Hi Nicolas,

Thank you very much for your OpenSMTPD Fail2Ban filter. I just tried it out and 
it actually detects the IP address out of the log file as you can see here:

2017-08-23 17:30:13,089 fail2ban.filter         [298]: INFO    [opensmtpd] 
Found 1XX.2XX.5X.1XX

but somehow does not manage add this IP address to be blocked by iptables. 
Maybe my jail.conf entry for that filter is wrong, I currently added the 
following entry:

[opensmtpd]
enabled = yes
port = smtp
logpath = /var/log/mail.log

Any ideas? I am running Debian 9 as OS.

Regards,
Mabi

> -------- Original Message --------
> Subject: Re: Fail2Ban filter for OpenSMTPD
> Local Time: August 23, 2017 4:33 PM
> UTC Time: August 23, 2017 2:33 PM
> From: [email protected]
> To: [email protected]
>
> Hi
>
> I know some people was searching for fail2ban filters for opensmtpd.
>
> I had the same need, and I"ve created my own simple filter, I share it here 
> if it can help.
>
> # Fail2Ban filter for opensmtpd
> # Author: Nicolas Repentin
> #
>
> [INCLUDES]
>
> # Read common prefixes. If any customizations available -- read them from
> # common.local
> before = common.conf
>
> [Definition]
>
> failregex = ^.*smtp event=connected address=<HOST>.*\n.*smtp 
> event=failed-command command="AUTH
> LOGIN" result="503 5.5.1 Invalid command: Command not supported
>
> ignoreregex =
>
> [Init]
> maxlines = 2
>
> It only work actually for this example:
>
> #Aug 23 10:48:54 myserver smtpd[17412]: abc813f0c6789766 smtp event=connected 
> address=177.135.X.X
> host=hidden.host.com
> #Aug 23 10:48:55 myserver smtpd[17412]: abc813f0c6789766 smtp 
> event=failed-command command="AUTH
> LOGIN" result="503 5.5.1 Invalid command: Command not supported"
>
> Nicolas

Reply via email to