I use postfix but my plan of attack is different. I only allow authenticated logins on port 587 and block them on port 25. You have to keep 25 open to receive mails from outside but the port now becomes single purpose. Any legitimate relaying from the inside or outside is done through port 587 where (for the moment) there is a lot less hacking/probing traffic.

Nick

On 02/09/2019 21:32, Mike wrote:

At 02:57 PM 9/2/2019, you wrote:
Hi,

>Sep  1 21:44:46 hst postfix/smtpd[28571]: connect from unknown[101.89.216.243] Sep  1 21:44:51 hst postfix/smtpd[28571]: warning:  unknown[101.89.216.243]: SASL LOGIN authentication failed: UGFje8vcmQ6
>
>What port is this being conducted on?
>
>Is this smtp port 25?

SASL is usually used on the submission port, 587.

Do you have SASL enabled on port 25? If so, it's a good idea to only leave it enabled on port 587.

I am not sure if I do.  I don't see anything in my /etc/dovecot/dovecot.conf file relating to sasl ports (or in any of the dovecot/conf.d/* files).

I've revised my iptables port blocking to see if blocking 587 stops the login attempts.

Anybody know what settings in Dovecot/CentOS might relate to this?

So I assume port 587 is an alternative smtp port, usually reserved for localized traffic?  Blocking it won't affect normal mail flow?

- Mike





_______________________________________________
Fail2ban-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

_______________________________________________
Fail2ban-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to