there is a collection for postfix so you could add that already…
I don’t see any vpn collections so I guess it is because crowdsec staff does not consider that as a threat because of all the security ovpn or wireguard has in place?
EDIT:
there is a collection for wireguard but
Whilst CrowdSecurity designed this collection, we highly discourage the use of it (Yes we know very odd). Wireguard is designed to be high performant and secure by default protocol using key pairs. The logs were only designed to be for debugging purposes then turned back off. If a user wishes to use this collection go ahead but no support will be offered from the team if you run into issues with wireguard or the collection.
so the postfix collections are enabled in your crowdsec but still the ip are not added to iptables ?
And as I said if they have the logic for wireguard with what I said earlier, it’s highly probable that they have the same logic with openvpn. IF you have an up to date openvpn then there is theorically no risk for the openvpn instance. That’s my guess why there is no decisions or anything about openvpn.
This is hard to ban from openvpn as there is not corresponding IP address
Ensure the postfix logs are being parsed correctly via cscli metrics and if they are most likely the attacker is too slow to be picked up by the current leakspeed.