On Wed, 25 Sep 2019, Plutocrat wrote:
On 23/09/2019 4:13 PM, Bernd Petrovitsch via dovecot wrote:
It's not directly a solution within dovecot but "fail2ban" exists.
Yes, I have fail2ban, but that bans based on IP address. And most mail
password attacks these days are distributed, and althoug
Hi,
Sorry for the delay in replying. Been having a few mail problems ironically!
Gmail smtp server stopped working!
On 23/09/2019 4:13 PM, Bernd Petrovitsch via dovecot wrote:
> It's not directly a solution within dovecot but "fail2ban" exists.
Yes, I have fail2ban, but that bans based on IP a
> On 23 Sep 2019, at 8.29, Plutocrat via dovecot wrote:
>
> This is probably quite an easy question, but I haven't been able to find the
> answer. I'm running a server where all the email addresses are in the format
> "u...@domain.com". I've noticed that a large number of fake login attempts
On Sep 22, 2019, at 11:29 PM, Plutocrat wrote:
> This is probably quite an easy question, but I haven't been able to find the
> answer. I'm running a server where all the email addresses are in the format
> "u...@domain.com". I've noticed that a large number of fake login attempts
> use the for
On 23/09/2019 07:29, Plutocrat via dovecot wrote:
> This is probably quite an easy question, but I haven't been able to
> find the answer. I'm running a server where all the email addresses
> are in the format "u...@domain.com". I've noticed that a large number
> of fake login attempts use the form
This is probably quite an easy question, but I haven't been able to find the
answer. I'm running a server where all the email addresses are in the format
"u...@domain.com". I've noticed that a large number of fake login attempts use
the format "user" eg. reception, service, root, admin.
Is it