hub
hub copied to clipboard
Feature/New Collection for Axigen Mail Server
What would you like to be added?
Add a Bouncer, similar to Postfix and Dovecot, to parse syslog style Axigen mail logs (stored in /var/log/maillog [RHEL/CentOS]) looking for brute force and spam attacks.
Why is this needed?
Adds a layer of protection to another mail/webmail server.
Hi,
We need a sample of logs to see what we can do.
Best regards,
Hi, In order to identify the origin IP of the failure/attack, we need it to be on a single line of log. To activate it in your logging you may try to enable the security log by changing the value of “enableSecurityLog” parameter from no to yes in Axigen configuration file (${AXIGEN_WORK_DIR}/run/axigen.cfg).
Note that a restart of Axigen service is required after the change.
Can you try this, do a few unsuccessful authentication attempts and provide us with the resulting logs? You should see lines containing a failure marker ("OP_FAIL" for example) and the IP on the same line
Regards