Limiting the number of simultaneous connections will fend off an
attacker until  fail2ban kicks in.

For my (domestic) server, I have in main.cf :-

smtpd_client_connection_count_limit = 2

This is inherited by postscreen,  which does a good job of throwing out
surplus connections.

Again - appropriate to *MY* circumstances  - I have an iptables rule,
limiting smtp connect requests to six a minute.    For me, two messages
an hour and I am busy   :-)

The soft- and hard-error limits need your attacker to make a mistake. 
FWIW, I have :-

smtpd_error_sleep_time = 2s
smtpd_soft_error_limit = 3
smtpd_hard_error_limit = 6
smtpd_junk_command_limit = 2

They are not often invoked.

hope this helps

Allen C

On 09/07/16 16:07, Lefteris Tsintjelis wrote:
> Is this a good postfix way to stall attackers (besides log parsing and
> fire walling)? Bots are increasing dramatically these days
>
> smtpd_soft_error_limit = 1
> smtpd_hard_error_limit = 1
> smtpd_error_sleep_time = 16s (or even more)
>


Reply via email to