> On 22/04/2020 17:13 Benny Pedersen wrote:
>
>
> On 2020-04-22 10:45, Aki Tuomi wrote:
>
> > You can also try running doveadm sync by hand.
> > doveadm -Dv sync -u victim tcp:otherserver:port
>
> what doeveconf config makes that command line work ?
Something like this:
on target host
do
On 22/04/2020 20.29, Johannes Rohr wrote:
> Is there a reasonable way of detecting and preventing logins from
> unusual IP ranges? Or are there other strategies you would recommend?
I'd generally set up a short ban on logins originally, and then a second,
longer ban for 'repeat offenders'. You ba
Hello,
I got the issue fixed. Here's what it was, and my understanding is a
little vague in some areas. I use letsencrypt for my certificates and
one of the options I pass to acme.sh is the --ocsp option. This works
fine for web servers apparently, but for some reason and here I get
muddy dependin
On 21 Apr 2020, at 11:54, Ralph Seichter wrote:
> * mj:
> Our autoreply message reads: "Your email has not been read nor
>> forwarded", which is also the case, forcing the sender to take action.
>
> No, it does not. An auto-reply message, even if it is actually read by
> the sender, can be ignore
I have PFSense too and it rocks!
> On Apr 22, 2020, at 14:52, byal...@yahoo.com.br wrote:
>
> Usually I use pfsense as main firewall with snort blocking all kind of scans
> and others.
>
> Fail2ban triggering after 3 unsuccessful tries and for last iptables if Linux
> or ipfw If Freebsd
>
>
Iptables or ipfw you always can create tables / chains and feed those with desirable IP's to ban.Something like fail2ban does. Make a big list, remove one or other IP.On my setup, I got all IP's from all services and concatenate them for an local ban as fallback... (From Apache logs, from email log
On 2020-04-22 2:52 p.m., byal...@yahoo.com.br wrote:
Usually I use pfsense as main firewall with snort blocking all kind of
scans and others.
Fail2ban triggering after 3 unsuccessful tries and for last iptables if
Linux or ipfw If Freebsd
Keep pfsense synced with intrusion lists is an must h
Usually I use pfsense as main firewall with snort blocking all kind of scans and others.Fail2ban triggering after 3 unsuccessful tries and for last iptables if Linux or ipfw If FreebsdKeep pfsense synced with intrusion lists is an must have.And for last, bans are not temporary on my setup, are fore
On Wed, 22 Apr 2020, Johannes Rohr wrote:
It is a pity that the IMAP protocol does not support 2 factor
authentication, which seems to stop 90% of intrusion attempts in their
tracks.
You could use VPN, which can enforce 2FA.
You can hack 2FA into IMAP or any protocol where you can control
the
On 2020-04-22 18:58, Aki Tuomi wrote:
You mean https://github.com/PowerDNS/weakforced ?
yes need in detail wiki how to make that run with dovecot, i will make a
gentoo ebuild if needed to get that out of powerdns, hope to see it in
dovecot contrib so i can add it to gentoo portage maintiner
Am 22.04.2020 um 15:12 schrieb Kishore Potnuru:
Hi All,
I need your help on one of the issue in Dovecot.
Why do you send that request to me personally in Cc:?
I have the dovecot version 2.0.9 installed on RHEL linux 6.10 version. It's
a single/standalone Live server.
Now I have created anot
On 22/04/2020 19:56 Benny Pedersen <
m...@junc.eu> wrote:
On 2020-04-22 18:45, Sami Ketola wrote:
Actually by far the biggest source of stolen credentials is
viruses/trojans harvesting
On 2020-04-22 18:45, Sami Ketola wrote:
Actually by far the biggest source of stolen credentials is
viruses/trojans harvesting them.
i tryed blacklist all ips that got passwords errors, but that ends in
big shorewall blrules so i turn it over to just add whitelist into
blrules where ips is k
> On 22. Apr 2020, at 19.14, Michael Peddemors wrote:
> The three most common attack vectors, (and attack volumes have never been
> higher) are:
>
> * Sniffed unencrypted credentials
> (Assume every home wifi router and CPE equipment are compromised ;)
> * Re-used passwords where data is exp
On 2020-04-22 5:29 a.m., Johannes Rohr wrote:
Dear all,
what are the key strategies for intrusion prevention and detection with
dovecot, apart from installing fail2ban?
