smtpIptablesBlocker

smtpIptablesBlocker_logo-02This script is the result of my search for a way to make my mail server more resilient against spam waves. Take a look at following links(1,2,3) if you want to know more about the history/process to this solution. I use courier as MTA and IMAP backend for it.

Introduction

To fight the spam I’m using DNS RBL as first line of defense, followed by greylisting, spam assassin and some other stuff. The ratio of spam which gets through is quite low but thats not the problem at this point. The problem is the spam waves that hit the server several times a day. Normally the system has under 30 open SMTP connections to/from others server, but within minutes that value raises drastically (and courier creates a process for each). For example look at the values which show the amount of open SMTP connections at the given moment.


Mon Jul 27 19:12:17 CEST 2009 4
....
Mon Jul 27 19:12:32 CEST 2009 7
Mon Jul 27 19:12:37 CEST 2009 13
Mon Jul 27 19:12:42 CEST 2009 9
Mon Jul 27 19:12:47 CEST 2009 8
Mon Jul 27 19:12:52 CEST 2009 50
Mon Jul 27 19:12:57 CEST 2009 88
Mon Jul 27 19:13:02 CEST 2009 101
Mon Jul 27 19:13:07 CEST 2009 120
.....
Mon Jul 27 19:13:33 CEST 2009 163
Mon Jul 27 19:13:38 CEST 2009 167
.....
Mon Jul 27 19:17:24 CEST 2009 301
Mon Jul 27 19:17:30 CEST 2009 301
Mon Jul 27 19:17:35 CEST 2009 301
Mon Jul 27 19:17:40 CEST 2009 301

300 is the limit of active connections. At this point the mail server adds following to the log and does not accept any new connections.


Jul 27 19:17:23 mail courieresmtpd: 300 maximum active connections.
Jul 27 19:18:24 mail courieresmtpd: 300 maximum active connections.
Jul 27 19:21:14 mail courieresmtpd: 300 maximum active connections.

This script now solves my problem. It looks through the maillog and adds every DNS RBL listed IP to the firewall for 10 minutes. After that it just terminates the process which handles the connection. This leads to a reduced process number at once and makes space for a new one. A clean solution would implement my complete script in the mta itself – basically adding the IP to the firewall and terminating the smtp handling process. But this works also stable so far until something like this is added to courier (if it ever will be)
.

Install – Iptables stuff

First load the iptables module somewhere at boot time with an option to allow more IP addresses stored.


modprobe ipt_recent ip_list_tot=1000

I think 1000 is quite on the low end, as the spam waves easily reach them. Then add following iptables commands to your firewall script.


# build sub chain
$iptables -N SPAMMER
# move all incomming smtp traffic there
$iptables -A INPUT -p tcp --dport 25 -j SPAMMER
# check if the source ip is already in the list, if so give it another 600 sec and drop the packages
$iptables -A SPAMMER -m recent --name spammer --update --seconds 600 -j DROP

As you can see we drop the packets for 10 minutes. If a packet is send within that 10min the time period starts again.

You can test your setup by doing the following.


echo +1.1.1.1 >/proc/net/ipt_recent/spammer

and take a look at


cat /proc/net/ipt_recent/spammer

Replace 1.1.1.1 by an IP address of a spammer (just look in your logfile 😉 ) and see it working.

Install Daemon

Ok, now that we have the kernel/iptables part we need the script which adds the IP addresses of spammers on a DNS RBL after the first 5xx to the ipt_recent list.

Download the script here: smtpIptablesBlocker-0.1.tar.bz2

Copy the smtpIptablesBlocker.py deamon.py to /usr/local/sbin/ and edit the smtpIptablesBlocker.py file to reflect the location of your mail.err log file.

