> postscreen is one layer in a multi-layer defense. It does not have
> to stop all unwanted email. That is what the other layers are for.

Certainly.  That does not warrant blindly stacking layers upon one another 
simply because one can.

There are certainly layers that postscreen clearly renders marginal (DNSBL 
checks in SA postqueue).

Others like fail2ban, I'm simply not sure as yet.

> the things fail2ban has been really useful
> for are blocking AUTH dictionary attacks

Good point.  Simply haven't suffered much of that at all, but understand the 
value if it's a concern.

> blocking clients that consistently fail a full-scan filter such as 
> SpamAssassin.

Again, clear in principle -- and not something my stats had shown as a problem.

So, to both -- likely worth the additional bit of effort at prophylaxis.

> more about cleaning up your log than protecting postfix.

I'd rather know than not know.  I'm happy enough with grep, here.


> as long as you're not approaching DoS levels of rejects it doesn't matter
too much.

I'm not.  For now.

>  postscreen doesn't change the argument very much.

I've been weighing postscreen's load vs the 'rest of postfix'.  If postscreen 
can handle it early, I'm fine with the countless rejects.

Pre-postscreen, the 'rest of postfix' took the full hit, and fail2ban helped 
there.  I've no quantitative measure of the relative loads for reject, but 
understand that postscreen is earlier and more efficient.

Given the validity of the points above, I'll likely keep fail2ban in place, but 
tune it 'down' to more clearly act on those things that are not already well 
remediated by postscreen.

Appreciate the comments.

Reply via email to