On Wed, Oct 23, 2024 at 10:51:38AM +0300, Ivan Ionut via Postfix-users wrote:
> 2) I have two lists of ipsets ip and ip-cidr blocked for ports > 110,143,993,995,465 - daily updated with a custom script That's too tedious to maintain. You can block known compromised SASL attempts on submission via the XBL, by setting "smtpd_delay_reject=no" and adding an RBL lookup to the client restrictions. submission inet n - n - - smtpd -o smtpd_delay_reject=no -o syslog_name=postfix/submission -o smtpd_sasl_auth_enable=yes -o smtpd_tls_security_level=encrypt -o {smtpd_client_restrictions=reject_rbl_client zen.spamhaus.org=127.0.0.4} -o smtpd_helo_restrictions= -o smtpd_sender_restrictions= -o smtpd_relay_restrictions=permit_sasl_authenticated,permit_mynetworks,reject -o smtpd_recipient_restrictions= -o smtpd_data_restrictions= -o smtpd_end_of_data_restrictions= -o always_add_missing_headers=yes -o header_checks= -o body_checks= ... For fresh sources, use fail2ban, with a very short TTL (around an hour), to minimise collateral damage. Or don't bother, if you don't have logins with weak passwords. -- Viktor. _______________________________________________ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org