Hi again,
Thanks very much to everyone who offered help and/or suggestions.
I ran with the following:
To get real serious about blocking from the IP or the IP range, make a customized template in tcprules to drop all traffic.
-mkdir /etc/e-smith/templates-custom/etc/tcprules/tcp.smtp/
-start a new file called 85customdeny with the following:
{
$OUT = "x.x.x.x:deny\n";
}
-rebuild the file with a: /sbin/e-smith/expand-template /etc/tcprules/tcp.smtp
-pickup the changes with a: /sbin/e-smith/signal-event email-update
So far, this
seems to have done the trick!
Does anyone know where (or if) any events denied by this rule would be logged?
My SME box is the mail & webserver. It is sitting in a DMZ, so the firewall that sits in front of it simply exposes it to the world.
The box was grinding to a halt (like a Dos situation) because some infected PC is (was ??) flooding it with spoofed emails. Spamassassin and the virus scanner were processing them, but bringing the box to a virtual standstill.
I have contacted the ISP of the offending PC, but they were "less than helpful" !
Hoping for the best,
-AH.