Date: Mon, 20 Jan 2014 17:25:23 -0500 From: Brian Reichert <reichert@numachi.com> To: "William A. Fink" <bill@billfink.com> Cc: freebsd-hackers@freebsd.org Subject: Re: Looking For Beginner/Mediocre Help Message-ID: <20140120222523.GG55121@numachi.com> In-Reply-To: <06be01cf162a$dd337bd0$979a7370$@billfink.com> References: <06be01cf162a$dd337bd0$979a7370$@billfink.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Jan 20, 2014 at 04:59:11PM -0500, William A. Fink wrote: > I hope I'm not double-posting, posting in a list I'm not supposed to, but it > seems (to me, anyway) a great place to start. Seems it never fails, someone > comes back and complains, this is the wrong list. (No matter which list I've > posted to in the past.) if you're looking to expoose the incoming IP addresses, this post: http://serverfault.com/questions/281231/help-linux-server-under-smtp-saslauthd-attack has a response that says: You have to increase the LogLevel to 10 or more. Look in sendmail.mc or put something like define(confLOG_LEVEL',10')dnl This will log the IP number on auth failures. Presumably, once they're exposed, any of the mechanims for softly managing an IP blacklist would help. > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" -- Brian Reichert <reichert@numachi.com> BSD admin/developer at large
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20140120222523.GG55121>