OT: Snort rules triggered by spammers

Ian cobalt-users1 at fishnet.co.uk
Wed Oct 15 15:06:25 IST 2008


Hi,

Apologies for the Off Topic but this list is usually tolerant of such things when they vaguely 
resemble the fight against spam :)


I run a simple firewall in front of our servers that has snort installed.  I try to analyse the 
results as often as possible and look into false positives etc.

I recently noticed that what I thought was a long running false positive was actually directly 
related to possible spam delivery attempts on one mail server.

Basically there are a two rules available on the Bleeding Edge Threats website:

	http://www.bleedingthreats.net/bleeding-scan.rules

which are supposed to trigger against NMAP Syn Stealth Scans ( ie the -sS option with 
the optional -f to cause fragmentation).  These rules have been hitting a lot but only ever 
indicates a scan against port 25 of the one mail server I have running there, so I just 
assumed it was another false positive.

When checking these IPs against the maillog today I got the following results:

155 unique IPs in list		

13 do not appear in maillog
142 appear and are rejected for various reasons including:

	relay attempt
	spamcop
	spamhaus
	greet pause
	mailbox not found
	did not issue MAIL/EXPN/VRFY/ETRN

The were 0 successful deliveries to the mail server at all from these IPs.

Unfortunately I deleted a load of these alerts this morning, it usually goes up to a few 
thousand unique IPs a day.


Could I be on to something?
Is anyone else running snort in front of a mail server who could check this?

Regards

Ian
-- 




More information about the MailScanner mailing list