Thanks for taking the time to reply Paul.
"First I doubt these attempts are doing much on your connection
bandwidth - they may look busy, but there is very little data
transferred.
There are ways - it depends on the actual connection attempt. Have
you looked at the Compliance tab and also the TRANSFLT.MER file?"
A snapshot from the MercuryS logfile looks something like this:
T 20110214 182413 4d596e0f Connection from 91.200.215.157
T 20110214 182413 4d596e0f EHLO [91.200.215.157]
T 20110214 182414 4d596e0f MAIL FROM:<rt@bigfix.co.uk> SIZE=1016 BODY=7BIT
E 20110214 182414 4d596e0f Host 91.200.215.157 blocked by Spamhaus - zen - message rejected.
T 20110214 182414 4d596e0f RSET
T 20110214 182414 4d596e0f MAIL FROM:<raavy@rentnoje.se> SIZE=1016 BODY=7BIT
E 20110214 182414 4d596e0f Host 91.200.215.157 blocked by Spamhaus - zen - message rejected.
T 20110214 182414 4d596e0f RSET
T 20110214 182415 4d596e0f MAIL FROM:<robert.clerke@glqlaw.co.uk> SIZE=1016 BODY=7BIT
E 20110214 182415 4d596e0f Host 91.200.215.157 blocked by Spamhaus - zen - message rejected.
T 20110214 182415 4d596e0f RSET
//snip//
T 20110214 182749 4d596e0f MAIL FROM:<<overactingfraudgroup@hsbc.co.uk>,
E 20110214 182749 4d596e0f Host 91.200.215.157 blocked by Spamhaus - zen - message rejected.
T 20110214 182749 4d596e0f <owenwilliams@hsbc.co.uk>,
T 20110214 182749 4d596e0f <nline-accountreminder@hsbc.co.uk>,
T 20110214 182749 4d596e0f <nline.customerservice@hsbc.co.uk>,
T 20110214 182749 4d596e0f <nlinenotification@hsbc.co.uk>> SIZE=1016 BODY=7BIT
T 20110214 182749 4d596e0f RSET
//snip//
T 20110214 182750 4d596e0f Connection closed with 91.200.215.157, 217 sec. elapsed.
In the Compliance tab I have:
Require clients to use ESMTP SIZE declaration = not selected
Max number failed RSPRs = 3
Max number relay attempts = 3
Enable short term blacklisting = yes
Enable transaction-level expression filtering = yes
under the 'Restrictions to apply to message content I only have "Refuse messages that have no 'Date' field" selected (have tried Refuse pure HTML and non-MIME but they stop messages from legitimate users.
The TRANSFLT.MER file looks like this:
H, "*xxx.xxx.xxx.xxx*", R, "554 Action not allowed."
H, "*GET*", R, "554 Action not allowed."
H, "*AUTH LOGIN*", R, "554 Action not allowed."
R, "*AUTH LOGIN*", R, "554 Action not allowed."
H, "*EHLO windows*", R, "554 Action not allowed."
... I know the last 4 are long shots but I thought i may give them a try. From the continued influx of the above mentioned it had no impact whatsoever! Oh well [:(]
As some of the probes you mention in my second question and the possible iPhone connections in my third question come in I simple add the complete IP range (using ARIN,RIPE, APNIC etc.) to the list (depending location) of banned ranges in 'Connection control'. Like I say, a bit drastic but common sence kicks in in the main, for example, I know nobody in the middle east or Ukraine.
Regarding Graywall/Greywall I looked at that today and am weighing up to advantages over disadvantages mentioned.
Thanks again Paul
Kind regards
Ron
<p>Thanks for taking the time to reply Paul.</p>
<p>"First I doubt these attempts are doing much on your connection
bandwidth - they may look busy, but there is very little data
transferred.</p>
<p>There are ways - it depends on&nbsp;the actual connection attempt.&nbsp; Have
you looked at the Compliance tab and also the TRANSFLT.MER file?"</p>
<p>
&nbsp;A snapshot from the MercuryS logfile looks something like this:
</p>
<p style="font-weight: bold;">T 20110214 182413 4d596e0f Connection from 91.200.215.157
T 20110214 182413 4d596e0f EHLO [91.200.215.157]
T 20110214 182414 4d596e0f MAIL FROM:&lt;rt@bigfix.co.uk&gt; SIZE=1016 BODY=7BIT
E 20110214 182414 4d596e0f Host 91.200.215.157 blocked by Spamhaus - zen - message rejected.
