2.2.15: SMTP submission server?
skdovecot at smail.inf.fh-brs.de
Thu Nov 27 07:17:53 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
On Wed, 26 Nov 2014, Mark Homoky wrote:
> On 17/11/2014 07:23, Ron Leach wrote:
>> On 16/11/2014 07:24, Robert Schetterer wrote (re-ordered):
>>> Am 16.11.2014 um 02:24 schrieb Reindl Harald:
>> Off topic for Dovecot list, but I might think instead about separate
>> inbound and outbound MTAs to achieve containment of inbound MTA compromise.
@Ron: This seems to be the most sensible option for your concerns anyway,
but with a well-known MSA. The inbound MTA need not advertise its
existance to the web and, if port 587 is the only one, you could bann port
probes, because few attackers will start with port 587.
> As Reindl said switch off SASL on port 25 (hence in the SMTP conversation
> following the ehlo line, the client isn't even offered AUTH and hence the
> chance to login to try to relay).
> You really can't get stronger mail injection than using the standard
> submission port only accepting AUTH via TLS encrypted connections on port 587
If both port 25 and port 587 are open on the same server, is there any
statitic about how much attackers probe port 25 before 587 and if
disabling AUTH on port 25 helps at all in that case?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
-----END PGP SIGNATURE-----
More information about the dovecot