Am 27.02.2013 22:08, schrieb Robert Moskowitz:
> Lesson here about how open you make a new server while under construction.  
> Fortunately for me, my first step
> before starting postfix was to apply my 'recipe' of postconf commands?  
> Anyway the system is publicly addressed,
> but on a different subnet than the production box it will replace.  I am 
> running this way, as this time if all goes
> right (and this is my 5th build test), I drain the old box, change the 
> addresses on this new one and swap them out.
> 
> Public DNS for this is its IPaddr.domain so it shows how the robots look for 
> any working address with port 25
> available:
> 
> 36-231-85-78.dynamic-ip.hinet.net[36.231.85.78]: 554 5.7.1 <1...@k888.tw>: 
> Relay access denied;
> from=<a...@hotmail.com> to=<1...@k888.tw> proto=SMTP helo=<208.83.67.180>
> Feb 27 03:57:24 klovia postfix/smtpd[7677]: lost connection after RCPT from
> 36-231-85-78.dynamic-ip.hinet.net[36.231.85.78]

ah "hinet.net" - as far as i remember this is the asian large
crap provider where you get FIVE biubces as response to a
abuse-mail and i temprary blocked aroubd 1 Mio. IP addresses
from them in iptables

in fact, what you are showing is the sad truth

making any machine public and not secured and it may lead
to intrusions within minutes or sometimes seconds, that
is why all the "but who is interested in me" carells hobbiests
are completly wrong

nearly ten years ago a simple test and 10 years ago was virtually
notihing compared to now in context of attacks and intrusions

* samba on the WAN
* a completly fresh ip-address
* guest account enabled
* voila, a collection of all known and unknown malwares from a to z in the share
* timeframe: 10 minutes up to an hour

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to