Security News
RubyGems.org Adds New Maintainer Role
RubyGems.org has added a new "maintainer" role that allows for publishing new versions of gems. This new permission type is aimed at improving security for gem owners and the service overall.
haraka-plugin-limit
Advanced tools
Apply many types of limits to SMTP connections:
- concurrent connections
- max recipients
- max unrecognized commands
- max SMTP errors
- outbound concurrency
- rate limits
- max connections / period
- max recipients / period
- by host
- by sender
- max null recipients / period
Each limit type has values that can be defined in limit.ini. The default is empty / disabled until a value has been set.
cd /etc/haraka
npm i haraka-plugin-limit
echo 'limit' >> config/plugins
Set this to the length in seconds that you want to delay every SMTP response to a remote client that has exceeded the rate limits.
Redis is the cluster-safe storage backend for maintaining the counters necessary to impose limits reliably.
If this [redis] section or any values are missing, the defaults from redis.ini are used.
When [concurrency]max
is defined, it limits the maximum number of simultaneous connections per IP address. Connection attempts in excess of the limit are optionally delayed before being disconnected.
This works well in conjunction with a history / reputation database, so that one can assign very low concurrency (1) to bad or unknown senders and higher limits for reputable mail servers.
History: when enabled, the history
setting is the name of a plugin that stores IP history / reputation results. The result store must have a positive value for good connections and negative integers for poor / undesirable connections. Karma is one such plugin.
When [recipients]max
is defined, each connection is limited to that number of recipients. The limit is imposed against all recipient attempts. Attempts in excess of the limit are issued a temporary failure.
When [unrecognized_commands]max
is set, a connection that exceeeds the limit is disconnected.
Unrecognized commands are normally SMTP verbs invalidly issued by the client. Examples:
The unrecognized_command hook is used by the tls
and auth
plugins, so
running this plugin before those would result in valid operations getting
counted against that connections limits. The solution is simple: list
limit
in config/plugins after those.
When [errors]max
is set, a connection that exceeeds the limit is disconnected. Errors that count against this limit include:
By default DENYSOFT will be returned when rate limits are exceeded. You can also tarpit the connection delaying every response.
Missing sections disable that particular test.
They all use a common configuration format:
<lookup> = <limit>[/time[unit]] (optional)
'lookup' is based upon the limit being enforced and is either an IP address, rDNS name, sender address or recipient address either in full or part. The lookup order is as follows and the first match in this order is returned and is used as the record key in Redis (except for 'default' which always uses the full lookup for that test as the record key):
IPv4/IPv6 address or rDNS hostname:
fe80:0:0:0:202:b3ff:fe1e:8329 fe80:0:0:0:202:b3ff:fe1e fe80:0:0:0:202:b3ff fe80:0:0:0:202 fe80:0:0:0 fe80:0:0 fe80:0 fe80 1.2.3.4 1.2.3 1.2 1 host.part.domain.com part.domain.com domain.com com default
Sender or Recipient address:
user@host.sub.part.domain.com host.sub.part.domain.com sub.part.domain.com part.domain.com domain.com com default
In all tests 'default' is used to specify a default limit if nothing else has matched.
'limit' specifies the limit for this lookup. Specify 0 (zero) to disable limits on a matching lookup.
'time' is optional and if missing defaults to 60 seconds. You can optionally specify the following time units (case-insensitive):
This section limits the number of connections per interval from a given host or set of hosts.
IP and rDNS names are looked up by this test.
This section limits the number of recipients per interval from a given host or set of hosts.
IP and rDNS names are looked up by this test.
This section limits the number of recipients per interval from a sender or sender domain.
The sender is looked up by this test.
This section limits the rate which a recipient or recipient domain can receive messages over an interval.
Each recipient is looked up by this test.
This section limits the rate at which a recipient can receive messages from a null sender (e.g. DSN, MDN etc.) over an interval.
Each recipient is looked up by this test.
enabled=true ; delay=30 ;example.com=10
The number after the domain is the maximum concurrency limit for that domain.
Delay is the number of seconds to wait before retrying this message. Outbound concurrency is checked on every attempt to deliver.
Code coverage for plugins doesn't work because we run plugins under vm.runInNewContext().
FAQs
enforce various types of limits on remote MTAs
The npm package haraka-plugin-limit receives a total of 701 weekly downloads. As such, haraka-plugin-limit popularity was classified as not popular.
We found that haraka-plugin-limit demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
RubyGems.org has added a new "maintainer" role that allows for publishing new versions of gems. This new permission type is aimed at improving security for gem owners and the service overall.
Security News
Node.js will be enforcing stricter semver-major PR policies a month before major releases to enhance stability and ensure reliable release candidates.
Security News
Research
Socket's threat research team has detected five malicious npm packages targeting Roblox developers, deploying malware to steal credentials and personal data.