On 08/04/2015 02:11 PM, Dianne Skoll wrote:
On Tue, 4 Aug 2015 14:45:42 -0400
"Kevin A. McGrail" <[email protected]> wrote:

On 8/4/2015 2:02 PM, Philip Prindeville wrote:
Is there any other way to figure out if this is HELO that follows a
STARTTLS?
Save state and re-call the helo check again in filter_sender, perhaps?
This is why I resisted even adding a filter_helo callback.  It's
basically useless.  Anything you can do in filter_helo might as well
be deferred to filter_sender.

If an SMTP client connects, says EHLO and then closes the connection...
do we really care?

Regards,

Dianne.


Potentially, yes... If it's doing a denial of service attack I might want to notice the rate of incoming connections, save them into a .db file, and start blocking them in filter_relay() as a way to rate-limit.

-Philip

_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to