Hello, all.
I just set-up a new server, running postfix, with submission(s) activated on
standard ports (587, 465)
Shortly after it has been setup, I see brute force attacks (not surprising)
from a whole /24 network (more surprising).
I carefully checked the logs, and see the modus operandi, w
Am 22.06.2023 um 13:58 schrieb André Rodier via Postfix-users:
Hello, all.
I just set-up a new server, running postfix, with submission(s)
activated on standard ports (587, 465)
Shortly after it has been setup, I see brute force attacks (not
surprising) from a whole /24 network (more surpris
Postfix does not implement SASL auth. It proxies the bits betwen
the remote SMTP client and (SASL library or Dovecot). If you must
see SASL details, use Dovecot "auth_debug=yes" logging, and run a
tool that acts on that information.
Wietse
___
Po
On 22 Jun 2023, at 14:18, Wietse Venema via Postfix-users wrote:Postfix does not implement SASL auth. It proxies the bits betwenthe remote SMTP client and (SASL library or Dovecot). If you mustsee SASL details, use Dovecot "auth_debug=yes" logging, and run atool that acts on that information.
On 22/06/2023 12:58, André Rodier via Postfix-users wrote:
>
> What are you using on your side ?
>
> - Do you know any service, that I could use, to get the network to ban from
> an IP address reputation, something like
> crowdsec, for instance ?
> - Anyone has success with Suricata, Snort, or a
Dnia 22.06.2023 o godz. 15:45:43 Allen Coates via Postfix-users pisze:
>
> Just thinking at a tangent...
>
> Is it possible / practical to develop the concept of a "service area" - to
> white-list all the net-blocks where all your
> genuine callers originate, and prohibit everywhere else?
>
> F
On Thu, Jun 22, 2023 at 03:45:43PM +0100, Allen Coates via Postfix-users wrote:
> Is it possible / practical to develop the concept of a "service area"
> - to white-list all the net-blocks where all your genuine callers
> originate, and prohibit everywhere else?
Perhaps if none of your users ever
Robert Schetterer wrote in
:
|Am 22.06.2023 um 13:58 schrieb André Rodier via Postfix-users:
...
|> Shortly after it has been setup, I see brute force attacks (not
|> surprising) from a whole /24 network (more surprising).
...
|> Is there any way, with postfix, to run a script on authentica
Dnia 22.06.2023 o godz. 13:58:20 André Rodier via Postfix-users pisze:
>
> I just set-up a new server, running postfix, with submission(s) activated
> on standard ports (587, 465)
>
> Shortly after it has been setup, I see brute force attacks (not
> surprising) from a whole /24 network (more surp
Am 22.06.23 um 19:18 schrieb Steffen Nurpmeso:
Robert Schetterer wrote in
:
|Am 22.06.2023 um 13:58 schrieb André Rodier via Postfix-users:
...
|> Shortly after it has been setup, I see brute force attacks (not
|> surprising) from a whole /24 network (more surprising).
...
|> Is the
Hello, all.
I just set-up a new server, running postfix, with submission(s) activated on
standard ports (587, 465)
Shortly after it has been setup, I see brute force attacks (not surprising)
from a whole /24 network (more surprising).
I carefully checked the logs, and see the modus operandi, w
On Thu, 2023-06-22 at 16:27 +0100, Nick Howitt via Fail2ban-users wrote:
>
>
> On 2023-06-22 12:58, André Rodier via Fail2ban-users wrote:
> > Hello, all.
> >
> > I just set-up a new server, running postfix, with submission(s)
> > activated on standard ports (587, 465)
> >
> > Shortly after it
On Thu, 2023-06-22 at 15:45 +0100, Allen Coates via Postfix-users wrote:
>
>
> On 22/06/2023 12:58, André Rodier via Postfix-users wrote:
> >
> > What are you using on your side ?
> >
> > - Do you know any service, that I could use, to get the network to ban from
> > an IP address reputation,
On 22/06/2023 16:09, Viktor Dukhovni via Postfix-users wrote:
> So, at least in my case, geofencing is not an option.
Of course not - there is never a universal solution.
In the matter of multi-factor authentication, discussions are increasingly
quoting a fourth factor: "WHERE you are".
(Does
Hi,
> On 22 Jun 2023, at 21:05, André Rodier via Postfix-users
> wrote:
>
> What are you using on your side ?
I'm running postfix on FreeBSD so I can use blacklistd.
A blacklistd hook has been inserted in Postfix source code so treatment is
triggered directly from events handled by Postfix.
Hello,
does anybody have experience with checking and removing email addresses
from spam lists?
I got this when sending email:
SMTP error from remote server for RCPT TO command, host:
mailrelay.nova.gr (80.245.166.6) reason: 550 Rule imposed as ***@*** is
blacklisted on Spamhaus - see www.spamh
Hello,
For a domain, we are finding in logs that, for most of the mails,
mails are getting delivered to a server of remote domain having lower
priority MX record. For some mails, the mail is getting delivered to
higher priority MX record server even though lower prioirity MX recod
is reachable
Hi,
> On 23 Jun 2023, at 05:14, Fourhundred Thecat via Postfix-users
> wrote:
>
> Spamhaus has some removal form on their website, but the page does not
> work for me (it is stuck at: Checking if the site connection is secure)
>
> Anyway, I was trying to find out on which other spamlists I mig
18 matches
Mail list logo