but due to having to rebuild everything for the openssl issues it's
currently only available as binaries:
ChrisP.
I’ve been hunting around you FTP server and I can’t seem to find 6.6c-1
listed in the SurgeWeb Change history.
Ted Quade
From: surgemail-support [mailto:surgemailHIDDEN@t@netwinsite.com]
Sent: 15-Apr-14 16:08
To: surgemailHIDDEN@etwinsite.com
Subject: re: Re: [SurgeMail List] Weak Password Hackers
Yep, see g_hacker_... settings in version 6.6
ChrisP.
Can we have the same happen to people trying to log into an alias?
(even if not using a weak password)
We set up our "admin, helpdesk wembmaster" etc up as an alias and I see
people trying to log into those accounts. Of course if they use a weak
password they are automatically blocked now :-)
----- Original Message -----
From: surgemail-support
To: surgemailHIDDEN@etwinsite.com
Sent: Sunday, September 01, 2013 3:03 PM
Subject: re: [SurgeMail List] Weak Password Hackers
Nice idea, we will add this, the new setting to enable this will be
g_hacker_weak "true"
ChrisP.
We are getting more and more "User **HIDDEN@ove.net tried to login with
weak password."
I know these are from hackers because we don't allow weak passwords. So
I have been taking the ip and blocking them manually from access to our
server. Is there an option to have this done automatically? The first weak
password and your IP is banned for 90 days?
TIA