plataleas:
> 
> the haproxy health checks produced the postfix/anvil logs.
> 
> After adding the haproxy IP to the "smtpd_client_event_limit_exeptions"
> the postfix/anvil logs showed correctly the originating IP of the brute
> force attacks.
> 
> smtpd_client_event_limit_exceptions = $mynetworks $haproxy

Thanks, that makes sense. There is no way for the proxy's IP address
to leak into Postfix after a 'normal' HaProxy handshake.

        Wietse

Reply via email to