On 2016/11/27 13:15, li...@lazygranch.com wrote:
I hate to bug the list for what is probably a dumb question, but is there any situation 
where an unauthorized user needs to connect to port 587? I'm wondering if there is some 
oddball  "edge" case.

My thought is to use my ipfw table of known trouble makers to block 587.
‎

I wrote a little script that monitors connections and automatically does

iptables -I input_ext -s IP -j logdrop

for any IP that connects to my port 587, port 22, etc. Obviously it doesn't do this for whitelisted IPs.

I implemented this because I noticed a lot of bad IPs were trying AUTH commands, presumably to try to guess passwords. The above gives them only one try. It catches a dozen or so every day. Periodically flush them, or coalesce them.

-Earl


Reply via email to