Sync upgrade tutorials.

This commit is contained in:
Zhang Huangbin 2015-11-17 11:56:52 +08:00
parent 818567c73f
commit bcbe829077
4 changed files with 37 additions and 9 deletions

View File

@ -355,15 +355,15 @@ update SQL database and exit silently.
### [OPTIONAL] Update one Fail2ban filter regular expression to help catch DoS attacks to SMTP service
1. Open file `/etc/fail2ban/filter.d/postfix.iredmail.conf` or
`/usr/local/etc/fail2ban/filter.d/postfix.iredmail.conf` (on FreeBSD), find
below line under `[Definition]` section:
* Open file `/etc/fail2ban/filter.d/postfix.iredmail.conf` or
`/usr/local/etc/fail2ban/filter.d/postfix.iredmail.conf` (on FreeBSD), find
below line under `[Definition]` section:
```
lost connection after AUTH from (.*)\[<HOST>\]
```
Update above line to below one:
* Update above line to below one:
```
lost connection after (AUTH|UNKNOWN|EHLO) from (.*)\[<HOST>\]

View File

@ -443,6 +443,21 @@ dovecot unix - n n - - pipe
flags=DRh ...
```
### [OPTIONAL] Update one Fail2ban filter regular expression to catch postscreen log
We added one new regular expression to catch postscreen log to help reduce
spam, please follow steps below to add it.
Open file `/etc/fail2ban/filter.d/postfix.iredmail.conf` or
`/usr/local/etc/fail2ban/filter.d/postfix.iredmail.conf` (on FreeBSD), append
below line under `[Definition]` section:
```
reject: RCPT from (.*)\[<HOST>\]:([0-9]{4,5}:)? 550
```
Restarting Fail2ban service is required.
* Save your change and restart Postfix service.
## OpenLDAP backend special

View File

@ -346,15 +346,17 @@ update SQL database and exit silently.</p>
</li>
</ul>
<h3 id="optional-update-one-fail2ban-filter-regular-expression-to-help-catch-dos-attacks-to-smtp-service">[OPTIONAL] Update one Fail2ban filter regular expression to help catch DoS attacks to SMTP service</h3>
<ol>
<ul>
<li>Open file <code>/etc/fail2ban/filter.d/postfix.iredmail.conf</code> or
<code>/usr/local/etc/fail2ban/filter.d/postfix.iredmail.conf</code> (on FreeBSD), find
below line under <code>[Definition]</code> section:</li>
</ol>
<code>/usr/local/etc/fail2ban/filter.d/postfix.iredmail.conf</code> (on FreeBSD), find
below line under <code>[Definition]</code> section:</li>
</ul>
<pre><code> lost connection after AUTH from (.*)\[&lt;HOST&gt;\]
</code></pre>
<p>Update above line to below one:</p>
<ul>
<li>Update above line to below one:</li>
</ul>
<pre><code> lost connection after (AUTH|UNKNOWN|EHLO) from (.*)\[&lt;HOST&gt;\]
</code></pre>

View File

@ -30,6 +30,7 @@
<li><a href="#rhelcentos-7-remove-daemonze-line-in-etcuwsgiini">[RHEL/CentOS 7] Remove daemonze = line in /etc/uwsgi.ini</a></li>
<li><a href="#rhelcentos-7-fix-incorrect-default-firewall-zone-name">[RHEL/CentOS 7] Fix incorrect default firewall zone name</a></li>
<li><a href="#optional-fixed-not-preserve-the-case-of-extension-while-delivering-message-to-mailbox">[OPTIONAL] Fixed: Not preserve the case of ${extension} while delivering message to mailbox</a></li>
<li><a href="#optional-update-one-fail2ban-filter-regular-expression-to-catch-postscreen-log">[OPTIONAL] Update one Fail2ban filter regular expression to catch postscreen log</a></li>
</ul>
</li>
<li><a href="#openldap-backend-special">OpenLDAP backend special</a><ul>
@ -443,6 +444,16 @@ dovecot unix - n n - - pipe
<pre><code> flags=DRh ...
</code></pre>
<h3 id="optional-update-one-fail2ban-filter-regular-expression-to-catch-postscreen-log">[OPTIONAL] Update one Fail2ban filter regular expression to catch postscreen log</h3>
<p>We added one new regular expression to catch postscreen log to help reduce
spam, please follow steps below to add it.</p>
<p>Open file <code>/etc/fail2ban/filter.d/postfix.iredmail.conf</code> or
<code>/usr/local/etc/fail2ban/filter.d/postfix.iredmail.conf</code> (on FreeBSD), append
below line under <code>[Definition]</code> section:</p>
<pre><code> reject: RCPT from (.*)\[&lt;HOST&gt;\]:([0-9]{4,5}:)? 550
</code></pre>
<p>Restarting Fail2ban service is required.</p>
<ul>
<li>Save your change and restart Postfix service.</li>
</ul>