Homer Wilson Smith:
> 
>      I have an outgoing-only mail server for our customers called
> smtp.lightlink.com.  It only allows relaying from local IP's,
> and known virtual domains if remote users wish to use it.
> 
>      We were fine when we were running pop before smtp authentication, but 
> I was forced to also allow SASL authentication.
> 
>      More and more people are having their passwords compromised, I have no 
> idea how it happens, one person had it compromised twice in one day after 
> I changed it the first time.
> 
>      There are no false tries on the user account, until the spam starts 
> coming in with the correct password, then its 64,000 pieces of mail 
> forever and ever until I stop it.

Use postfwd (www.postfdw.org) or the like to rate-limit mail clients.

>      So one, how are passwords being compromised with out brute force
> attacks showing up on the server?

They compromise the mail client host and steal login credentials,
or they phish the user, and make them give their login credentials
to a rogue server.

        Wietse

Reply via email to