On Tue, Jun 09, 2015 at 12:54:51PM -0400, Forrest wrote:

> I recently updated my system from Sendmail to Postfix 3.0.1.  Since that
> time, I've been targeted with several SASL dictionary attacks; activity I've
> not seen in this number before.

Restricting SASL to TLS might help...

    http://www.postfix.org/SASL_README.html#server_sasl_authc

        smtpd_tls_auth_only = yes

if the attacks are primarily over non-TLS connections.  You might
also restrict SASL to port 587 and not enable it on port 25.

> Reading around elsewhere, I wonder if the script kiddies are looking for
> Postfix in the banner (which I've since removed), going after a presumed
> vulnerability?

The "vulnerability" in question is weak (easily guessed) passwords.
It seems unlikely that such attacks specifically target Postfix,
or that they care about the ESMTP banner.

-- 
        Viktor.

Reply via email to