On Tue, Sep 20, 2016 at 12:03:37PM +0200, felderm wrote:
> Hi All
> 
> We operate multiple Postfix instances behind HA-Proxies. The haproxy
> upstream protocol is enabled:
> 
> smtpd_upstream_proxy_protocol=haproxy
> (the IPs of the HA-proxies are in mynetworks)
> 
> There are brute-force attacks agains the SMTP servers (auth Backend is
> OpenLDAP). We would like to block these clients and have found the
> following settings:
> 
> smtpd_client_connection_rate_limit 
> smtpd_error_sleep_time             
> smtpd_soft_error_limit             
> smtpd_hard_error_limit             
> 
> We experienced that these settings do not work behind HA-Proxies. Did we
> missed a configuration settings? Did someone implement brute-force
> restrictions behind HA-Proxies? If possible we would like to avoid
> fail2ban or other tools on the HA-Proxies.
> 
> Your Feedback is highly appreciated!
> Thanks
> Felder

Have you considered implementing simple rate limiting at the firewall
level? Something like this, for example:

https://www.mnxsolutions.com/quick-tip/rate-limiting-connections-with-iptables.html

--Sean

Reply via email to