On 17 October 2011 11:31, Robert Schetterer <rob...@schetterer.org> wrote:
> Am 17.10.2011 17:16, schrieb Simon Brereton:
>> Hi
>>
>> This is a new one on me - I've never seen spammers attempt to use to SASL 
>> Auth to inject spam.  None of the users they are trying (newsletter, dummy, 
>> test, etc.) exist, but what worries me is the illegal chars error - is this 
>> a known vulnerability in dovecot they are trying to exploit?  I'm running 
>> 1:1.2.15-7 installed from apt-get..
>>
>> Oct 17 15:07:16 mail postfix/smtpd[14422]: connect from 
>> unknown[208.86.147.92]
>> Oct 17 15:07:16 mail dovecot: auth(default): 
>> passdb(newslet...@mydomain.net,208.86.147.92): Attempted login with password 
>> having illegal chars
>> Oct 17 15:07:17 mail dovecot: pop3-login: Disconnected (auth failed, 1 
>> attempts): user=<t...@mydomain.net>, method=PLAIN, rip=208.86.147.92, 
>> lip=83.170.64.84
>> Oct 17 15:07:18 mail postfix/smtpd[14403]: warning: 208.86.147.92: hostname 
>> default-208-86-147-92.nsihosting.net verification failed: Name or service 
>> not known
>>
>>
>> Simon
>>
>
> this maybe a brute force attack,or more easy someone missconfigured his
> client , you may use fail2ban etc to block it
> not directly related to dovecot

17 queries in 30 seconds is not a misconfigured client :)

And I'm already using Fail2Ban - but as someone on this list pointed
out recently, that doesn't apply if they try X attempts on the same
connection.  Although, I don't think that was case here - maybe I
should update my dovecot jail with that illegal chars line.  But, be
that as it may - all these attempts failed because the user didn't
exist.  What if the user exists though?  Does this illegal chars make
a hole for them to enter through?

Simon

Reply via email to