josh
My feedback
5 results found
-
188 votes
An error occurred while saving the comment -
8 votesjosh supported this idea ·
-
28 votesjosh shared this idea ·
-
22 votesjosh supported this idea ·
-
22 votesjosh supported this idea ·
Hi Gabriel.
error control + flow control is not enough to secure our user.
we see many IP'S in the logs trying to brute force our IP our only solution was IPTABLES.
But this is hassle to admins we need to check the error in the logs assuming per week we caught 10 to 15 IP'S.
brute force in SMTP-IN / POP3 / IMAP / WEBMAIL / WEBADMIN
We are 100% sure spams we received is from SMTP-IN brute-force.
In our case when we blocked those malicious IP in SMTP-IN Spams is reduces to minimal.
Yes we have good anti-spam but.
When the email server received brute-force in smtp-in trying to locate available user and password.
Better to look and add this in future request especially add this features in IMAP / POP3 SMTP-IN or all ports of Axigen same as fail2ban with configuration of banning whitelisting.
This feature will help axigen users.