Today, we close the connection after 10 errors. While this is fine for normal use, it is unnecessarily large. Lowering it to 3 helps with defense-in-depth for cross-protocol attacks (e.g. https://alpaca-attack.com/), while still being large enough for useful troubleshooting and normal operation. As part of this change, we also remove the AUTH-specific failures limit, because they're covered by the connection limit.
35 lines
694 B
Plaintext
35 lines
694 B
Plaintext
|
|
c tls_connect localhost:1465
|
|
|
|
c <~ 220
|
|
c -> EHLO localhost
|
|
c <... 250 HELP
|
|
|
|
c -> AUTH SOMETHINGELSE
|
|
c <~ 534
|
|
|
|
c -> AUTH PLAIN
|
|
c <~ 334
|
|
c -> dXNlckB0ZXN0c2VydmVyAHlalala==
|
|
c <~ 501 5.5.2 Error decoding AUTH response
|
|
|
|
# Reconnect to avoid getting rejected due to too many errors.
|
|
c close
|
|
c tls_connect localhost:1465
|
|
c <~ 220
|
|
c -> EHLO localhost
|
|
c <... 250 HELP
|
|
|
|
c -> AUTH PLAIN
|
|
c <~ 334
|
|
c -> dXNlckB0ZXN0c2VydmVyAHVzZXJAdGVzdHNlcnZlcgB3cm9uZ3Bhc3N3b3Jk
|
|
c <~ 535 5.7.8 Incorrect user or password
|
|
|
|
c -> AUTH PLAIN
|
|
c <~ 334
|
|
c -> dXNlckB0ZXN0c2VydmVyAHVzZXJAdGVzdHNlcnZlcgBzZWNyZXRwYXNzd29yZA==
|
|
c <~ 235 2.7.0 Authentication successful
|
|
|
|
c -> AUTH PLAIN
|
|
c <~ 503 5.5.1 You are already wearing that!
|