Am 27.10.2016 um 18:32 schrieb John Hardin:
> On Thu, 27 Oct 2016, Christian Grunfeld wrote:
> 
>> fail2ban with custom filter.....
> 
> I tarpit them...
> 
> http://www.impsec.org/~jhardin/antispam/spammer-firewall
> 
> 
>> 2016-10-27 10:38 GMT-03:00 Nicola Piazzi <nicola.pia...@gruppocomet.it>:
>>
>>> This script can be used if you have mailscanner in mysql database that
>>> record results of spamassassin activity and postfix as mta
>>>
>>> # postban.sh
>>> # Temporary Ban SpamOnly Ip
>>> # -------------------------
>>> #
>>> # This script create a table for postfix that ban IPs that made high
>>> spam
>>> results only
>>> #
>>> # 1) Put this script anywhere and set your parameters
>>> # 2) Put in crontab a line like this to run every 15 minutes :
>>> # 0/15 * * * * /batch/postban.sh
> 

https://sys4.de/de/blog/2015/11/07/abwehr-des-botnets-pushdo-cutwail-ehlo-ylmf-pc-mit-iptables-string-recent-smtp/

https://sys4.de/de/blog/2014/03/27/fighting-smtp-auth-brute-force-attacks/

https://sys4.de/de/blog/2012/12/28/botnets-mit-rsyslog-und-iptables-recent-modul-abwehren/

but this solutions may not fit exact to "your" problem

fail2ban is a good well tested solution

so you should always decide by deep log analysis which way to go




Best Regards
MfG Robert Schetterer

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Schleißheimer Straße 26/MG, 80333 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein

Reply via email to