Geert Hendrickx via Postfix-users:
> On Tue, Jun 06, 2023 at 09:48:11 -0400, Wietse Venema via Postfix-users wrote:
> >   * Optional: harden a Postfix SMTP server against remote SMTP
> >     clients that violate RFC 2920 (or 5321) command pipelining
> >     constraints. With "smtpd_forbid_unauth_pipelining = yes", the
> >     server disconnects a client immediately, after responding with
> >     "554 5.5.0 Error: SMTP protocol synchronization" and after
> >     logging "improper command pipelining" with the unexpected remote
> >     SMTP client input. This feature is disabled by default in Postfix
> >     3.5-3.8 to avoid breaking home-grown utilities, but it is enabled
> >     by default in Postfix 3.9. A similar feature is enabled by
> >     default in the Exim SMTP server.
> 
> 
> Hi
> 
> What is the relation between new "smtpd_forbid_unauth_pipelining"
> and existing "reject_unauth_pipelining" in smtpd_*_restrictions?

smtpd_forbid_unauth_pipelining disconnects the client, and is enabled
by default in Postfix >= 3.9.

        Wietse
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to