> On 13 Nov 2017, at 5.47, James Brown <[email protected]> wrote:
> 
> We are seeing lots of IMAP login attempts like this:
> 
> dovecot[363]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): 
> user=<xcentrex5fxnewx5fxyorkx5fxquotex5fxisx5fxreadyx2dxx2dx426453.eml>, 
> method=PLAIN, rip=197.255.60.118,
> 
> or
> 
> dovecot[363]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): 
> user=<xmatchingx5fxyourx5fxrecentx5fxvisitx5fxonx5fxx2dxx2dx121584....@bordo.com.au>,
>  method=PLAIN, rip=37.235.28.229, 
> 
> etc.
> 
> We are running fail2ban, but as each login attempt is from a different IP it 
> is not able to stop them.
> 
> We are running Sophos UTM firewall but that has no IMAP Proxy and never will.
> 
> Is anyone else experiencing this? How is such an attack is supposed to ever 
> succeed? What are they trying to accomplish?
> 
> Any ideas on how to mitigate it?

If the attempts really all come from different source ip addresses and the 
username attempted 
is always *.eml (and you don't have any real users with username ending in 
.eml), maybe you
could just create deny-passdb with username_filter *.eml?

passdb {
  driver = static
  deny = yes
  username_filter = *.eml
  args =
}

as your first passdb

Sami

Reply via email to