Homer Wilson Smith: > > I have an outgoing-only mail server for our customers called > smtp.lightlink.com. It only allows relaying from local IP's, > and known virtual domains if remote users wish to use it. > > We were fine when we were running pop before smtp authentication, but > I was forced to also allow SASL authentication. > > More and more people are having their passwords compromised, I have no > idea how it happens, one person had it compromised twice in one day after > I changed it the first time. > > There are no false tries on the user account, until the spam starts > coming in with the correct password, then its 64,000 pieces of mail > forever and ever until I stop it.
Use postfwd (www.postfdw.org) or the like to rate-limit mail clients. > So one, how are passwords being compromised with out brute force > attacks showing up on the server? They compromise the mail client host and steal login credentials, or they phish the user, and make them give their login credentials to a rogue server. Wietse