Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 16 Apr 2004 11:52:55 -0500
From:      Dan Nelson <dnelson@allantgroup.com>
To:        antenneX <antennex@swbell.net>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Setting Sendmail to Refuse Possibly Forged Headers
Message-ID:  <20040416165254.GB2146@dan.emsphone.com>
In-Reply-To: <003d01c423cd$79251e00$0200000a@SAGEAME>
References:  <200404151631.i3FGVGOf005743@dc.cis.okstate.edu> <20040415172633.GI28745@dan.emsphone.com> <001201c42360$d6fa58a0$0200000a@SAGEAME> <20040416040139.GM28745@dan.emsphone.com> <003d01c423cd$79251e00$0200000a@SAGEAME>

next in thread | previous in thread | raw e-mail | index | archive | help
In the last episode (Apr 16), antenneX said:
> If I may ask one more thing about the milter-sender:
> The only feature I really wanted from the milter was the option to
> control the number of connections for "unknown users". I get a lot of
> those -- dozens -- hundreds. I believe that is called the
> "Rumplestilkin" (sp?) attack where a search is conducted for good
> emails on a system.
>
> I have not yet seen this option available inside Sendmail and wonder
> if there is one out there yet...?? -- without having to install the
> milter?

There's a confBAD_RCPT_THROTTLE value you can set, which will make
sendmail add 1-second delays between checks after a specified number of
invalid emails, but that's about all you can do from there.

-- 
	Dan Nelson
	dnelson@allantgroup.com



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040416165254.GB2146>