Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort time from alert to block

    Scheduled Pinned Locked Moved pfSense Packages
    18 Posts 4 Posters 6.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jandohrmann
      last edited by

      The challenge is not spam but outside machines that are trying to log on to the mail sender so they could send mail from it.

      The mail sender recognize the logon attempt and blocks it but I want to stop it in the firewall.

      The question is how to stop a SMTP telegram with content AUTH.

      Snort detects the package and sends it to the block list. The problem is that pfSense "detects" it to late and let the attacker try several times. With a bot net trying right now with several attempts per second it is a huge problem.

      Best regards
      Jan

      1 Reply Last reply Reply Quote 0
      • BBcan177B
        BBcan177 Moderator
        last edited by

        What kind of Mail server are you using?

        "Experience is something you don't get until just after you need it."

        Website: http://pfBlockerNG.com
        Twitter: @BBcan177  #pfBlockerNG
        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

        1 Reply Last reply Reply Quote 0
        • J
          jandohrmann
          last edited by

          I am using James (java based)

          1 Reply Last reply Reply Quote 0
          • BBcan177B
            BBcan177 Moderator
            last edited by

            I tried to look online but couldn't find any detail about how to check for DNSRBL in the James Project Mail server software.

            I found some traces online, so it has DNSRBL's available. You need to configure them to block the known spammers.

            You should reject on the following -

            reject_invalid_hostname
            reject_non_fqdn_hostname
            reject_non_fqdn_sender

            reject_rbl_client use zen.spamhaus.org
            reject_rbl_client use bl.spamcop.net

            There are several other RBL lists available.. See    http://multirbl.valli.org/list/ or MxToolBox for other lists.

            Taken from the James Website

            James seems to be an open relay for Spam, is it?

            In some simple tests of mail relays James appears to be an open relay, properly configured it is not.
            Because James is an email application platform it currently accepts all mail delivered to it via SMTP for processing. Only after the mail has been recieved does this processing begin.
            This means that James accepts Spam. However the default configuration, and any sensible re-configuration has a number of anti-spam measures which will prevent the re-transmisson of spam from James. This makes it a blackhole for spam.

            This also means that James will not verify addresses, but of course this means that valid addresses can't be harvested from James by spammers either.

            As I said earlier, you have to leave port 25 open, but you can use pfBlocker and add sites like Spamhaus, Emerging Threats, AlienVault, dShield, CIArmy, IBlocklist, SpyEye, Malware Domain List, SRI, DRG etc etc

            These can block the known spammers before they try to get to your mail server.

            Than the Mail server needs to do the rest. Like Not Relay Mail, Check the SPF records, lookup hostname, check for FQDN etc…

            But they need to login to port 25 to do that.

            You could also install OSSEC on the Mail server that can block offenders after repeated failures.

            "Experience is something you don't get until just after you need it."

            Website: http://pfBlockerNG.com
            Twitter: @BBcan177  #pfBlockerNG
            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

            1 Reply Last reply Reply Quote 0
            • J
              jandohrmann
              last edited by

              Hi,

              The problem is solved.

              @bmeeks you are right - it is important to set the option to kill states when blocking offenders on the Snort Interface tab and pfSense will block the attacker before the SMTP AUTH telegram come through. The reason why I still got attacks was that the attacker went to TLS so the SMTP AUTH attempt was encapsulated. The solution to that was to let Snort identify SMTP STARTTLS telegrams from the outside and let pfSense block them.

              @Bcan17 Thank you for the James information. The mentioned settings are already used and relaying can not happen if the attacker is on an outside network (send denied) and/or do not know a valid user/password pair (send denied). Another mail server would have the same issue - if port 25 is open nothing blocks an attacker from trying to log in on a mail server with either plain text or through TLS. Snort and pfSense can block it. My mail server went from 5 unsuccessful logon attempts per second to 0.

              Best Regards
              Jan

              1 Reply Last reply Reply Quote 0
              • S
                Supermule Banned
                last edited by

                My mailserver blocks the IP for a month if failed to authenticate more than 5 times. It works.

                1 Reply Last reply Reply Quote 0
                • J
                  jandohrmann
                  last edited by

                  Hi Supermule,

                  My mail server does the same but under attack the mail server have to handle a lot of attempts through port 25. Would you agree in that it is better to let the firewall shield the mail server from outside logon attempts by blocking SMTP AUTH?

                  Best Regards
                  Jan

                  1 Reply Last reply Reply Quote 0
                  • S
                    Supermule Banned
                    last edited by

                    Yes, thats why I think Snort is great since it takes the brute force attempts and blocks them.

                    I have set it to block forever and kill states. They simply run out of fuel for Ddos and other things… :D

                    1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks
                      last edited by

                      @jandohrmann:

                      Hi,

                      The problem is solved.

                      @bmeeks you are right - it is important to set the option to kill states when blocking offenders on the Snort Interface tab and pfSense will block the attacker before the SMTP AUTH telegram come through. The reason why I still got attacks was that the attacker went to TLS so the SMTP AUTH attempt was encapsulated. The solution to that was to let Snort identify SMTP STARTTLS telegrams from the outside and let pfSense block them.

                      Best Regards
                      Jan

                      Glad you solved it.  I will add a TODO list item to make sure "kill states" is the default when enabling BLOCK OFFENDERS.  I will allow a user to uncheck the box if they wish, but I will code it so the default state is checked.

                      Bill

                      1 Reply Last reply Reply Quote 0
                      • BBcan177B
                        BBcan177 Moderator
                        last edited by

                        @jandohrmann:

                        alert tcp $EXTERNAL_NET any -> any 25 (msg:"SMTP AUTH LOGON brute force attempt"; content:"AUTH LOGIN"; nocase; classtype:suspicious-login; sid:1000001; rev:2;)

                        I didn't see the "content:"AUTH LOGIN" in the rule above. My bad. Thought you were blocking port 25 completely at first glance.

                        "Experience is something you don't get until just after you need it."

                        Website: http://pfBlockerNG.com
                        Twitter: @BBcan177  #pfBlockerNG
                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.