On Sat, Oct 01, 2022 at 10:44:48PM -0400, Viktor Dukhovni wrote: > > Sep 25 00:07:45 bilbo dovecot: imap-login: Disconnected: Connection > > closed: SSL_accept() failed: error:14209102:SSL > > routines:tls_early_post_process_client_hello:unsupported protocol (no > > auth attempts in 3 secs): user=<>, rip=205.210.31.140, lip=172.31.8.104, > > TLS handshaking: SSL_accept() failed: error:14209102:SSL > > routines:tls_early_post_process_client_hello:unsupported protocol, > > session=<x8XLOnrp39PN0h+M> > > The connection was from: > > NetRange: 205.210.31.0 - 205.210.31.255 > CIDR: 205.210.31.0/24 > NetName: PAN-22 > Organization: Palo Alto Networks, Inc (PAN-22) > > I would not expect TLS version scans from them, but perhaps they too > carry out TLS feature studies where they look for support for legacy > TLS versions.
That said, I too see what looks like a security scan from that network in my logs: Sep 30 16:35:20 amnesiac postfix/submission/smtpd[97237]: connect from unknown[205.210.31.51] Sep 30 16:35:20 amnesiac postfix/submission/smtpd[97237]: warning: non-SMTP command from unknown[205.210.31.51]: GET / HTTP/1.1 Sep 30 16:35:20 amnesiac postfix/submission/smtpd[97237]: disconnect from unknown[205.210.31.51] unknown=0/1 commands=0/1 Legitimate research security scans should come from hosts with PTR records, and, at the associated domain, web pages that document the project. This could also be abuse. -- Viktor.