On Thu, 2023-06-22 at 16:27 +0100, Nick Howitt via Fail2ban-users wrote:
>
>
> On 2023-06-22 12:58, André Rodier via Fail2ban-users wrote:
> > Hello, all.
> >
> > I just set-up a new server, running postfix, with submission(s)
> > activated on standard ports (587, 465)
> >
> > Shortly after it
Hello, all.
I just set-up a new server, running postfix, with submission(s) activated on
standard ports (587, 465)
Shortly after it has been setup, I see brute force attacks (not surprising)
from a whole /24 network (more surprising).
I carefully checked the logs, and see the modus operandi, w
On 2023-06-22 12:58, André Rodier via Fail2ban-users wrote:
Hello, all.
I just set-up a new server, running postfix, with submission(s)
activated on standard ports (587, 465)
Shortly after it has been setup, I see brute force attacks (not
surprising) from a whole /24 network (more surprising)
On 22/06/2023 23:01, fail2ban-users-requ...@lists.sourceforge.net wrote:
> I just set-up a new server, running postfix, with submission(s)
activated on standard ports (587, 465)
First of all, have you activated postscreen, and configured it to query
SPAMCop &c?
Postscreen is part of the pos
Hello, all.
I just set-up a new server, running postfix, with submission(s) activated on
standard ports (587, 465)
Shortly after it has been setup, I see brute force attacks (not surprising)
from a whole /24 network (more surprising).
I carefully checked the logs, and see the modus operandi, w