There does not seem to be a completely foolproof and easy to manage
solution.
In my case, I modified the fail2ban time in jail to block the IP for
days rather than hours and did a close look at the expressions defining
the bad attempts to be sure that I got all (I hope) of the cases that
were appearing.
They will run out of compromised sites/IPs at some point.
If you notice that the blocked IPs show entire class C blocks that are
in countries where you do not really care about serving, you can
manually block the entire class C at the outside edge of your firewall
until someone that you actually want to let in complains.
If you have sshd running, that is another critical service to watch.
Everything is under attack all the time and the huge amount of money
spent by G7 governments on cybersecurity is not having any noticeable
reduction in this annoyance.
Sorry for the short rant but we should not have to waste so much energy
and bandwidth on this given the billions (pick a currency) that are
being spent.
I am afraid that it is mostly spent on training people who were not
recruited with the right skills and going to international conferences
to talk about how serious the problem is.
Ron
On 4/2/19 8:10 AM, James Brown wrote:
Thanks Esteban. I have fail2ban installed. Unfortunately each attempt
comes from a different IP (botnet I presume). I’m finding this all the
time now, so fail2ban seems to be no longer much use.
Was just hoping there was a Postfix or Dovecot setting I could use to
ignore these submission attempts.
James.
On 2 Apr 2019, at 7:43 pm, Esteban L <este...@little-beak.com
<mailto:este...@little-beak.com>> wrote:
You will need to install fail2ban to ip block failed attempts.
As you have correctly assumed, a malicious person is trying to hack
into you mail server.
Fail2ban is a required application now and days.
On April 2, 2019 8:57:06 AM GMT+02:00, James Brown
<jlbr...@bordo.com.au <mailto:jlbr...@bordo.com.au>> wrote:
Not sure if this is a Dovecot or Postfix issue we use Dovecot for
authentication for Postfix. Mailboxes are stored in MySQL.
Have noticed this today:
auth-worker(42777): Info: sql(cont...@com.au
<mailto:cont...@com.au>,127.0.0.1): unknown user (given password: someone123)
alsoi...@com.au <mailto:i...@com.au> etc.
They are coming through on port 465.
Obviously my domain is not ‘com.au <http://com.au>’ - how can I stop these
attempts from even being considered?
I did update to Postfix 3.4.5 yesterday. Running Dovecot 2.3.5.
Thanks,
James.
--
Sent from my Android device with K-9 Mail. Please excuse my brevity.