Hi Tim,

 Thanks for your response. I should have mentioned that this server is
meant to be a hosting server for both web and mail, and there is no way
to effectively restrict based on trusted clients.

 Is there anything else perhaps more general for if not preventing, then
deterring and slowing down this kind of attack?

Thanks,
Nick

On Wed, 2008-01-30 at 10:56 -0500, Tim Evans wrote:
> Nick Jennings wrote:
> 
> >  Luckily this machine is not in production yet and so I just shutdown
> > the dovecot daemon. I was wondering if anyone could suggest any measures
> > I can take to stop thing kind of thing happening? Also, what kinds of
> > risks does this sort of an attack expose me to? Could it bring my server
> > down or could they actually break in?
> 
> 1. report the abuse to the provider; you have incoming the IP address.
> 
> 2. Use tcp wrapper to secure dovecot, limiting access to known good
> addresses.

_______________________________________________
rhelv5-list mailing list
rhelv5-list@redhat.com
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to