Hi,

> On 22 Jun 2023, at 21:05, André Rodier via Postfix-users 
> <postfix-users@postfix.org> wrote:
> 
> What are you using on your side ?


I'm running postfix on FreeBSD so I can use blacklistd. 
A blacklistd hook has been inserted in Postfix source code so treatment is 
triggered directly from events handled by Postfix.

(some info about that, in NetBSD context: 
https://imil.net/blog/posts/2020/make-postfix-trigger-blacklistd-on-failed-authentication/)

Postfix signals blacklistd on failed auth, blacklistd takes a decision 
according to its configuration. In general when the threshold is reached, the 
offending IP address (or the /24 if you want) is inserted in a firewall table.

sample output:

$ sudo blacklistctl dump -b | head -3
        address/ma:port id nfail last access
   103.4.64.124/32:587 OK 3/3 2023/06/22 04:24:29
  115.23.23.103/32:587 OK 3/3 2023/06/22 01:37:53


> - Do you know any service, that I could use, to get the network to ban from 
> an IP address reputation, something like
> crowdsec, for instance ?

crowdsec would probably work, but I've only tried it as a source of bad IP to 
block. I've note tried it as a reporting tool for new bad IP that are not yet 
in the crowdsourced blacklist.

number of IP in the crowdsec provided blocklist on my firewall:

$ sudo pfctl -t crowdsec-blacklists -T show|wc -l
   17336


cheers
patpro
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to