![]() |
|
General software and network General OS-independent software and network questions, X11, MTA, routing, etc. |
![]() |
|
Thread Tools | Display Modes |
|
||||
![]()
A couple of days ago in another thread, I was asked:
Quote:
I perceive 2 key administrative tasks for operating mail servers:
|
|
|||
![]()
Do you suggest any tools for testing server before sending and receiving e-mails from major e-mail services providers?
__________________
Signature: Furthermore, I consider that systemd must be destroyed. Based on Latin oratorical phrase |
|
|||
![]()
Is it possible to get permanently blocklisted domain via some misconfiguration?
Maybe it is safer to get some free, temporary domain to practice and test server configuration and then switch to paid, personal domain.
__________________
Signature: Furthermore, I consider that systemd must be destroyed. Based on Latin oratorical phrase |
|
||||
![]() Quote:
Quote:
And, any outbound mail from that service will often be rejected or will be marked as spam outright unless additional DNS-based authentication protocols such as SPF and DKIM are deployed. |
|
|||
![]()
Last resort, but still practical solution for poor IP address reputation is to just switch ISP or VPS provider.
I mentioned domain, because when I like a domain name I don't want to abandon/lose/waste it. That is probably my biggest concern that badly configured DKIM or some other e-mail measure is going to blocklist my domain permanently.
__________________
Signature: Furthermore, I consider that systemd must be destroyed. Based on Latin oratorical phrase |
|
||||
![]() Quote:
Poor domain reputation is more likely to be associated with a compromised web server. For more on domain reputation, see the FAQ for Spamhaus.org's Domain Block List -- it may be helpful: https://www.spamhaus.org/faq/section/Spamhaus%20DBL |
|
||||
![]()
Since I mentioned the Spamhaus Domain Block List (DBL), I should note that its one of their advisory services that I don't actually utilize.
I use their Don't Route or Peer (DROP) lists in PF on all internet-facing servers. My PF logs show constant probes from these "evil" netblocks. I see probes for responses from common ports like ntp, smtp, http, https, as well as probes for responses from a vast array of high port numbers for "bot" command and control. (This doesn't eliminate the constant probing from the rest of the Internet, but there's no reason to permit any traffic from hijacked RIR netblocks or other recognized criminal-controlled netblocks.) On my external-facing mail server, I also use the Spamhous consolidated ZEN block list as one of several DNSBL filters. Last edited by jggimi; 26th May 2020 at 03:34 PM. Reason: clarity |
|
|||
![]()
Thanks for the response jjgimi. I think I just needed some reassurance.
Thanks for the names of different block lists. It is good starting point.
__________________
Signature: Furthermore, I consider that systemd must be destroyed. Based on Latin oratorical phrase |
|
||||
![]()
I just happened to review mail logs logs today, and noticed that yesterday a spambot (at an apparent residential ISP) attempted to connect 27 times within a single 4-second period. No idea why it stopped at 27. It came, it hammered, it left.
I filter with three different DNSBLs -- Spamhaus Zen, GBUdb, and SpamCop -- and the IP address was listed at GDUdb. It also happened to be the first time since I enabled filtering that GBUdb showed a positive listing while the other two blacklists did not. |
|
|||
![]()
How do you deal with ICMP packets?
I've read about it and it seems that rate-limiting is best for ICMP packets, because in the past it was quite easy to DoS different OSes with ICMP packets. Blocking is another option, but it probably isn't the most RFC compliant way. I don't know how much should I rate-limit them and where. ICMP rate-limiting on ingress only should prevent DoS, but may be not enough to prevent sending large number of ICMP packets (packet reflection), because they may be generated by OS rejecting UDP packets. On the other hand rate-limiting on egress only does not prevent against DoS and I can just not reject UDP packets and drop them instead. I lean towards rate-limiting on both ingress and egress.
__________________
Signature: Furthermore, I consider that systemd must be destroyed. Based on Latin oratorical phrase |
|
||||
![]()
Currently, my DNSBL filter is working very well, and spam is at very manageable levels.
I now only report spam to the responsible ISP ("LART") when the sending IP address has a neutral or positive Mailspike reputation, or no reputation at all. If it has a negative reputation, then I assume my report will bounce or be ignored, and I will not bother to send an abuse report. SpamAssassin provides this reputation level as part of its analysis reporting, so it makes it easy for me to determine whether to LART or not. When LARTing, I use a simple script that automates much of the report generation, minimizing my effort when I do report. LART is an acronym which these days just means "Report to the responsible ISP." Hstorically it meant bringing the problem of spam to the attention of those who are unaware but with awareness might be able to do something about it: "Loser Attitude Readjustment Tool." Last edited by jggimi; 21st June 2020 at 03:20 PM. Reason: clarity |
|
|||
![]() Quote:
I can enable IPv6 for my VPS, but my ISP and many other ISPs in Poland does not support IPv4 and I recall Gmail also have not accepted mail sent by other server (different domain) via IPv6 protocol (fix for Postfix), so I operate IPv4 server and I am mainly interested in ICMP(v4). When it comes to packet reflection some Paul Vixie's article was eye opening for me. It is probably hard to completely defend against being taken advantage of packet reflection, but at least I will try to limit it. Not only to defend my VPS, but also to not help DDoS others services.
__________________
Signature: Furthermore, I consider that systemd must be destroyed. Based on Latin oratorical phrase |
|
||||
![]() Quote:
Both ICMPs are state-managed by PF, so stateful tracking options are available to rate limit them, such as: Code:
pass proto {icmp icmp6} keep state (max 5000) Last edited by jggimi; 21st June 2020 at 03:11 PM. Reason: typo |
![]() |
Thread Tools | |
Display Modes | |
|
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Co-Opted Small Business Servers | shep | News | 0 | 11th June 2016 04:13 PM |
HTTPS-crippling attack threatens tens of thousands of Web and mail servers | J65nko | News | 8 | 22nd May 2015 06:50 AM |
Virtual domains on multiple mail servers running Exim4 as MTA | satimis | General software and network | 10 | 27th November 2008 02:42 PM |
NFS your thoughts | rex | FreeBSD General | 4 | 24th September 2008 03:32 AM |
MTA thoughts | cajunman4life | General software and network | 37 | 8th June 2008 07:37 PM |