Has anyone experienced people trying to brute force vpopmail?
I'm sick of it, so I cron'ed a little script others might enjoy.
http://stilen.com/scripts/perl/vpopmail_fail2drop.pl
Feedback appreciated.
!DSPAM:50483d9e34211728335788!
Hello,
It seems good !
For such purpose I use this kind of rules
iptables -P INPUT DROP
...
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
...
iptables -A INPUT -m state --state NEW -p TCP --dport 110 --syn -m limit
--limit 3/s --limit-burst 3 -j ACCEPT
...
iptables -A INPUT
Hello!
I am using fail2ban (http://www.fail2ban.org/wiki/index.php/Main_Page).
Maybe it is useful for you, too.
Best,
Harti
On 06 Sep 12, Thibault Richard wrote:
Hello,
It seems good !
For such purpose I use this kind of rules
iptables -P INPUT DROP
...
iptables -A INPUT -m state
On Thu, Sep 6, 2012 at 1:44 AM, Hartmut Wernisch | Domaintechnik.at
h...@domaintechnik.at wrote:
I am using fail2ban (http://www.fail2ban.org/wiki/index.php/Main_Page).
Maybe it is useful for you, too.
That's what I use too - works quite well - using this vpopmail.conf for the
filter
大変申し訳ございませんが、この電子メールアドレスは送信専用の為、
ご質問等は受付をいたしておりません。
お手数ですが、ご質問はhelpd...@sevenbank.co.jpまで
お願いいたします。
---
セブン銀行 テレホンセンター
0088-21-1189(無料)
03-5610-7730(有料)
helpd...@sevenbank.co.jp
受付時間 8:00〜21:00(年中無休)
!DSPAM:5048cdd234218413217583!