#Fail2banでpostfixのアクセス制限をしています。SASL等の分はうまく機能しているのですが、以下のような場合に反応していないようなのです。
log
1 2 3Sep 29 22:05:06 ik1-337-28583 postfix/smtpd[11004]: connect from unknown[196.242.244.229] 4Sep 29 22:05:07 ik1-337-28583 postfix/smtpd[11004]: NOQUEUE: reject: RCPT from unknown[196.242.244.229]: 454 4.7.1 <spameri@tiscali.it>: Relay access denied; from=<spameri@tiscali.it> to=<spameri@tiscali.it> proto=ESMTP helo=<WIN-QGFOVKPDT6T> 5Sep 29 22:05:07 ik1-337-28583 postfix/smtpd[11004]: disconnect from unknown[196.242.244.229] 6Sep 29 22:08:27 ik1-337-28583 postfix/anvil[11005]: statistics: max connection rate 1/60s for (smtp:196.242.244.229) at Sep 29 22:05:06 7Sep 29 22:08:27 ik1-337-28583 postfix/anvil[11005]: statistics: max connection count 1 for (smtp:196.242.244.229) at Sep 29 22:05:06 8Sep 29 22:08:27 ik1-337-28583 postfix/anvil[11005]: statistics: max cache size 1 at Sep 29 22:05:06 9 10 11 12Sep 30 06:46:44 ik1-337-28583 postfix/smtpd[14013]: warning: hostname zg-0915b-366.stretchoid.com does not resolve to address 162.243.128.174: Name or service not known 13Sep 30 06:46:44 ik1-337-28583 postfix/smtpd[14013]: connect from unknown[162.243.128.174] 14Sep 30 06:46:44 ik1-337-28583 postfix/smtpd[14013]: disconnect from unknown[162.243.128.174] 15Sep 30 06:50:04 ik1-337-28583 postfix/anvil[14014]: statistics: max connection rate 1/60s for (submission:162.243.128.174) at Sep 30 06:46:44 16Sep 30 06:50:04 ik1-337-28583 postfix/anvil[14014]: statistics: max connection count 1 for (submission:162.243.128.174) at Sep 30 06:46:44 17Sep 30 06:50:04 ik1-337-28583 postfix/anvil[14014]: statistics: max cache size 1 at Sep 30 06:46:44 18
#現状のpostfix関連の設定は以下になります
[postfix] # To use another modes set filter parameter "mode" in jail.local: enabled = true mode = more port = smtp,465,submission logpath = %(postfix_log)s backend = %(postfix_backend)s bantime = 8640000 findtime = 43200 maxretry = 1 [postfix-rbl] filter = postfix[mode=rbl] port = smtp,465,submission logpath = %(postfix_log)s backend = %(postfix_backend)s maxretry = 1 [postfix-ddos] filter = postfix[mode=ddos] port = smtp,465,submission logpath = %(postfix_log)s backend = %(postfix_backend)s enabled = true bantime = 864000 findtime = 43200 maxretry = 1 [postfix-sasl] enabled = true filter = postfix-sasl action = iptables-multiport[name=postfix-sasl, port="smtp,smtps,submission", pro tocol=tcp] # sendmail-whois[name=postfix-sasl, dest=************** , s ender=fail2ban@domain.jp] port = smtp,465,submission,imap,imaps,pop3,pop3s # You might consider monitoring /var/log/mail.warn instead if you are # running postfix since it would provide the same log lines at the # "warn" level but overall at the smaller filesize. logpath = %(postfix_log)s backend = %(postfix_backend)s bantime = 8640000 findtime = 43200 maxretry = 1
あなたの回答
tips
プレビュー