[63810] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New mail blocks result of Ralsky's latest attacks?

daemon@ATHENA.MIT.EDU (Steven Champeon)
Fri Oct 10 11:53:33 2003

X-Received-From: schampeo@habanero.hesketh.net
X-Delivered-To: <nanog@merit.edu>
Date: Fri, 10 Oct 2003 11:42:56 -0400
From: Steven Champeon <schampeo@hesketh.com>
To: nanog@merit.edu
Mail-Followup-To: nanog@merit.edu
In-Reply-To: <3F86CD9F.80904@outblaze.com>
Errors-To: owner-nanog-outgoing@merit.edu


on Fri, Oct 10, 2003 at 08:47:51PM +0530, Suresh Ramasubramanian wrote:
> Set up header checks in sendmail / postfix to block all mail with 
> Received: headers showing Ralsky IPs.  PCRE header checks in postfix 
> would be like -

<snip>

Sendmail rulesets to block Ralsky:

KRalsky1 regex -a@SPAM ^.*(\[|\(|\s)211\.158\.[3456789]
KRalsky2 regex -a@SPAM ^.*(\[|\(|\s)218\.70\.1[345]
KRalsky3 regex -a@SPAM ^.*(\[|\(|\s)219\.153\.1[45]
KRalsky4 regex -a@SPAM ^.*(\[|\(|\s)218\.10\.57
KRalsky5 regex -a@SPAM ^.*(\[|\(|\s)218\.70\.1[01]
KRalsky6 regex -a@SPAM ^.*(\[|\(|\s)218\.70\.[89]

KReceivedChecks sequence Ralsky1 Ralsky2 Ralsky3 Ralsky4 Ralsky5 Ralsky6

HReceived: $>check_header_Received
Scheck_header_Received
R$*                     $: $1 $| $(ReceivedChecks $&{currHeader} $)
R$* $| @SPAM            $#error $@ 5.7.1 $: "550 Message rejected; suspected spam signature."
R$* $| $*               $: $1

This will not help to block direct SMTP AUTH attacks; but they should block
mail from other compromised servers, provided they don't munge the headers.
I've been running these rules for several weeks without incident.

HTH,
Steve

-- 
hesketh.com/inc. v: (919) 834-2552 f: (919) 834-2554 w: http://hesketh.com
Book publishing is second only to furniture delivery in slowness. -b. schneier

home help back first fref pref prev next nref lref last post