Community Discussions and Support
MercuryP POP3 Attacks

Okay, I don't have a fantastic solution, but maybe you could run your pop3 server on a different port from the default port, so attackers that are just guessing you have pop3 because you SEND / ACCEPT mail will be thrown off the trail.  Of course it will mean informing all of your users ... which might be a major headache!

*that's what I did when I was just starting and people were trying to connect to my pop3 and I didn't even have any users yet ! ! !,  I changed port and now get no unwanted attention* 

<p>Okay, I don't have a fantastic solution, but maybe you could run your pop3 server on a different port from the default port, so attackers that are just guessing you have pop3 because you SEND / ACCEPT mail will be thrown off the trail.  Of course it will mean informing all of your users ... which might be a major headache!</p><p>*that's what I did when I was just starting and people were trying to connect to my pop3 and I didn't even have any users yet ! ! !,  I changed port and now get no unwanted attention* </p>

Sometimes we get brute force attacks repeatedly trying to guess POP3 passwords. Is there some way to automatically throttle or short term black list an IP after some specified number of failed password attempts? I know we can manually block IP addresses. I would like to have it occur automatically.

-Paul

<P>Sometimes we get brute force attacks repeatedly trying to guess POP3 passwords. Is there some way to automatically throttle or short term black list an IP after some specified number of failed password attempts? I know we can manually block IP addresses. I would like to have it occur automatically.</P> <P>-Paul</P>

[quote user="Paul"]

Sometimes we get brute force attacks repeatedly trying to guess POP3 passwords. Is there some way to automatically throttle or short term black list an IP after some specified number of failed password attempts? I know we can manually block IP addresses. I would like to have it occur automatically.

[/quote]

MercuryI has this type of intruder detection logic in place, but for some reason I've never added it to MercuryP. Under normal circumstances, I'd offer to add it, because it's not a very difficult task... But I've spent the afternoon packaging up a v4.5 release candidate archive and it's really now too late to consider adding any more new features for v4.5. I'll certainly add it early in the post-release development process though.

Cheers!

-- David --

[quote user="Paul"]<p>Sometimes we get brute force attacks repeatedly trying to guess POP3 passwords. Is there some way to automatically throttle or short term black list an IP after some specified number of failed password attempts? I know we can manually block IP addresses. I would like to have it occur automatically.</p>[/quote] MercuryI has this type of intruder detection logic in place, but for some reason I've never added it to MercuryP. Under normal circumstances, I'd offer to add it, because it's not a very difficult task... But I've spent the afternoon packaging up a v4.5 release candidate archive and it's really now too late to consider adding any more new features for v4.5. I'll certainly add it early in the post-release development process though. Cheers! -- David --

I got tired of getting POP3 attacks such as these, which happened this afternoon.

Several hours later, after translating the Mercury daemon headers into Delphi.... I wrote a Mercury daemon in Delphi, and tried it out....

I tried connecting to my own POP3 server (just connecting, no password guessing at all, and it worked).  The trigger is for the same host to connect more than once in 5 seconds to the POP3 server.

 

<p>I got tired of getting POP3 attacks such as these, which happened this afternoon. </p><p><img src="https://lh3.googleusercontent.com/-d97WkRx2w5Q/T9CJ38ojNcI/AAAAAAAAC98/aUbW2OQiakk/s512/POP3Attacks.jpg" mce_src="https://lh3.googleusercontent.com/-d97WkRx2w5Q/T9CJ38ojNcI/AAAAAAAAC98/aUbW2OQiakk/s512/POP3Attacks.jpg" width="512" height="385"></p><p>Several hours later, after translating the Mercury daemon headers into Delphi.... I wrote a Mercury daemon in Delphi, and tried it out....</p><p>I tried connecting to my own POP3 server (just connecting, no password guessing at all, and it worked).  The trigger is for the same host to connect more than once in 5 seconds to the POP3 server. </p><p> <img src="https://lh6.googleusercontent.com/-3vyga9NE4jU/T9CKuJpU4TI/AAAAAAAAC-E/O4yZK_M6IIE/s384/AttackStopped.jpg" mce_src="https://lh6.googleusercontent.com/-3vyga9NE4jU/T9CKuJpU4TI/AAAAAAAAC-E/O4yZK_M6IIE/s384/AttackStopped.jpg" width="384" height="241"></p>

Which Mercury version are you using?  The current one does have a short-term blacklist on MercuryP.

Edit: Ah, but that blacklist only works if the rejects are in the same connection - not if they are all separate as your example.

This would be useful extension for some admins.

<P>Which Mercury version are you using?  The current one does have a short-term blacklist on MercuryP.</P> <P>Edit: Ah, but that blacklist only works if the rejects are in the same connection - not if they are all separate as your example.</P> <P>This would be useful extension for some admins.</P>
live preview
enter atleast 10 characters
WARNING: You mentioned %MENTIONS%, but they cannot see this message and will not be notified
Saving...
Saved
With selected deselect posts show selected posts
All posts under this topic will be deleted ?
Pending draft ... Click to resume editing
Discard draft