Today, we close the connection after 10 errors. While this is fine for normal use, it is unnecessarily large. Lowering it to 3 helps with defense-in-depth for cross-protocol attacks (e.g. https://alpaca-attack.com/), while still being large enough for useful troubleshooting and normal operation. As part of this change, we also remove the AUTH-specific failures limit, because they're covered by the connection limit.
35 lines
902 B
Plaintext
35 lines
902 B
Plaintext
|
|
c tcp_connect localhost:1025
|
|
|
|
c <~ 220
|
|
c -> HELO localhost
|
|
c <~ 250
|
|
c -> MAIL LALA: <>
|
|
c <- 500 5.5.2 Unknown command
|
|
|
|
c -> MAIL FROM:
|
|
c <~ 500
|
|
|
|
# Reconnect to avoid getting rejected due to too many errors.
|
|
c close
|
|
c tcp_connect localhost:1025
|
|
c <~ 220
|
|
c -> HELO localhost
|
|
c <~ 250
|
|
|
|
c -> MAIL FROM:<pepe>
|
|
c <~ 501
|
|
|
|
c -> MAIL FROM:<a@xn--->
|
|
c <- 501 5.1.8 Malformed sender domain (IDNA conversion failed)
|
|
|
|
# Reconnect to avoid getting rejected due to too many errors.
|
|
c close
|
|
c tcp_connect localhost:1025
|
|
c <~ 220
|
|
c -> HELO localhost
|
|
c <~ 250
|
|
|
|
c -> MAIL FROM:<aaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaXaaaa5aaaaX@bbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbXbbbb5bbbbX>
|
|
c <- 501 5.1.7 Sender address too long
|