>>>>> "Karel" == Karel  <postfix-us...@vcomp.ch> writes:

Karel> I am running small Postfix server for personal use. My logs are flooded
Karel> with:

Karel>   relay access denied
Karel>   hello rejects
Karel>   connection rate limit exceeded ...
Karel>   lost connection after AUTH from ...

Karel> Often there are hundreds of these logs from the same IP
Karel> address. I know, that I can use fail2ban to block these IP
Karel> addresses using iptables.

Karel> But I very much dislike the way fail2ban works:

Karel> Postfix logs errors -> rsyslog writes them to text file ->
Karel> fail2ban parses those text files and creates iptables rules.

This is the unix philosophy, stringing together small groups of
commands to do the work, instead of having one big tool do
everything.  

Karel> Seems to me, the only step missing to make it even more ugly
Karel> would be to print the logs on paper, and then use OCR to scan
Karel> them back.

Now you're being overdramatic.  The nice thing about the above process
is that SSH can log to syslog, and fail2ban and parse those out as
well.

Would it be better if openssh and postfix both called fail2ban
directly to add entries?  What about sendmail?  What about if I prefer
to use denyhosts instead?  Why should postfix need to know about this?  

Karel> Does this process have to be so complicated ? Is there no
Karel> easier way to block offending IP addresses using iptables ?

It's all automated for you, what do you care?

And this isn't really a postfix question.

John

Reply via email to