I've been happily using denyhosts for ssh brute force attacks, 

1. What are best practices for the same functionality for Postfix
2. Are there "gotcha's" for trying to use denyhosts/fail2ban for this
3. Should I use something else?

I'd like to stop attacks at the iptable/tcpwrapper level before it eats
up postfix resources. Sorry if that has already been asked.

Best,
Cam

Reply via email to