Hi Gregory
Thanks for your advice.
Since we don’t want sent mass of mails (excepted some
newsletter with about 50-100 addresses, which
I will not declare as mass mails), the first 3 points are
perhaps overkill for us.
4) I’ll check for.
5) This are setup correct
6) Since the spammer didn’t reconnect from the same ip,
this would not help. The
spammer connected every time from an
other ip and just sent out a few (20-30) mails, that
looks almost normal to the mail server.
6 II) We will check, if we can implement something like this,
which will sent an alert to us.
7) As Rainer has written, I also think, that the password has
been stolen or be track by
some kind of Trojan. So, strong password will
note help here.
8) What do you mean, when you say Follow-up the other
reputation systems???
9) Since this only happen one time for some years, I prefer something
like 6 II)
Blocking Port 25 would be that fine. Our customer have contact
over the whole world, so blocking
Port 25 would be a solution. And some of the connection was coming
from Italy or Germany, that
will even not help (IMHO this aren’t exotic countries ;-).
Kind Regards
Parick
Von: Gregory
Agerba [mailto:gregory.agerba@gmail.com]
Gesendet: Mittwoch, 23. Juni 2010 16:51
An: Patrick Studer
Cc: swinog@swinog.ch
Betreff: Re: [swinog] IronPort E-Mail Reputation
Hi Patrick,
>From my past experience delivering very often very big newsletters...
Some advices to deliver mass of mails:
1) Distribute your email out of 4-5 virtual interfaces (like Exim would let you
do) and rotate them every x hours or/and randomly.
2) Use different domain names not only FQDNs (this is what mailchimp.com does to distribute their millions
of emails).
3) Use specific IPs for specific large domains, like Gmail, Yahoo, Hotmail and
rotate them every once in a while.
4) Sign-up for loopback feed and monitor the complaint box constantly. Yahoo
and such big got that for free.
5) Ensure you have proper RDNS, SPF and DKIM setup.
6) Use iptablesand custom rulesets to block above a certain amount of SMTP
connections per host on port 25/587.
6) Count your outgoing average email you send a day/ per hour, put some cron
that grep/cat/wc the logs, with threshold that triggers alarms.
7) Educate your users for strong passwords.
8) Follow-up the other reputation systems like Cisco, Barracuda, Fortinet,
etc..
9) Use dedicated IP for strange or doubtful clients.
10) Mind shared IPs.
You can also block port 25 from exotic countries that you do not expect to send
you emails, but they are a liability and its quite mean.
Gregory
2010/6/23 Patrick Studer <p.studer@x-netconsulting.ch>
Hi Mickey
That is what we already
thinking about, to implement a second server on a different ip. At the other
hand, I don’t think
that’s way I want to go.
Since this is the first time
within some years, I will check, if there is an other way to solve this issue.
Kind Regards
Patrick Studer
******************************************************************************
X-NetConsulting
GmbH
Internet
http://www.x-netconsulting.ch
Grosspeterstrasse
21
E-Mail p.studer@x-netconsulting.ch
CH-4052
Basel
Telefon +41 61 315 85 55
Schweiz
Fax +41 61 315 85 59
******************************************************************************