• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • Support for BIND DNS has been removed from Plesk for Windows due to security and maintenance risks.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS.

smtp xinetd help

A

atomicmak

Guest
i heared putting ip stack in smtp_psa would help block attack from ip range.

===================================
service smtp
{
socket_type = stream
protocol = tcp
wait = no

no_access = 121.1.128.0/17
no_access = 121.1.64.0/18
no_access = 121.128.0.0/11



===================================

someone said in this forum that adding one param to smtp_psa (banner_fail) would show the ip blocked by smtp in a log so i added like this in smtp_psa.

===================================
banner_fail = /var/log/smtp.fail
disable = no
user = root
instances = UNLIMITED
server = /var/qmail/bin/tcp-env
server_args = /var/qmail/bin/relaylock /var/qmail/bin/qmail-smtpd /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw /var/qmail/bin/true
per_source = 20
===================================

but still i am not getting smtp.fail log or nothing being written in that file.

can anyone help me on this ?

the thread i ead is

http://forum.swsoft.com/showthread....ge=15&highlight=formmail exploit&pagenumber=1
 
Back
Top