On 30 Jan 2018, at 6:07 (-0500), jin&hitman&Barracuda wrote:

Yes I saw connections coming
from 172.27.203.20 and it was me.
I believe this setup is not fit mail servers.

Absolutely true. 3 widespread ISP tactics that make a network unfit for an Internet-facing MTA:

1. DNS hijacking
2. Firewall or router-based (usually Cisco ASA/PIX) mangling of SMTP
3. Source NAT for inbound traffic

All 3 are often presented as part of "network security" packages but they are each lethal for a mail server.

Becouse I prefer to use
fail2ban for brute force attacks and fail2ban depends source IP address. In this setup I can't see source IP. Also I'll use iptables as a permanent
filter for some IPv4 blocks (like china).


Can anyone tell me that this setup has any benefit ?

No.

Inbound source NAT is the most widespread network tactic that I know of which has no discernible benefit to the downstream user directly or indirectly. As far as I can tell, it is entirely a side effect of network gear manufacturers and network operators being lazy in implementation.

--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Currently Seeking Steady Work: https://linkedin.com/in/billcole

Reply via email to