It is a pity that the IMAP protocol does not support 2 factor
authentication, which seems to stop 90% of intrusion attempts in
My email server is set up for port 587. I block all email ports other than port
25 from countries that I will not be sending or receiving email. This is really
only practical on a personal server. I also have a blocking file of data center
IPs. Port 25 is still open to the world but that has to
On 2020-04-22 10:45, Aki Tuomi wrote:
You can also try running doveadm sync by hand.
doveadm -Dv sync -u victim tcp:otherserver:port
what doeveconf config makes that command line work ?
Hi All,
I need your help on one of the issue in Dovecot.
I have the dovecot version 2.0.9 installed on RHEL linux 6.10 version. It's
a single/standalone Live server.
Now I have created another server with the same configuration for the
resilince purpose. I also tested and I am able to send the e
> On 22/04/2020 15:29 Johannes Rohr wrote:
>
>
> Dear all,
>
> what are the key strategies for intrusion prevention and detection with
> dovecot, apart from installing fail2ban?
> It is a pity that the IMAP protocol does not support 2 factor
> authentication, which seems to stop 90% of intru
Dear all,
what are the key strategies for intrusion prevention and detection with
dovecot, apart from installing fail2ban?
It is a pity that the IMAP protocol does not support 2 factor
authentication, which seems to stop 90% of intrusion attempts in their
tracks. Without it, if someone has obtaine
For all I can tell it seems that spamprobe is crashing.
Aki
> On 22/04/2020 03:40 Mark Constable wrote:
>
>
> Ubuntu 20.04, Dovecot 2.3.7.2, SpamProbe v1.4d. For the past weeks my
> sieve filters that call spamprobe have been crashing out for some users.
> I have a dozen similar server setups
On 4/21/20 7:54 PM, Ralph Seichter wrote:
No, it does not. An auto-reply message, even if it is actually read by
the sender, can be ignored without penalty. An MTA rejection puts the
ball into the sender's court because the message has never been accepted
by the recipient's MX. By the way, a r
Am 22.04.20 um 10:43 schrieb Benny Pedersen:
> On 2020-04-22 10:35, Stefan G. Weichinger wrote:
>> Am 22.04.20 um 09:41 schrieb Stefan G. Weichinger:
>>
>>> iterate_query = SELECT username as user FROM mailbox
>>
>> Ok, we enabled the 2 users and they synced (after a restart of one
>> dovecot, btw)
Hi,
same here, I updated my hole mail infrustructure (postfix, milter, etc.).
Now only dovecot does not support SMTPUTF8, which forced me to disable it
compleetly on my edgeservers.
Thanks
Urban
Am 17.03.20 um 09:52 schrieb David Bürgin:
I haven’t seen this term on the mailing list for a whil
> On 22/04/2020 11:35 Stefan G. Weichinger wrote:
>
>
> Am 22.04.20 um 09:41 schrieb Stefan G. Weichinger:
>
> > iterate_query = SELECT username as user FROM mailbox
>
> Ok, we enabled the 2 users and they synced (after a restart of one
> dovecot, btw).
>
> What irritates me:
>
> on the n
On 2020-04-22 10:35, Stefan G. Weichinger wrote:
Am 22.04.20 um 09:41 schrieb Stefan G. Weichinger:
iterate_query = SELECT username as user FROM mailbox
Ok, we enabled the 2 users and they synced (after a restart of one
dovecot, btw).
What irritates me:
on the new server I find less files i
Am 22.04.20 um 09:41 schrieb Stefan G. Weichinger:
> iterate_query = SELECT username as user FROM mailbox
Ok, we enabled the 2 users and they synced (after a restart of one
dovecot, btw).
What irritates me:
on the new server I find less files in /home/vmail than on the old server.
So something
Am 21.04.20 um 11:49 schrieb Stefan G. Weichinger:
> I will connect both dovecots to the same instance of mariadb which
> should let them know about all the existing mailboxes ... and then I
> will see.
>
> My question around the sieve-scripts is still open ... I assume I will
> maybe try to repl
28 matches
Mail list logo