Claus Aßmann wrote:
> "What's the problem you are trying to solve?"
> Why do you want to access that data?
>
> ${auth_authen}
> The client's authentication credentials as deter-
> mined by authentication (only set if successful).
> ^^^^^^^^^^^^^^^^^^^^^^
I don't know about Ed's situation, but I would certainly like to be able
to discern these two situations (assuming no bandwith limitations) from
each other:
* user has an incorrect password in their (badly behaving) email client,
which keeps repeatedly hammering our server with the same username
* compromised host is doing a dictionary attack over all our users
If I understood correctly, if the attempted authentication credentials
are not stored in the logs, how do you tell these apart?
And then there's the kinda opposite case of a large botnet hammering the
server with an exhaustive search for a single account password.
--
/* * * Otto J. Makela <
o...@iki.fi> * * * * * * * * * */
/* Phone:
+358 40 765 5772, ICBM: N 60 10' E 24 55' */
/* Mail: Mechelininkatu 26 B 27, FI-00100 Helsinki */
/* * * Computers Rule 01001111 01001011 * * * * * * */