On Tue, Jun 09, 2015 at 12:54:51PM -0400, Forrest wrote:
> I recently updated my system from Sendmail to Postfix 3.0.1. Since that
> time, I've been targeted with several SASL dictionary attacks; activity I've
> not seen in this number before.
Restricting SASL to TLS might help...
http://www.postfix.org/SASL_README.html#server_sasl_authc
smtpd_tls_auth_only = yes
if the attacks are primarily over non-TLS connections. You might
also restrict SASL to port 587 and not enable it on port 25.
> Reading around elsewhere, I wonder if the script kiddies are looking for
> Postfix in the banner (which I've since removed), going after a presumed
> vulnerability?
The "vulnerability" in question is weak (easily guessed) passwords.
It seems unlikely that such attacks specifically target Postfix,
or that they care about the ESMTP banner.
--
Viktor.