Now we need to link it to the init.d and get it in the runlevels:


#ln -s /usr/local/sbin/smtpIptablesBlocker.py /etc/init.d/smtpIptablesBlocker

on Debian/Ubuntu use following


# update-rc.d smtpIptablesBlocker defaults 21
Adding system startup for /etc/init.d/smtpIptablesBlocker ...
/etc/rc0.d/K21smtpIptablesBlocker -> ../init.d/smtpIptablesBlocker
/etc/rc1.d/K21smtpIptablesBlocker -> ../init.d/smtpIptablesBlocker
/etc/rc6.d/K21smtpIptablesBlocker -> ../init.d/smtpIptablesBlocker
/etc/rc2.d/S21smtpIptablesBlocker -> ../init.d/smtpIptablesBlocker
/etc/rc3.d/S21smtpIptablesBlocker -> ../init.d/smtpIptablesBlocker
/etc/rc4.d/S21smtpIptablesBlocker -> ../init.d/smtpIptablesBlocker
/etc/rc5.d/S21smtpIptablesBlocker -> ../init.d/smtpIptablesBlocker

Take it to a test ride with


/etc/init.d/smtpIptablesBlocker start
tail -f /var/log/smtpIptablesBlocker.log

On Debian/Ubuntu you need to tell the syslogd that it should not do the log rotate, as this should be handled by logrotate, which is able to inform us about it.

Replace in /etc/cron.daily/sysklogd:

logs=$(syslogd-listfiles)

by

logs=$(syslogd-listfiles -s "(mail\.err|smtpIptablesBlocker\.log)")

and in /etc/cron.weekly/sysklogd

logs=$(syslogd-listfiles --weekly)

by

logs=$(syslogd-listfiles --weekly -s "(mail\.err|smtpIptablesBlocker\.log)")

Now we can add the logrotate config (/etc/logrotate.d/courier)


/var/log/mail.err /var/log/smtpIptablesBlocker.log {
    notifempty
    delaycompress
    sharedscripts
    prerotate
        /etc/init.d/smtpIptablesBlocker stop
    endscript
    postrotate
        /etc/init.d/sysklogd reload-or-restart
        /etc/init.d/smtpIptablesBlocker start
    endscript
}

And the result? Just look at this really big spam wave – and we’re able to scale it.


Tue Jul 28 14:36:44 CEST 2009 1
Tue Jul 28 14:36:49 CEST 2009 1
Tue Jul 28 14:36:54 CEST 2009 34
Tue Jul 28 14:36:59 CEST 2009 56
Tue Jul 28 14:37:04 CEST 2009 52
Tue Jul 28 14:37:09 CEST 2009 60
Tue Jul 28 14:37:14 CEST 2009 87
Tue Jul 28 14:37:19 CEST 2009 126
Tue Jul 28 14:37:24 CEST 2009 128
Tue Jul 28 14:37:29 CEST 2009 140
Tue Jul 28 14:37:34 CEST 2009 138
Tue Jul 28 14:37:39 CEST 2009 143
Tue Jul 28 14:37:44 CEST 2009 161
Tue Jul 28 14:37:49 CEST 2009 198
Tue Jul 28 14:37:54 CEST 2009 208
....
Tue Jul 28 14:41:11 CEST 2009 131
Tue Jul 28 14:41:16 CEST 2009 147
Tue Jul 28 14:41:21 CEST 2009 134
Tue Jul 28 14:41:26 CEST 2009 133
Tue Jul 28 14:41:31 CEST 2009 128
Tue Jul 28 14:41:36 CEST 2009 103
Tue Jul 28 14:41:41 CEST 2009 74
Tue Jul 28 14:41:47 CEST 2009 98
Tue Jul 28 14:41:52 CEST 2009 91
....
Tue Jul 28 14:43:27 CEST 2009 28
Tue Jul 28 14:43:32 CEST 2009 26
Tue Jul 28 14:43:37 CEST 2009 20
Tue Jul 28 14:43:42 CEST 2009 15
Tue Jul 28 14:43:47 CEST 2009 14
Tue Jul 28 14:43:52 CEST 2009 14
Tue Jul 28 14:43:57 CEST 2009 15
Tue Jul 28 14:44:02 CEST 2009 11
Tue Jul 28 14:44:07 CEST 2009 6
Tue Jul 28 14:44:12 CEST 2009 9
Tue Jul 28 14:44:17 CEST 2009 7

As you see 300 is never reached. Our server is the whole time reachable for our customers.

Powered by WordPress
Entries and comments feeds. Valid XHTML and CSS. 29 queries. 0.068 seconds.