dear readers, at Dyne.org we are proud to host our own SMTP and mailinglists, but that comes at a price of infrastructure, time and risk as most of you know.
On the 16 of September, after a long term bruteforcing attack operated from a botnet of almost 2k notes against our imaps accounts, someone got hold of the weak password of a community domain we host and used it during the weekend between the 20 and the 23 September to send a considerable amount of spam from our mail server. As a consequence we have been contacted by our academic uplink in Europe yesterday monday morning, while being blacklisted by a number of services. We have since then identified the issue, identified the breach, mitigated and took future precautions. A full dossier on the accident has been made available to our uplink as well to SORBS and other spam blocklist operators requesting it. Most of the blocks imposed on our mail server will last until tomorrow 25 September, after that we presume our SMTP will be functioning normally. If you notice any anomaly, please report it to me in private and/or kindly proceed yourself to delist our mail.dyne.org IP. I apologize for the inconvenience and wish everyone all the best ciao -- Denis "Jaromil" Roio https://Dyne.org think &do tank Ph.D, CTO & co-founder software to empower communities ✉ Haparandadam 7-A1, 1013AK Amsterdam, The Netherlands 𝄞 crypto κρυπτο крипто गुप्त् 加密 האנוסים المشفره ⚷ 6113D89C A825C5CE DD02C872 73B35DA5 4ACB7D10 _______________________________________________ Dng mailing list Dng@lists.dyne.org https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng