I have to disagree here. A blocking mechanism, even if it would consume
more CPU cycles than the repeated AUTH LOGIN-reject pattern, would be
very useful as it would effectively stop any brute force attemtps. When
an attacker is limited to say 5 consecutive tries every 5 minutes, a
brute force attack is meaningless.
Actually it's not meaningless. The server still have to receive and respond to the connection, check it against the short term listing held in memory can then send back the bounce message. This requires some CPU time. Rejecting the AUTH takes a couple more steps but it's not all that much more since there is no DATA received. A real DOS attack is a lot more difficult to handle as well but even there Mercury/32 soldiers on receiving the good mail, albeit a bit slower.
In contrast, the current situation
does not provide any protection against long term attacks, even with
good password an attack will be successful given enough time.
Well they have been attacking me for quite some time not and there has been no success. My usernames and password are not all that difficult either. In addition, the short term black listing is only 30 minutes after which they come in again. If this is being done by a robot it can be kept up forever.
And tell
me about educating users to use real good strong passwords ^^.
Granted, I could force strong passwords, but still... I'm looking for a
solution, not a work around. Take for example the common best practice
Windows-Password policy, it says block any login attempts for 5 minutes
after 5 wrong passwords within 5 minutes. There must be a reason why
this is the recommended policy (which I agree fully agree to, btw.)
The solution is to completely block the connecting host forever if you really want to stop this sort of attack. The problem with this solution is that you will block good mail in at least some cases. FWIW, our corporate systems blocked login for 30 minutes after 3 bad login attempts to Windows and other operating systems but this was protecting data and that's a very different situation than what you have here. The AUTH is not protecting data, it's just trying to block spammers from using our systems to relay. A nuisance to handle, but no data is involved.
<blockquote>I have to disagree here. A blocking mechanism, even if it would consume
more CPU cycles than the repeated AUTH LOGIN-reject pattern, would be
very useful as it would effectively stop any brute force attemtps. When
an attacker is limited to say 5 consecutive tries every 5 minutes, a
brute force attack is meaningless. </blockquote>Actually it's not meaningless.&nbsp; The server still have to receive and respond to the connection, check it against the short term listing held in memory can then send back the bounce message. &nbsp; This requires some CPU time.&nbsp; Rejecting the AUTH takes a couple more steps but it's not all that much more since there is no DATA received.&nbsp; A real DOS attack is a lot more difficult to handle as well but even there Mercury/32 soldiers on receiving the good mail, albeit a bit slower.
<blockquote>In contrast, the current situation
does not provide any protection against long term attacks, even with
good password an attack will be successful given enough time.</blockquote>Well they have been attacking me for quite some time not and there has been no success.&nbsp; My usernames and password are not all that difficult either.&nbsp; In addition, the short term black listing is only 30 minutes after which they come in again.&nbsp; If this is being done by a robot it can be kept up forever.&nbsp;
<blockquote>And tell
me about educating users to use <u>real</u> good strong passwords ^^.
Granted, I could force strong passwords, but still... I'm looking for a
solution, not a work around. Take for example the common best practice
Windows-Password policy, it says block any login attempts for 5 minutes
after 5 wrong passwords within 5 minutes. There must be a reason why
this is the recommended policy (which I agree fully agree to, btw.)</blockquote><p>The solution is to completely block the connecting host forever if you really want to stop&nbsp; this sort of attack.&nbsp; The problem with this solution is that you will block good mail in at least some cases.&nbsp; FWIW, our corporate systems blocked login for 30 minutes after 3 bad login attempts to Windows and other operating systems but this was protecting data and that's a very different situation than what you have here.&nbsp; The AUTH is not protecting data, it's just trying to block spammers from using our systems to relay.&nbsp; A nuisance to handle, but no data is involved.
</p><p>&nbsp;</p>