Not to re-invent the wheel here, but this falls into the same kind of thing I've been rolling out to all of my mailservers: - Port 25 is used to receive inbound mail ONLY. There is *no auth *capability on port 25 (currently enforced by /*spamdyke*/), and there is no relaying on port 25 (unless via /smtproutes/). - Users who send via port 25 can ONLY be successful (by accident) if they're sending to a locally hosted domain... and if that accidentally works, it should be because SPF somehow allowed it to work. - Port 587 is used by all users to send mail. Period. They MUST authenticate, and the use of SSL is permitted (although, you could choose to require it if you so desire). - Port 465 is used exactly like port 587 except that SSL is definitely required. Users are told to use 587, but some few have clients that choose 465 automatically.

BTW: I also REQUIRE my hosted domains to use an "-all" at the end of their SPF designation (clearly, that means I also REQUIRE SPF)... and I enforce SPF with a 3 in spfbehavior (and in SpamAssassin).

Among other things, this allows me to monitor/scan log files for inbound and outbound mail separately. While my users still get plenty of SPAM, these steps help alleviate the "faked" SPAM. If more people used SPF with a "-all" (correctly), then far LESS SPAM would be out there... but if more people were smarter about these things, I wouldn't be making the money I am helping them fix them! :-)

I'll write a Wiki article (the 2nd I'm trying to work through) to explain this in detail.

Dan McAllister
QMT DNS/Mirror Admin

PS: Had fun the other day when a client got a QMAIL reject when sending a message to one of their clients.... they assumed the reject came from our server, but it turns out at least some of GoDaddy's mail servers are QMAIL, as it was a QMAIL server at secureserver.net that issued the REJECT :-)

Made my client feel good about my email service, knowing I was using the same systems as GoDaddy! :-)



On 11/21/2013 9:11 PM, Angus McIntyre wrote:
Eric Shubert wrote:
I honestly don't understand fail2ban in any detail. I wonder though, if
perhaps it's set up such that if someone's authentication fails, then it
changes iptables such that nobody can attempt to authenticate any more
(like blocking port 587 for any address). That'd be pretty bad. :(
If you get a certain number of failed authentications from a particular IP
(usually 3 or 4), it will use iptables to ban that IP from connecting to
the port in question. So 'nobody' means 'nobody at that IP', not 'nobody
in the world'.

Incidentally, when I got tired of grinders trying to guess passwords on my
toaster, I banned a bunch of Chinese class C's (banning a surprisingly
small number took care of most of the attempts I was seeing) and added a
fail2ban filter that does an insta-kill (1 attempt is enough to invoke the
rule) on anything that tries to authenticate with a username that doesn't
include a domain name. That's been pretty effective.

Angus


---------------------------------------------------------------------
To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com



--

PLEASE TAKE NOTE OF OUR NEW ADDRESS
===================================
IT4SOHO, LLC
33 - 4th Street N, Suite 211
St. Petersburg, FL 33701-3806

CALL TOLL FREE:
  877-IT4SOHO

877-484-7646 Phone
727-647-7646 Local
727-490-4394 Fax

We have support plans for QMail!

Reply via email to