Re: Thousands of login attempts

2016-03-22 Thread Bill Cole
On 20 Mar 2016, at 14:11, @lbutlr wrote: /etc/hosts.allow: ALL : 185.103.253.246 : DENY Has no effect. For /etc/hosts.{allow,deny} files to have any effect on network access to a program, the program must support the TCP Wrappers facility by linking to libwrap OR be wrapped by the tcpd a

Re: Thousands of login attempts

2016-03-21 Thread Brett
On 2016-03-20 16:46, Dimitar Katerinski wrote: @lbutlr wrote: /etc/hosts.allow: ALL : 185.103.253.246 : DENY Has no effect. hosts.allow and hosts.deny only work for programs that have been compiled with TCP wrapper support. Typically this is limited to telnet, ftp and inetd super daemon

Re: Thousands of login attempts

2016-03-20 Thread Christian Kivalo
Am 21. März 2016 00:59:36 MEZ, schrieb "@lbutlr" : >On Sun Mar 20 2016 16:01:44 Christian Kivalo >said: >> One minor comment: I would not even offer AUTH on port 25. >>> >>> I don’t. I offer opportunistic TLS on port 25 for SMTPd. All mail >>> submission have to be on port 587. >> >> Y

Re: Thousands of login attempts

2016-03-20 Thread @lbutlr
On Sun Mar 20 2016 16:00:10 Sebastian Nielsensaid: > > I would instead suggest the opposite way around, use whitelisting instead. That doesn’t work. One of my most important customers travels all over the world and may be connecting from quite literally anywhere but North Korea. Setting the

Re: Thousands of login attempts

2016-03-20 Thread @lbutlr
On Sun Mar 20 2016 16:01:44 Christian Kivalo said: > >>> One minor comment: I would not even offer AUTH on port 25. >> >> I don’t. I offer opportunistic TLS on port 25 for SMTPd. All mail >> submission have to be on port 587. > > You do. Oh, that is right, I forgot I had to enable that temp

Re: Thousands of login attempts

2016-03-20 Thread Curtis Villamizar
In message <0f3f9e7a-f0da-400a-b331-514a471b4...@valo.at> Christian Kivalo writes: > > >> One minor comment: I would not even offer AUTH on port 25. > > > >I don't. I offer opportunistic TLS on port 25 for SMTPd. All mail > >submission have to be on port 587. > > You do. > > valo@uschi:~ $ tel

Re: Thousands of login attempts

2016-03-20 Thread Christian Kivalo
>> One minor comment: I would not even offer AUTH on port 25. > >I don’t. I offer opportunistic TLS on port 25 for SMTPd. All mail >submission have to be on port 587. You do. valo@uschi:~ $ telnet mail.covisp.net 25 Trying 65.121.55.42... Connected to mail.covisp.net. Escape character is '^]'. 22

SV: Thousands of login attempts

2016-03-20 Thread Sebastian Nielsen
I would instead suggest the opposite way around, use whitelisting instead. Whitelisting can be done in many ways: 1: You can either whitelist your customer's IP ranges. So if one customer has Telia in Sweden, you tell your firewall to allow 95.196.0.0/14. And so on for every customer/user. 2: Yo

Re: Thousands of login attempts

2016-03-20 Thread Dimitar Katerinski
@lbutlr wrote: /etc/hosts.allow: ALL : 185.103.253.246 : DENY Has no effect. I would suggest using your firewall utility to block this on tcp/ip level. If you are running Postfix under Linux the following iptables command should block this IP to accessing your smtp service on port 25: i

Re: Thousands of login attempts

2016-03-20 Thread Chalmers
Put the ip in your firewall blacklist is what I did, then you dont even see them as they are blocked at the gate. I extracted all such addreses from my logs, sorted them unique, added them to the firewall blacklist. gone. I know there will always be others, but revenge is sweet . - Fro

Re: Thousands of login attempts

2016-03-20 Thread @lbutlr
On Mar 20, 2016, at 1:46 PM, Wietse Venema wrote: > > @lbutlr: >> I mean, nothing is getting in, but there are thousands of these, 2000 = > > Then why do you care? They are using 1% of your CPU? I've been in the logs a lot the last few days, and having big these very few seconds has been a con

