> On 2020-06-12 08:57, Jeroen Geilman wrote:

-  too many errors after .* from .*
-  warning: non-SMTP command from .*

While these do indicate badly-behaved clients, there is no reason to
assume evil intent.

who would send non-SMTP command to a mailserver. I usually see commands
such as GET /

- reject: RCPT from .* Recipient address rejected: User unknown in
local recipient table; .*'

This rejection is per-recipient; blocking this *client* because they
mis-typed a single address means you /will/ reject valid email later on.

OK, I see. But I am blocking for 1 hour only anyway.

- lost connection after STARTTLS

What if the client could not match the server version or ciphers, and
has to disconnect to try plain SMTP again ?

There is no down-step after STARTTLS.

ok I see.
But, on the other hand, who is still sending plaintext these days?

And why can't legitimate client use reasonable ciphers?

I think my settings are not so strict. I believe am using
recommendations from this mailing list:

smtpd_tls_ciphers                   = medium
smtpd_tls_protocols                 = !SSLv2, !SSLv3
smtpd_tls_mandatory_protocols       = !SSLv2, !SSLv3

Reply via email to