> seconds ago but was denied with the require_resolvable_fromhost. What > seems like is happening is that Qpsmtpd is dropping the connection but the > buffers aren't being flushed so that when the next Qpsmtpd picks up the > file handle the old one had it's getting the data that was left over. > I am running Pperl with --no-cleanup but enabling cleanup did nothing to > solve the problem as did just calling qpsmtpd directly from tcpserver > without pperl. The only thing I have found that got rid of the problem > was to edit the require_resolvable_fromhost plugin and change it from > DENYHARD to DENYSOFT. Hope this helps somebody out there.
Now you've rung a bell. We've seen this problem with pperl too. It's one of the reasons we switched to qpsmtpd-forkserver. The idea behind using DENYHARD was to get rid of the user as fast as possible. Probably what you actually want is just 'DENY' -- but use what works. -R (who needs to finish his customizable return codes thingy)