Date: Fri, 16 Apr 2004 11:52:55 -0500 From: Dan Nelson <dnelson@allantgroup.com> To: antenneX <antennex@swbell.net> Cc: freebsd-questions@freebsd.org Subject: Re: Setting Sendmail to Refuse Possibly Forged Headers Message-ID: <20040416165254.GB2146@dan.emsphone.com> In-Reply-To: <003d01c423cd$79251e00$0200000a@SAGEAME> References: <200404151631.i3FGVGOf005743@dc.cis.okstate.edu> <20040415172633.GI28745@dan.emsphone.com> <001201c42360$d6fa58a0$0200000a@SAGEAME> <20040416040139.GM28745@dan.emsphone.com> <003d01c423cd$79251e00$0200000a@SAGEAME>
next in thread | previous in thread | raw e-mail | index | archive | help
In the last episode (Apr 16), antenneX said: > If I may ask one more thing about the milter-sender: > The only feature I really wanted from the milter was the option to > control the number of connections for "unknown users". I get a lot of > those -- dozens -- hundreds. I believe that is called the > "Rumplestilkin" (sp?) attack where a search is conducted for good > emails on a system. > > I have not yet seen this option available inside Sendmail and wonder > if there is one out there yet...?? -- without having to install the > milter? There's a confBAD_RCPT_THROTTLE value you can set, which will make sendmail add 1-second delays between checks after a specified number of invalid emails, but that's about all you can do from there. -- Dan Nelson dnelson@allantgroup.com
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040416165254.GB2146>