T 20110214 182414 4d596e0f RSET
T 20110214 182414 4d596e0f MAIL FROM:&lt;raavy@rentnoje.se&gt; SIZE=1016 BODY=7BIT
E 20110214 182414 4d596e0f Host 91.200.215.157 blocked by Spamhaus - zen - message rejected.
T 20110214 182414 4d596e0f RSET
T 20110214 182415 4d596e0f MAIL FROM:&lt;robert.clerke@glqlaw.co.uk&gt; SIZE=1016 BODY=7BIT
E 20110214 182415 4d596e0f Host 91.200.215.157 blocked by Spamhaus - zen - message rejected.
T 20110214 182415 4d596e0f RSET
//snip//
T 20110214 182749 4d596e0f MAIL FROM:&lt;&lt;overactingfraudgroup@hsbc.co.uk&gt;,
E 20110214 182749 4d596e0f Host 91.200.215.157 blocked by Spamhaus - zen - message rejected.
T 20110214 182749 4d596e0f &nbsp;&nbsp;&nbsp; &lt;owenwilliams@hsbc.co.uk&gt;,
T 20110214 182749 4d596e0f &nbsp;&nbsp;&nbsp; &lt;nline-accountreminder@hsbc.co.uk&gt;,
T 20110214 182749 4d596e0f &nbsp;&nbsp;&nbsp; &lt;nline.customerservice@hsbc.co.uk&gt;,
T 20110214 182749 4d596e0f &nbsp;&nbsp;&nbsp; &lt;nlinenotification@hsbc.co.uk&gt;&gt; SIZE=1016 BODY=7BIT
T 20110214 182749 4d596e0f RSET
//snip//
T 20110214 182750 4d596e0f Connection closed with 91.200.215.157, 217 sec. elapsed.
</p>
<p>
In the Compliance tab I have:</p>
<p><span style="font-style: italic;">Require clients to use ESMTP SIZE declaration = not selected</span><br style="font-style: italic;"><span style="font-style: italic;">Max number failed RSPRs = 3</span><br style="font-style: italic;"><span style="font-style: italic;">Max number relay attempts = 3</span><br style="font-style: italic;"><span style="font-style: italic;">Enable short term blacklisting = yes</span><br style="font-style: italic;"><span style="font-style: italic;">Enable transaction-level expression filtering = yes</span>
</p>
<p>under the 'Restrictions to apply to message content I only have "Refuse messages that have no 'Date' field" selected (have tried Refuse pure HTML and non-MIME but they stop messages from legitimate users.</p>
<p>The TRANSFLT.MER file looks like this:</p>
<p><span style="font-weight: bold;">H, "*xxx.xxx.xxx.xxx*", R, "554 Action not allowed."</span><br style="font-weight: bold;"><span style="font-weight: bold;">H, "*GET*", R, "554 Action not allowed."</span><br style="font-weight: bold;"><span style="font-weight: bold;">H, "*AUTH LOGIN*", R, "554 Action not allowed."</span><br style="font-weight: bold;"><span style="font-weight: bold;">R, "*AUTH LOGIN*", R, "554 Action not allowed."</span><br style="font-weight: bold;"><span style="font-weight: bold;">H, "*EHLO windows*", R, "554 Action not allowed."</span>
</p>
<p>... I know the last 4 are long shots but I thought i may give them a try. From the continued influx of the above mentioned it had no impact whatsoever! Oh well [:(]</p>
<p>As some of the probes you mention in my second question and the possible iPhone connections in my third question come in I simple add the complete IP range (using ARIN,RIPE, APNIC etc.) to the list (depending location) of banned ranges in 'Connection control'. Like I say, a bit drastic but common sence kicks in in the main, for example, I know nobody in the middle east or Ukraine.</p>
<p>Regarding Graywall/Greywall I looked at that today and am weighing up to advantages over disadvantages mentioned.</p>
<p>Thanks again Paul</p>
<p>Kind regards</p>
<p>Ron
&nbsp;</p>