[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: qpopper brute force attack




Besides the soft you run on the server, I'd recommend using fail2ban, it's really useful with that kind of attacks, you should take a look at it.


--
Saludos,
                         Germán

Paradise is exactly like where you are right now... only much, much better.

On 4/23/07, Carlos Acedo <carlos@pangea.org > wrote:
Hi,

I have received an attack to my pop3 server qpopper leading this to
crash, and every time I woke up it crashed again. Eventually I filtered
the attacker ip with iptables.

The attacker was trying to login with usual names with many attempts per
second (AKA brute force).

After the attack I'm not very confident to qpooper, so is there any good
alternatives to qpopper? what about xmail?

Thank you

Carlos.


--
To UNSUBSCRIBE, email to debian-isp-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org





Reply to: