Am 24.08.2014 um 21:11 schrieb Wietse Venema:
> CSS:
>>>> If your relay restrictions look like:
>>>>
>>>> main.cf:
>>>> indexed = ${default_database_type}:${config_directory}/
>>>> smtpd_relay_restrictions =
>>>> check_sasl_access ${indexed}sasl-access,
>>>> permit_sasl_authenticated,
>>>> permit_mynetworks,
>>>> reject_unauth_destination
>>>>
>>>> (before any user account is compromised), then once an account
>>>> is hijacked:
>>>>
>>>> sasl-access:
>>>> [email protected] REJECT 5.7.1 Your login is compromised.
>>>
>>> This is a particularly good solution as it allows the user to continue
>>> receiving email so that you can send them them a message explaining
>>> exactly what the problem is.
>>
>> And I assume this can be sql-backed, correct? So it should be easy
>> to build a web-based tool for staff to nuke/un-nuke account once the
>> issue has been addressed.
>
> Correct. To estimate the SQL query load, there will be one query
> per "RCPT TO" command
how does that work with "smtpd_sasl_type = dovecot" because in
case of a failed SASL logins you have random crap in the maillog
but not the username?
warning: 1-171-63-28.dynamic.hinet.net[1.171.63.28]: SASL LOGIN authentication
failed: UGFzc3dvcmQ6
warning: chello062178066223.23.11.tuwien.teleweb.at[62.178.66.223]: SASL
CRAM-MD5 authentication failed:
PDAyNzA5ODU4MzIwNTE0MTkuMTQwODkwMzMyMEBtYWlsLnRoZWxvdW5nZS5uZXQ+
so if the above feature works why postfix don't log the username at all?