I've been happily using denyhosts for ssh brute force attacks, 1. What are best practices for the same functionality for Postfix 2. Are there "gotcha's" for trying to use denyhosts/fail2ban for this 3. Should I use something else?
I'd like to stop attacks at the iptable/tcpwrapper level before it eats up postfix resources. Sorry if that has already been asked. Best, Cam