On 11/29/2017 02:43 PM, Emanuel Gonzalez wrote:
Hello.!!my idea is to block the IP that makes the unsuccessful login attempts to the smtp service. On the web I found the following rule, but not if it is what I need. acl_smtp_auth: drop message = authentication is allowed only once per message set acl_m_auth = ${eval10:0$acl_m_auth+1} condition = ${if >{$acl_m_auth}{2}} delay = 30s accept
I am using in my acl_smtp_connect
defer hosts = /opt/exim/blackips
The file "blackips" is dynamically build up by a cron-Job grepping through the
exim log.
The good magic is that exim is aware of modification on my blacklist file
without HUP / reload / restart.
Regards, Olaf
--
Karlsruher Institut für Technologie (KIT)
ATIS - Abt. Technische Infrastruktur, Fakultät für Informatik
Dipl.-Geophys. Olaf Hopp
- Leitung IT-Dienste -
Am Fasanengarten 5, Gebäude 50.34, Raum 009
76131 Karlsruhe
Telefon: +49 721 608-43973
Fax: +49 721 608-46699
E-Mail: [email protected]
atis.informatik.kit.edu
www.kit.edu
KIT – Die Forschungsuniversität in der Helmholtz-Gemeinschaft
Das KIT ist seit 2010 als familiengerechte Hochschule zertifiziert.
smime.p7s
Description: S/MIME Cryptographic Signature
-- ## List details at https://lists.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://wiki.exim.org/
