Re: Milter vs. policy protocol

2022-08-13 Thread Peter
On 13/08/22 16:13, Viktor Dukhovni wrote: There is no such syntax, as you'd discover if you tried it. Access tables are pre-registered while parsing *restriction classes*, both built-in (smtpd_mumble_restrictions) and user-defined. On the RHS of tables only already defined restriction classes a

Re: Milter vs. policy protocol

2022-08-13 Thread Peter
On 13/08/22 22:04, Dominik George wrote: Hi, The capability to evaluate an access in this way could be a very powerful feature for Postfix, it would open up a whole host of possibilities having to do with requirements to say that certain users, be they sasl users, or senders, or whatever can on

Re: Protect access to submission services

2022-08-13 Thread Jaroslaw Rafa
Dnia 13.08.2022 o godz. 11:22:30 Durga Prasad Malyala pisze: > Did you try fail2ban. It is very good. I already use fail2ban, but I could not use it in this case, as the AUTH attempts were from different IP addresses and almost no address did repeat. So fail2ban would not do anything. -- Regards,

Re: Protect access to submission services

2022-08-13 Thread toganm
> "JR" == Jaroslaw Rafa writes: JR> Dnia 13.08.2022 o godz. 11:22:30 Durga Prasad Malyala pisze: >> Did you try fail2ban. It is very good. JR> I already use fail2ban, but I could not use it in this case, as the AUTH JR> attempts were from different IP addresses and almost no address did JR>

Re: Protect access to submission services

2022-08-13 Thread Jaroslaw Rafa
Dnia 13.08.2022 o godz. 16:23:10 tog...@dinamizm.com pisze: > > Have you looked spamhaus or abusix for auth blacklists. They both do a decent > job > in blocking auth attempts from nasty IP addresses in my case. I will look at them. Thank you! -- Regards, Jaroslaw Rafa r...@rafa.eu.org --