Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Feb 2009 00:13:38 -0500
From:      Mark E Doner <nuintari@amplex.net>
To:        freebsd-isp@freebsd.org
Subject:   rate limiting mail server
Message-ID:  <49A38202.7010506@amplex.net>

next in thread | raw e-mail | index | archive | help
Greetings,
    I am running a fairly large mail server, FreeBSD, of course. It is 
predominantly for residential customers, so educating the end users to 
not fall for the scams is never going to happen. Whenever we have a 
customer actually hand over their login credentials, we quickly see a 
huge flood of inbound connections from a small handful of IP addresses 
on ports 25 and 587, all authenticate as whatever customer fell for the 
scam du jour, and of course, load goes through the roof as I get a few 
thousand extra junk messages to process in a matter of minutes.

Thinking about using PF to rate limit inbound connections, stuff the hog 
wild connection rates into a table and drop them quickly. My question 
is, I know how to do this, PF syntax is easy, but has anyone ever tried 
this? How many new connections per minute from a single source are 
acceptable, and what is blatantly malicious? And, once I have determined 
that, how long should I leave the offenders in the blocklist?

Any thoughts appreciated,
Mark



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?49A38202.7010506>