On 18/04/10 17:27, Ignacio García wrote:
John, thanks so much for your interest. I just downloaded it. Tomorrow
I will be meeting my partner (he's the php guy) adn we will take a
look at it. I'll certainly keep you posted of any developments.
Best regards,
Ignacio
I have made an updated
El 16/04/10 23:33, John Fawcett escribió:
I've been using cbpolicyd to do rate limiting on submission port not
because I want to rate limit legitimate users, but to protect against
stolen credentials.
The approach of scanning the logfile that you outline, though not real
time like cbpolicyd
On 15/04/10 17:28, Ignacio García wrote:
The way I think this could be solved is by having a program that:
1.- Checks the logs for authenticated smtp usage and saves
smtp_authenticated_user, originating IPs, and country, which is
dicovered using ip geolocation.
2.- During the following
On Wed, 2010-04-14 at 21:15 +0200, Ignacio García wrote:
Hi there. Some days ago 1 of our postfix servers was abused by bot
networks using one of our customer's stolen credentials, inadvertently
done by a virus/keylogger probably. In few hours more than 2 spam
messages were in our
El 15/04/10 12:41, ram escribió:
The points mentioned should help you especially ratelimits , and FBL's
Are you planning to do outgoing scanning.
Hi Ram. I believe ratelimits and FBLs can help, but just partially. FBLs
are of great help, but they work only after much harm has been done. For
Hi there. Some days ago 1 of our postfix servers was abused by bot
networks using one of our customer's stolen credentials, inadvertently
done by a virus/keylogger probably. In few hours more than 2 spam
messages were in our queue. Looking at the logs I realized all those
outgoing messages