>> Oct 21 20:22:39 memoryalpha dovecot: imap-login: Aborted login (no auth
>> attempts in 0 secs): user=<>, rip=127.0.0.1, lip=127.0.0.1, secured,
>> session=<Tvvn+TmyNq9/AAAB>
> 
> But note also "dovecot" showing up here.  It looks like the spammer is
> using some feature of Dovecot to originate a connection to the Postfix
> SMTP server.

Actually, it's most likely a log entry from a periodic probe of my
server's functions (including its IMAP service) by Nagios.

I captured another incident last night, and there was no mention of
Dovecot in the log.  I'm not attaching the log for this second incident
right now (I had "smtpd -v" in effect and the log data is really long),
but I can share it if people really want to see it.

I've made another change to my Postfix configuration -- I changed the
value of postscreen_blacklist_action to "drop".  I'm still waiting to
see if I have any more instances of open relay attempts from localhost
after having made this change.  If the earlier open relay attempts are
in fact somehow (still unsure how?) being generated as a consequence of
the blacklisted connection, then maybe having postscreen drop right away
will nip the open relay attempts in the bud.

Rich Wales
ri...@richw.org

Reply via email to