1. Please take a little time for this simple survey! Thank you for participating!
    Dismiss Notice
  2. Dear Pleskians, please read this carefully! New attachments and other rules Thank you!
    Dismiss Notice
  3. Dear Pleskians, I really hope that you will share your opinion in this Special topic for chatter about Plesk in the Clouds. Thank you!
    Dismiss Notice

smtp xinetd help

Discussion in 'Plesk for Linux - 8.x and Older' started by atomicmak, Nov 8, 2006.

  1. atomicmak

    atomicmak Guest

    i heared putting ip stack in smtp_psa would help block attack from ip range.

    service smtp
    socket_type = stream
    protocol = tcp
    wait = no

    no_access =
    no_access =
    no_access =


    someone said in this forum that adding one param to smtp_psa (banner_fail) would show the ip blocked by smtp in a log so i added like this in smtp_psa.

    banner_fail = /var/log/smtp.fail
    disable = no
    user = root
    instances = UNLIMITED
    server = /var/qmail/bin/tcp-env
    server_args = /var/qmail/bin/relaylock /var/qmail/bin/qmail-smtpd /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw /var/qmail/bin/true
    per_source = 20

    but still i am not getting smtp.fail log or nothing being written in that file.

    can anyone help me on this ?

    the thread i ead is

    http://forum.swsoft.com/showthread....ge=15&highlight=formmail exploit&pagenumber=1