Re: [courier-users] Turning accounts into honeypots

2014-11-07 Thread Alessandro Vesely
On Mon 03/Nov/2014 19:48:55 +0100 I wrote: For example, as I use MySQL, I could add a badpw field in the user table, and craft a select statement that returns the honeypot's username when the input local_part matches the compromised password instead of the good one. I cannot, of course.

Re: [courier-users] Turning accounts into honeypots

2014-11-07 Thread Sam Varshavchik
Alessandro Vesely writes: On Mon 03/Nov/2014 19:48:55 +0100 I wrote: For example, as I use MySQL, I could add a badpw field in the user table, and craft a select statement that returns the honeypot's username when the input local_part matches the compromised password instead of the

Re: [courier-users] Turning accounts into honeypots

2014-11-07 Thread Mark Constable
On 07/11/14 21:52, Sam Varshavchik wrote: Is it possible to add authmysql twice (and have them behave differently)? Nope. You could list authmysql twice, but each instance uses the same config file. Maybe falling over to different auth backends might work but, Sam, it would be really neat to

Re: [courier-users] Turning accounts into honeypots

2014-11-07 Thread Sam Varshavchik
Mark Constable writes: On 07/11/14 21:52, Sam Varshavchik wrote: Is it possible to add authmysql twice (and have them behave differently)? Nope. You could list authmysql twice, but each instance uses the same config file. Maybe falling over to different auth backends might work but,

[courier-users] Turning accounts into honeypots

2014-11-03 Thread Alessandro Vesely
Hi, a mailbox of mines was compromised last week. I hate that. I changed the password just before the automated limit blocked the account. The spammer seems to have a huge botnet, and I still see 535 Authentication failed in the logs. I set DEBUG_LOGIN=2 to make sure they are using the old