> seconds ago but was denied with the require_resolvable_fromhost.  What
> seems like is happening is that Qpsmtpd is dropping the connection but the
> buffers aren't being flushed so that when the next Qpsmtpd picks up the
> file handle the old one had it's getting the data that was left over. 
> I am running Pperl with --no-cleanup but enabling cleanup did nothing to
> solve the problem as did just calling qpsmtpd directly from tcpserver
> without pperl.  The only thing I have found that got rid of the problem
> was to edit the require_resolvable_fromhost plugin and change it from
> DENYHARD to DENYSOFT.  Hope this helps somebody out there.

Now you've rung a bell.

We've seen this problem with pperl too.  It's one of the reasons we
switched to qpsmtpd-forkserver.

The idea behind using DENYHARD was to get rid of the user as fast as
possible.  Probably what you actually want is just 'DENY' -- but use
what works.

-R (who needs to finish his customizable return codes thingy)

Reply via email to