On 3/1/2022 14:55, Alexander Stienstra wrote:

On 29-12-2021 11:13, Matus UHLAR - fantomas wrote:


- With smtpd_delay_reject=no, Postfix will log a DNSBL 'reject' in
smtpd_client_restrictions without any sender or recipient information.
That makes it difficult to answer questions about "missing" email.

And when SASL is used with delays set to no, when the first reject happens, client is out so the very much wanted authentication info is delayed and that decreases the guessing possibilities extremely low and makes the attack close to impossible to ever succeed with proper RBL updating.

fail2ban can to this. you can fill your local dnsbl with that, although I
prefer blocking connection from those IPs at firewall level.


I am guessing you use fail2ban to block those IP's at firewall level. So fail2ban is not a bad place to start in any case, it can take care of both.

Yes fail2ban can be used to fill your local DNSBL. If you try to use only fail2ban though for very long term, or permanent blocking at firewall level, then it is only a matter of time when firewall limits will be pushed and possibly reached. If you are targeted, we are talking about thousands of IPs so that may be one problem.

Another problem with fail2ban is the expandability and management in case of multiple mail servers for example. A DNSBL can very easily be deployed from anywhere you may choose from and be managed from a single point.

Lefteris

Reply via email to