On Wed, Oct 23, 2024 at 10:51:38AM +0300, Ivan Ionut via Postfix-users wrote:

> 2) I have two lists of ipsets ip and ip-cidr blocked for ports
> 110,143,993,995,465 - daily updated with a custom script

That's too tedious to maintain.  You can block known compromised SASL
attempts on submission via the XBL, by setting "smtpd_delay_reject=no"
and adding an RBL lookup to the client restrictions.

    submission inet  n       -       n       -       -       smtpd
        -o smtpd_delay_reject=no
        -o syslog_name=postfix/submission
        -o smtpd_sasl_auth_enable=yes
        -o smtpd_tls_security_level=encrypt
        -o {smtpd_client_restrictions=reject_rbl_client 
zen.spamhaus.org=127.0.0.4}
        -o smtpd_helo_restrictions=
        -o smtpd_sender_restrictions=
        -o 
smtpd_relay_restrictions=permit_sasl_authenticated,permit_mynetworks,reject
        -o smtpd_recipient_restrictions=
        -o smtpd_data_restrictions=
        -o smtpd_end_of_data_restrictions=
        -o always_add_missing_headers=yes
        -o header_checks=
        -o body_checks=
        ...

For fresh sources, use fail2ban, with a very short TTL (around an hour),
to minimise collateral damage.  Or don't bother, if you don't have
logins with weak passwords.

-- 
    Viktor.
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to