On Sat, 2008-11-29 at 10:29 -0500, Angus McIntyre wrote:

You could use tcpserver to block them with something like

=.hinet.net:allow,RBLSMTPD="-Blocked for trying to break-in"
114.44.124.32:allow,RBLSMTPD="-Blocked for trying to break-in"
...

The first line blocks anything with reverse dns that maps to *.hinet.net
and the second only matches the ip address. You can match multiple ips
with 1.2.0-1.:allow to match the range 1.2.3.0/23.

Shane

> Lately, my maillog shows large numbers of attempts to relay mail 
> through my host. The attempts show up in the logfile as failed 
> password checks, i.e.
> 
>       vpopmail[19950]: vchkpw-smtp: vpopmail user not
>       found alex@:114.44.124.32
> 
> The attackers are trying a sequence of 93 distinct usernames - 
> administrator, alice, alex, andy etc. - and a variety of passwords.
> 
> The majority of the attacks originate from dynamic IPs on Taiwanese 
> ISPs hinet.net and tfn.net.tw.
> 
> I'm not particularly concerned that they'll break in, but I'd like to 
> block them anyway, if only to keep my SMTP ports clear for legitimate 
> traffic.
> 
> Is there a vpopmail equivalent of 'denyhosts' - something that allows 
> a limited number of failed attempts before automatically blocking all 
> subsequent connections from that IP?
> 
> Angus
> 
> 
> 


!DSPAM:4931668432318333090515!

Reply via email to