Re: Thousands of login attempts

2016-03-20 Thread /dev/rob0
On Sun, Mar 20, 2016 at 08:21:16PM +0100, wilfried.es...@essignetz.de wrote: > Did you try postscreen_blacklist_action > (http://www.postfix.org/postconf.5.html#postscreen_blacklist_action) > > Default is "ignore" Yes, and probably what the OP wants to set is "drop". If set as "enforce" you'll

Re: Thousands of login attempts

2016-03-20 Thread Wietse Venema
@lbutlr: > I mean, nothing is getting in, but there are thousands of these, 2000 = Then why do you care? They are using 1% of your CPU? Wietse

Re: Thousands of login attempts

2016-03-20 Thread wilfried.es...@essignetz.de
Did you try postscreen_blacklist_action (http://www.postfix.org/postconf.5.html#postscreen_blacklist_action) Default is "ignore" Willi Am 20.03.2016 um 20:10 schrieb @lbutlr: > On Sun Mar 20 2016 12:59:08 @lbutlrsaid: >> >> Mar 20 12:55:37 mail postfix/postscreen[29826]: BLACKLISTED >> [

Re: Thousands of login attempts

2016-03-20 Thread @lbutlr
On Sun Mar 20 2016 12:59:08 @lbutlr said: > > Mar 20 12:55:37 mail postfix/postscreen[29826]: BLACKLISTED > [185.103.253.246]:50804 Stopped postfix and removed the post screen_cache file and restarted postfix. Mar 20 13:03:59 mail postfix/postscreen[30633]: BLACKLISTED [185.103.253.246]:5

Re: Thousands of login attempts

2016-03-20 Thread @lbutlr
On Sun Mar 20 2016 12:47:32 @lbutlr <@lbutlr> said: > > But they still keep coming. > > $ date && grep UGFzc3dvcmQ6 /var/log/maillog | tail -1 > Sun Mar 20 12:43:33 MDT 2016 > Mar 20 12:43:31 mail postfix/smtpd[28552]: warning: unknown[185.103.253.246]: > SASL LOGIN authentication failed: UG

Re: Thousands of login attempts

2016-03-20 Thread @lbutlr
On Sun Mar 20 2016 12:47:32 @lbutlr <@lbutlr> said: > > postscreen_access_cidr > 185.103.253.246 reject > > $ postmap -q 185.103.253.246 > cidr:/usr/local/etc/postfix/postscreen_access.cidr > reject > > But they still keep coming. > > $ date && grep UGFzc3dvcmQ6 /var/log/maillog | tail -

Re: Thousands of login attempts

2016-03-20 Thread @lbutlr
On Sun Mar 20 2016 12:23:00 /dev/rob0said: > > On Sun, Mar 20, 2016 at 12:11:57PM -0600, @lbutlr wrote: >> I have many thousands of these over the last seven days: >> >> Mar 20 10:45:27 mail postfix/smtpd[19480]: warning: >> unknown[185.103.253.246]: SASL LOGIN authentication failed: >> UGF

Re: Thousands of login attempts

2016-03-20 Thread Wolfe , Robert
Um, perhaps you should utilize some sort of DNS blacklist, which is what my setup here does. If not, then you might want to try relocating what you put into your /etc/hosts.allow file to your /etc/hosts.deny file. I would also recommend utilizing fail2ban -- http://theether.net/kb/100141 On S

Re: Thousands of login attempts

2016-03-20 Thread /dev/rob0
On Sun, Mar 20, 2016 at 12:11:57PM -0600, @lbutlr wrote: > I have many thousands of these over the last seven days: > > Mar 20 10:45:27 mail postfix/smtpd[19480]: warning: > unknown[185.103.253.246]: SASL LOGIN authentication failed: > UGFzc3dvcmQ6 > > They are all the exact same, including the

Thousands of login attempts

2016-03-20 Thread @lbutlr
I have many thousands of these over the last seven days: Mar 20 10:45:27 mail postfix/smtpd[19480]: warning: unknown[185.103.253.246]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 They are all the exact same, including the UGF… portion. Mar 20 10:48:34 mail postfix/postscreen[75523]: CONNECT