[77703] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Time to check the rate limits on your mail servers

daemon@ATHENA.MIT.EDU (Patrick W Gilmore)
Thu Feb 3 09:44:52 2005

In-Reply-To: <Pine.BSF.4.44.0502030922380.71791-100000@richard2.pil.net>
Cc: Patrick W Gilmore <patrick@ianai.net>
From: Patrick W Gilmore <patrick@ianai.net>
Date: Thu, 3 Feb 2005 09:44:24 -0500
To: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu


On Feb 3, 2005, at 9:30 AM, up@3.am wrote:

>> One additional thing that I think wasnt mentioned in the article -
>> Make sure your MXs (inbound servers) are separate from your outbound
>> machines, and that the MX servers dont relay email for your dynamic IP
>> netblock. Some other trojans do stuff like getting the ppp domain name
>> / rDNS name of the assigned IP etc and then "nslookup -q=mx
>> domain.com", then set itself up so that all its payloads get delivered
>> out of the domain's MX servers
>
> Easier said than done, especially if you're a small ISP that's been 
> doing
> POP before SMTP and changing this requires that every customer's 
> settings
> be changed.

IMHO, if you are a small ISP and limit the # of e-mails per user per 
day, even to something like 1K, you probably don't have to separate the 
MX & SMTP servers.  But that's me, others might still think you were 
being "irresponsible".


> Is there any info on how this zombie is spread?  ie, email worms, 
> direct
> port attacks, etc.  If the former, there's hope of nipping it in the 
> bud
> with anti-virus filtering.

All of the above.

-- 
TTFN,
patrick


home help back first fref pref prev next nref lref last post