under global settings | mail services you set ports .. Simply blank
out the ones you don't want surge to answer on and it won't.
you will have to restart surge to make the changes take effect.
#2) it is normal for a lot of MTA's to try and connect SSL on the
standard ports (25, 110), we see this all the time ... if it doesn't
work then they just revert to non-secure communications.
--Ed
On 03/18/2016 05:28 PM, David Camm wrote:
> we found that surgemail was listening on ports 993, 995 and 465 and
> could not see a way to turn that off, which is why we put in the
> iptables rules.
>
> we're still seeing some of these:
>
> pop: ssl failed SSL error gave up after 6 seconds (20 attempts) (from IP
> 157.56.111.101)
>
> which i fail to understand. seems they're trying to connect using ssl on
> the standard pop port (110). which makes no sense to me. looking at the
> ip addresses involved, they all appear to be registered to microsoft,
> which makes even less sense :-)
>
> there was, however, some minor fallout from implementing the rules.....
>
> customer using phones and setting them up themselves, have sometimes
> failed to turn off ssl and have, as a result, been blocked. when they
> turn of ssl, they're fine.
>
> of course, when a customer asks me how to set up their phone, i tell
> them explicitly to turn ssl off.
>
> i think we'll just let this one ride.
>
> david camm
> advanced web systems
> keller, tx
>
>
> On 3/18/2016 4:08 PM, surgemail-support wrote:
>> Nothing currently would block that, you could disable ssl on the non
>> ssl ports but that strikes me as a bad idea.
>> We could add a black listing feature for these attempts, but I'm
>> reluctant to do that without being sure it's causing some
>> problem other than log entries as it might knock out real users in
>> some situations.
>>
>> Can you send me a bigger log section from mail.err and mail.log and
>> imap.log and pop.log so I can see more context.
>>
>> ChrisP.
>>
>>
>> On 19/03/2016 6:18 a.m., David Camm wrote:
>>> over the past week or so, we been getting a tremendous number of
>>> attempted logins that generate error messages like this:
>>>
>>> pop: ssl failed SSL error gave up after 6 seconds (20 attempts) (from
>>> IP 208.95.135.96)
>>>
>>> and
>>>
>>> smtp: ssl failed SSL error gave up after 6 seconds (20 attempts)
>>> (from IP 208.95.135.96)
>>>
>>> we added iptables rules to drop any traffic attempting to connect to
>>> the secure ports (993, 995 and 465) as we don't support that, but
>>> that didn't help.
>>>
>>> so, clearly the attackers are attempting to connect using the
>>> non-secure ports with ssl protocol.
>>>
>>> is there any way, rather than allowing them 20 attempts to either ban
>>> the ip or cut them off after a fewer number of attempts?
>>>
>>> this has become REALLY annoying.
>>>
>>> david camm
>>> advanced web systems
>>> keller, tx
>>>
>>
>>
>>
>
>
>
--
-----------------------------------------------------------
EAS Enterprises LLC
World Class Web and Email Hosting Solutions
IPv6 ready today for your needs of tomorrow!
Ask us about dual-stacking your site
www.easent.net
|