On Tue, Mar 3, 2015 at 1:28 AM, Sam Varshavchik <mr...@courier-mta.com>
wrote:
>
> I find that the existing logging to be sufficient.
>
I think you're very, very wrong.
>
> That pretty much all the information one needs. Past this point, the
> existing rate limiting kicks in, slowing things down to, one average 1-2
> log entries per second. Quite managable.
>
Nopes, I need to know whether a specific user has been attempted
authenticated, or whether it's been a brute force login attempt.
In other words: whether there was a buggy piece of client software, or a
malicious attacker.
>
> Here's a naive question. Do you even have smtp authentication enabled,
> here.
No, of course not, I've been talking about IMAP all along.
--
Jan
------------------------------------------------------------------------------
Dive into the World of Parallel Programming The Go Parallel Website, sponsored
by Intel and developed in partnership with Slashdot Media, is your hub for all
things parallel software development, from weekly thought leadership blogs to
news, videos, case studies, tutorials and more. Take a look and join the
conversation now. http://goparallel.sourceforge.net/
_______________________________________________
courier-users mailing list
courier-users@lists.sourceforge.net
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users