RE: Protect sendmail from DoS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Dosing is a pretty rare occurrence, unless you are being specifically
targeted don't worry about it IMHO. DoSing usually means a specific
person or group wants to kill you off, they have decided for what ever
reason they want you dead. There are so many ways that these people can
do it for small users that in effect there is little you can do. If you
could defeat them at the box itself all they have to do is flex a little
bit more muscle and DoS your upstream router(s).

They can attach from literally thousands of smtp drones, or if that is
not enough spam you through open relays with large emails, say 4~10meg a
shot, a few hundred of them coming in will bog down your server.

The problem will be iptables looks at the packets that make up the email
and not the content of the email.

So you need to do any blocking or rate limiting at the smtp level ie per
message and not the IP level which is per packet type thing.

Why are you so concerned about DoS? There are more important things
spend the time learning how to harden the box and tune sendmail, or look
at postfix or qmail.

DoS should not be a huge risk, but if it is then you can do little, but
ride it out.

Regards

Thing

-----Original Message-----
From: Devon Harding [mailto:devonharding@xxxxxxxxx] 
Sent: Wednesday, 2 November 2005 2:08 p.m.
To: General Red Hat Linux discussion list
Subject: Re: Protect sendmail from DoS

Is there some way of using something like IPTABLES to block if it sees a
certain amount of connections from a particualar IP? I know Ciphertrust
Ironmail does this.

On 11/1/05, Steven Jones <Steven.Jones@xxxxxxxxx> wrote:
>
> Sendmail has some protection in terms of load limiting, these are a
bit
> high so you can set them lower so the server recovers sooner. This
will
> save your server but in effect it allows DoS sooner.
>
> Possibly you do not understand what a DoS is. DoS is a function of
your
> attacker overloading your network or server's capacity to handle
network
> traffic sent at it.
>
> These days unless you are a big organisation with huge pipes, big
> multiple servers and deep pockets, and someone wants you dead, your
> dead.
>
> If someone wants to take your server out they can, it is simply a
matter
> of logistics, they control 30 or 300 or 3000 or 30000 spam drones of
> hacked broadband connections and the volume these generate is amazing.
>
> I was Dos'd a while back, I was sent 5+gig of volume in 2~3 minutes,
my
> 512k cable modem could not cope so in effect the DoS happened at the
> ISP's end of my pipe, totally outside of my control.
>
> Modern machines, even desktop ones should be able to handle a lot of
> mail, if you are having issues with DoS's then maybe it is something
> else.
>
> Regards
>
> Thing
>
>
>
> -----Original Message-----
> From: Devon Harding [mailto:devonharding@xxxxxxxxx]
> Sent: Wednesday, 2 November 2005 10:43 a.m.
> To: General Red Hat Linux discussion list
> Subject: Protect sendmail from DoS
>
> How can I protect my sendmail server against DoS attacks?
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=subscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>
>
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>
-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=subscribe
https://www.redhat.com/mailman/listinfo/redhat-list


-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux