thoughts? Would this defeat botnets?

Scott Silva ssilva at sgvwater.com
Sun Nov 19 02:03:20 GMT 2006


Furnish, Trever G spake the following on 11/18/2006 5:12 PM:
> Something like milter-error can block inbound connections based on past
> failures.
> 
> Julian's IPBlock function can block inbound connections based on past
> message transmission rate.
> 
> I'd like to solicite thoughts on an approach that takes those ideas a
> bit further.  Is the approach valid (or would I be wasting my time by
> trying to implement it)?
> 
> The idea would be similar to that used in Ironport's Senderbase, albeit
> much simpler.
> 
> Problem: There are reportedly 75,000 Spamthru bots out there, and that's
> just one botnet.  If I only let through one spam from each of those bots
> per week, I'll still be overwhelmed.
> 
> Supposition #1: Most bots run on unmanaged systems that should never be
> connecting to my mail server in the first place.  If I ever receive a
> message from those systems, it'll be spam.
> 
> Idea: Keep a score for each sending IP address, forever.  If that
> address sends me spam without sending me ham, it's blocked, permanently
> (or until manual intervention on my part).  Reported false-negatives
> could be parsed to contribute to the scores.
> 
> For example, if we consider a score <0 to mean the connecting system
> should be blocked, then I would score each inbound message like so:
> 	- Each sender IP address score defaults to 0.
> 	- If the message is ham, add 1 to the score for the sender's IP
> address.
> 	- If the message is spam, subtract 1 from the score of the
> sender's IP address.
> 	- If the message is a reported false negative, subtract 2 from
> the score for the sender's IP address (to counteract the 1 we added
> originally).
> 
> Obviously this breaks some things:
> 	- Forwarders: If the connecting server isn't the original
> sender, then he is either a forwarder, a secure relay or an open relay.
> If he's an open relay, I'm happy he's blocked.  If he's a forwarder...I
> think I'm ok with blocking him by default.  If he's a secure relay
> (someone who only relays for his customers), I'm still ok with blocking
> him by default, provided I can override that with exceptions later.
> 
> 	- Outbound mail from clients: I don't care -- my inbound relays
> only scan inbound mail, they don't deliver for clients or touch outbound
> mail.
> 
> 	- Outbound mail from my own users on their home machines: I'm
> already trying to prevent that by using SPF, and if this helps spot a
> bot, so much the better.
> 
> And also it obviously will fail for sender IP addresses that send both
> spam and ham without any acceptible choice in the matter, such as secure
> relays and mailing list servers.  For those I do business with, I think
> I'd be ok putting in exceptions.  Other rules can still be applied to
> identify the rest of the spam.
> 
> I anticipate someone will suggest using dynablock or other RBLs that
> target dynamic IP addresses.  I'm already using dynablock within
> spamassassin, but I'm still getting a lot of image spam.  I could use
> imageinfo and fuzzyocr, but I really just do not consider those
> sustainable long-term solutions.  All of the techniques spammers have
> ever used in text can easily be applied to images, and I can't accept
> the idea of multiplying my anti-spam server count by 100 to cope with
> the additional overhead of applying ocr to everything first when we
> eventually escalate to that level.
>  
> --
> Trever
> 
As Julian might say, "When can you write it?" It sounds like an ambitious
project, but in the cases I have checked, after a short period of attemps, I
might not see that address for a long time after. Vispan does some of what you
are looking for. It adds addresses to your access file or to your firewall at
configurable levels and durations.

-- 

MailScanner is like deodorant...
You hope everybody uses it, and
you notice quickly if they don't!!!!



More information about the MailScanner mailing list