On 08/04/2015 02:11 PM, Dianne Skoll wrote:
On Tue, 4 Aug 2015 14:45:42 -0400
"Kevin A. McGrail" <[email protected]> wrote:
On 8/4/2015 2:02 PM, Philip Prindeville wrote:
Is there any other way to figure out if this is HELO that follows a
STARTTLS?
Save state and re-call the helo check again in filter_sender, perhaps?
This is why I resisted even adding a filter_helo callback. It's
basically useless. Anything you can do in filter_helo might as well
be deferred to filter_sender.
If an SMTP client connects, says EHLO and then closes the connection...
do we really care?
Regards,
Dianne.
Potentially, yes... If it's doing a denial of service attack I might
want to notice the rate of incoming connections, save them into a .db
file, and start blocking them in filter_relay() as a way to rate-limit.
-Philip
_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID. You may ignore it.
Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang