==================================================================
Please DO NOT REPLY to this mail or send email to the developers
about this bug. Please follow-up to Bugzilla using this link:
https://bugs.contribs.org/show_bug.cgi?id=9605
Have you checked the Frequently Asked Questions (FAQ)?
http://wiki.contribs.org/SME_Server:Documentation:FAQ
Please also take the time to read the following useful guide:
http://www.chiark.greenend.org.uk/~sgtatham/bugs.html
==================================================================
--- Comment #5 from Daniel B. <[email protected]> ---
(In reply to Selwyn Rosenstein from comment #4)
> After further testing I found that not all spammers put the IP Address in
> the HELO and so even though the IP Address was on the list of blocked
> addresses my test code would not catch them.
>
> I have refined the code as follows which now works very well:
> check_spamhelo plugin:
> ------------
> sub hook_helo {
> my ($self, $transaction, $host) = @_;
> ($host = lc $host) or return DECLINED;
>
> my $remote_ip = $self->qp->connection->remote_ip;
>
> foreach my $bad ($self->qp->config('badhelo')) {
> $bad =~ s/^\s+|\s+$//g;
> if ($host eq lc $bad || $host =~ /^\Q$bad\E/ || $remote_ip =~
> /^\Q$bad\E/) {
> $self->log(LOGDEBUG, "Denying HELO from IP '$remote_ip' using HELO
I don't think this change should be done in the helo plugin (because it doesn't
check the helo string, but rejects sender IP). To completely deny SMTP access
to your server to a list of IP, you'd better use iptables instead, there's no
code change needed:
db configuration setprop smtpd DenyHosts 12.13.14.15,193.20.0.0/24
signal-event remoteaccess-update
--
You are receiving this mail because:
You are the QA Contact for the bug._______________________________________________
Mail for each SME Contribs bug report
To unsubscribe, e-mail [email protected]
Searchable archive at https://lists.contribs.org/mailman/public/contribteam/