During the installation of QMail (including QMT), there should have been
a symbolic link created for sendmail.
The command:
*ln -s /var/qmail/bin/sendmail /usr/sbin/sendmail*
will re-create it, although I think they usually use relative links vs.
the static link here.
Essentially, all *nix
Hi Dan
Relevent parts of my jail.local i borrowed from here
https://github.com/fail2ban/fail2ban/blob/master/config/jail.conf
*[qmail-rbl]**
**filter = qmail**
**port = smtp,465,submission**
**logpath = /service/qmail/log/main/current*
And the qmail.conf in filter.d folder
*# Fail2Ban
Hi Dan.
It's always a good idea to test the filters I have learned - due to
differences in log entries - it is easy to check if Your filter will
catch what You want.
fail2ban-regex /path_to_log/logfile /path_to_filter/filter.conf
Example:
fail2ban-regex /var/log/maillog
This may also be helpfull in pulling the Bad ip addresses.
I am not a coder so cant tell you exactly what it all means
Not sure where I found it, i beleive it looks in the fail2ban.log file
and pulls the banned IP`s
Save the file getip.sh , chmod +x
I run it as:
./getip.sh badip.txt
,
This is very useful. Be sure your setup works before trusting/relying
on it.
On 8/7/14 7:57 AM, Finn Buhelt wrote:
Hi Dan.
It's always a good idea to test the filters I have learned - due to
differences in log entries - it is easy to check if Your filter will
catch what You want.
Right on, Dan. (s/static/absolute/ though)
I hadn't noticed until now that with the new install process, logwatch
is absent.
Should the 'stock' QMT include logwatch? What do y'all think? If so, is
there any configuration to be done?
Thanks.
--
-Eric 'shubes'
On 08/07/2014 06:03 AM, Dan
Hi Hasan,
Any update on working on this patch. I tried but didn’t succeed.
With Regards,
Amit Dalia
From: Hasan Akgöz [mailto:hasanak...@mail.ru]
Sent: 02 August 2014 17:10
To: qmailtoaster-list@qmailtoaster.com
Subject: Re: [qmailtoaster] Re: Prevent sender from spoofing email address
On 08/06/2014 10:43 PM, Sebastian Grewe wrote:
As long as you feed ELK from logstash by reading logs there is no reason that
you couldn't attach fail2ban to the same logs. If you plan to forward logs to
elk without local files being written you will have problems.
That's what I was thinking.
On 08/06/2014 03:09 PM, Dan McAllister wrote:
I am curious -- has anyone looked into a fail2ban implementation for QMT
One of my larger mail servers is being attacked (from China, currently,
but when it started in Malaysia and I blocked all malaysian IPs, they
just moved to another IP) with
I have an associate with Outlook'07 who's trying to connect to a COS6
build of QMT. It's authenticating fine with dovecot using digest-md5,
but authentication to qmail-smtpd (submission port) fails.
Both connections are successfully using TLS.
I just tested SM with cram-md5, and that works
On 07/17/2014 04:32 PM, Hasan Akgöz wrote:
Hi Guys;
allows SMTP authenticated users to put a fake email address in an
email's sender field and the email is sent successfully .How to enforce
sender/from address to be “logged_u...@test.com
mailto:logged_u...@test.com” in Qmailtoaster ?
Check
11 matches
Mail list logo