Subject: Re: SPAM Alert: Email Address Harvesting
To: Richard Rauch <rkr@olib.org>
From: Flo <netbsd@wolfnode.de>
List: current-users
Date: 01/04/2004 23:59:03
Hm,
I tested with a 3 MB message with a "bad word" in the header. The mail
gets identified
as "bad" immediately, but the transfer doesn't stop.
Jan 4 23:50:20 server postfix/smtpd[16313]: connect from
mail.gmx.net[213.165.64.20]
Jan 4 23:50:21 server postfix/smtpd[16313]: 3CA6F1E998C:
client=mail.gmx.net[213.165.64.20]
Jan 4 23:50:25 server postfix/cleanup[16315]: 3CA6F1E998C: reject:
header Subject: online casino from mail.gmx.net[213.165.64.20];
from=<florian.stoehr@gmx.net> to=<flo@wolfnode.de> proto=SMTP
helo=<mail.gmx.net>: Bah, go away!
Jan 4 23:51:09 server postfix/smtpd[16313]: disconnect from
mail.gmx.net[213.165.64.20]
:-(
Bad, I thought it disconnects immediately when a header check matches.
Florian
Richard Rauch wrote:
> Certainly I get a lot of Sven worm attempts. Like Flo, I have them filtered
> at the SMTP layer (along with all other DLL/PIF/etc. junk files).
>
> But spam is more annoying if it gets through (and while zero Sven viruses
> get through to me, I do get occasional spam).
>
>
> Aside to Flo: Does that really stop the virus before it uses up your band-
> width? My impression is that the whole message is received before the
> header checks are applied. By that time, the biggest bandwidth hit has
> already been taken. Conforming SMTP has no way to break the transmission
> during header transmission, as far as I know, since the whole message
> (header and body) is sent in one DATA block. Once you start to accept,
> you can't shut the transmitter off.
>
> I've noticed that I usually get a double-take from Sven attempts. One
> has a GIF attachment (rejected) the other has a Microsoft file attach
> of some kind (also rejected). If I get more than one such pair from
> a single IP, I am prone to tossing the IP into a local IPF blacklist.
> "ipfstat -hin | grep -v ^0" suggests that that's doing a good job.
>
> It's a bit draconian, and has blocked at least one legitimate email.
> But I got tired of seeing countless RBL lookups and lots of my
> (limited) DSL bandwidth chewed up for Sven viruses.
>
> I'm keeping the Microsoft Worm related IPF rules separate, so that I can
> eventually turn them off, when and if Sven becomes less of a problem.
> (I intend to keep the list, however, as I will probably want to block
> many of the same IP numbers for the next Microsoft virus. (^&)
>
>