Date: Tue, 24 Feb 2009 00:13:38 -0500 From: Mark E Doner <nuintari@amplex.net> To: freebsd-isp@freebsd.org Subject: rate limiting mail server Message-ID: <49A38202.7010506@amplex.net>
next in thread | raw e-mail | index | archive | help
Greetings,
I am running a fairly large mail server, FreeBSD, of course. It is
predominantly for residential customers, so educating the end users to
not fall for the scams is never going to happen. Whenever we have a
customer actually hand over their login credentials, we quickly see a
huge flood of inbound connections from a small handful of IP addresses
on ports 25 and 587, all authenticate as whatever customer fell for the
scam du jour, and of course, load goes through the roof as I get a few
thousand extra junk messages to process in a matter of minutes.
Thinking about using PF to rate limit inbound connections, stuff the hog
wild connection rates into a table and drop them quickly. My question
is, I know how to do this, PF syntax is easy, but has anyone ever tried
this? How many new connections per minute from a single source are
acceptable, and what is blatantly malicious? And, once I have determined
that, how long should I leave the offenders in the blocklist?
Any thoughts appreciated,
Mark
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?49A38202.7010506>
