Release Date: July, 2008
Proactive Botnet Detection with the MTA IP Blocker
As part of the Sophos Sender Genotype, PureMessage's MTA-level IP blocking capabilities have been expanded to optionally include reverse DNS (RDNS) tests and checks against a list of known dynamic IP addresses. SophosLabs specifies hostname patterns to block connections attempted by machines with dynamically assigned IP addresses. For an explanation of SophosLabs IP address classifications, see http://sophos.com/security/ip-lookup.
The majority of dynamic hosts that send spam belong to botnets, which are groups of zombie computers. Although PureMessage was already capable of detecting dynamic IP addresses, it can now be done at connection time, thereby reducing the number of messages that the PureMessage policy engine has to process.
These extended detection features are disabled by default. They can be enabled via the blocklist.conf configuration file in /opt/pmx/etc/pmx.d.
The improved functionality allows you to:
If you are using PureMessage with an external installation of sendmail, you must have the newest version of the sockmap.m4 file, which is distributed as part of the sendmail version bundled with PureMessage.
In this release, the sockmap.m4 file has been altered to enable extended IP blocking in the form of reverse DNS checks. If you have an external sendmail installation that has been configured to work with PureMessage, you must retrieve the new version of the sockmap.m4 file and copy it to your existing sendmail installation.
To get the sockmap file from the sendmail version included with 5.4.3, follow the instructions (beginning with step 2) in the “Configuring IP Blocking (External Sendmail Version)” section of the Getting Started Guide.
For more about the new features, see “Enabling or Disabling MTA IP Blocking” in the Manager Reference and the blocklist.conf man page.
Other Improvements
pmx_relay
) so
that it detects the first untrusted relay. This cannot be done in the PureMessage Policy
Constructor. It must be specified directly in the Sieve code. For more information, see the
pmx-policy man page. (SUG20315)pmx_forward
) test, which previously only accepted single strings, now
accepts string lists, making it possible to specify multiple, comma-separated addresses for a
single pmx_forward
test. Although this test also appears in the Policy
Constructor as "Forward To," string lists can only be configured directly in the Sieve code.
See the pmx-policy man page for more information. (DEF19159)