dear readers,

at Dyne.org we are proud to host our own SMTP and mailinglists, but
that comes at a price of infrastructure, time and risk as most of you
know.

On the 16 of September, after a long term bruteforcing attack operated
from a botnet of almost 2k notes against our imaps accounts, someone
got hold of the weak password of a community domain we host and used
it during the weekend between the 20 and the 23 September to send a
considerable amount of spam from our mail server.

As a consequence we have been contacted by our academic uplink in
Europe yesterday monday morning, while being blacklisted by a number
of services. We have since then identified the issue, identified the
breach, mitigated and took future precautions.

A full dossier on the accident has been made available to our uplink
as well to SORBS and other spam blocklist operators requesting it.

Most of the blocks imposed on our mail server will last until tomorrow
25 September, after that we presume our SMTP will be functioning
normally. If you notice any anomaly, please report it to me in private
and/or kindly proceed yourself to delist our mail.dyne.org IP.

I apologize for the inconvenience and wish everyone all the best

ciao

-- 
  Denis "Jaromil" Roio      https://Dyne.org think &do tank
  Ph.D, CTO & co-founder    software to empower communities
  ✉ Haparandadam 7-A1, 1013AK Amsterdam, The Netherlands
  𝄞 crypto κρυπτο крипто गुप्त् 加密 האנוסים المشفره
  ⚷ 6113D89C A825C5CE DD02C872 73B35DA5 4ACB7D10

_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to