Date: Tue, 24 Feb 2009 00:13:38 -0500 From: Mark E Doner <nuintari@amplex.net> To: freebsd-isp@freebsd.org Subject: rate limiting mail server Message-ID: <49A38202.7010506@amplex.net>
next in thread | raw e-mail | index | archive | help
Greetings, I am running a fairly large mail server, FreeBSD, of course. It is predominantly for residential customers, so educating the end users to not fall for the scams is never going to happen. Whenever we have a customer actually hand over their login credentials, we quickly see a huge flood of inbound connections from a small handful of IP addresses on ports 25 and 587, all authenticate as whatever customer fell for the scam du jour, and of course, load goes through the roof as I get a few thousand extra junk messages to process in a matter of minutes. Thinking about using PF to rate limit inbound connections, stuff the hog wild connection rates into a table and drop them quickly. My question is, I know how to do this, PF syntax is easy, but has anyone ever tried this? How many new connections per minute from a single source are acceptable, and what is blatantly malicious? And, once I have determined that, how long should I leave the offenders in the blocklist? Any thoughts appreciated, Mark
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?49A38202.7010506>