SMTP port (say 8110) instead of or as well as 110. I don't think most spammers bother to do port scanning looking for SMTP servers.

Regards,
David Legg

Wilkinson, Robert wrote:
I have been using James Mail Server since 2000 believe it or not. But
because I have been using it that long my users have been hacked many
times and my outbound email addresses receive an incredible amount of
spam. I have arrived at the point where spamming email servers are using
up all my connections and my servers cannot connect to James. Is there a
way to hold a certain number of connections for local use only? Any
other suggestions iof how to combat this effect?

[1] http://olivier.sessink.nl/publications/blacklisting/index.html
[2] http://www.la-samhna.de/library/brutessh.html
[3] http://hostingfu.com/article/ssh-dictionary-attack-prevention-with-iptables

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to