From 30bd87b0a3523bf4d800a90c1f72b7cea6256046 Mon Sep 17 00:00:00 2001 From: Andreas Baumann Date: Mon, 22 Apr 2019 10:05:27 +0200 Subject: mail disaster: small typos fixed --- content/blog/mail-disaster.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/content/blog/mail-disaster.md b/content/blog/mail-disaster.md index 4987c37..a7d2dd8 100644 --- a/content/blog/mail-disaster.md +++ b/content/blog/mail-disaster.md @@ -23,13 +23,13 @@ Details: * Current traffic quota: 0.3 Million queries/month. ``` -Well, fine, I thought, finall somebody is checking on my web page and I +Well, fine, I thought, finally somebody is checking on my web page and I went to sleep. -Of course this was not the case: I had a weak password in one account +Of course this was not the case: I had a weak password in one of the accounts of my mailserver (which allowed any legitimate Linux user to send emails). This caused all those DNS lookups for my domain on the -BuddNS DNS servers. +BuddyNS DNS servers. So, my thinking went along the lines: well, some weeks ago I replaced the SD card, because the old one was worn out, I cannot @@ -45,7 +45,7 @@ Swearing big times about my own stupidity (the default password for the Checking my mail server logs I found that all attacks went via one single IP (185.228.80.18). So just blocking the firewall was the fastest way to -fix the tousands of spam email being sent via my now-defacto-open mail relay. +fix the tousands of spam email being sent via my now defacto open mail relay. ## Checking status -- cgit v1.2.3-54-g00ecf