bc979 at lafn.org
Mon Jun 15 19:43:49 UTC 2015
> On 15 June 2015, at 02:10, Matthias Apitz <guru at unixarea.de> wrote:
> El día Monday, June 15, 2015 a las 01:51:29AM -0700, Doug Hardie escribió:
>> I need to modify sendmail such that when a SMTP-AUTH request fails, sendmail drops the connection. I am constantly being hit by password guessing attempts. My first thought was to introduce a 1 or 2 minute delay after an authentication failure. However, I suspect the attackers would just open a new connection and leave me with bunches of connections waiting to time out. Hence the need to drop the connection.
>> Looking through the code it appears there are 2 places in srvrsmtp.c where the SASL return code is not SASL_OK or SASL_CONT. An "AUTH failure” is logged in both those instances. I believe that an exit right after the RESET_SASLCONN would do what I need. Does this appear to be the right place?
> What would be the benefit from such a reset/exit? The attacker would be
> fire up the next connection with the next password guess. Can you
> identify the source IP addr and if so just block it with ipfilter or
> some firewall
I have been using the equivalent of fail2ban for over 4 years now. I have blocked all non-us IP addresses and over 4K US IP addresses. Doesn’t help anymore. I get thousands of connections daily attempting password guessing. The benefit is that they have to renegotiate a SSL connection which I suspect will break most of their scripts. It will at least place more of a burden on their systems. The SMTP protocol uses almost zero overhead to try multiple passwords.
More information about the freebsd-questions