The IMail possible hack algorithm is based on input exceeding the resonable maximum length for the command state. There is no limit on requests from a single IP as seen when someone connects with hundreds of simultaneous harvesters - the only solution is to block their IP.
The Imail possible hack algorithm is great for autoblocking spamBlaster software that just cluelessly blasts out spam without waiting for a complete transaction. There's something wrong with the WebShield server setup - they may have a configuration option to work better with Imail, but allow keeping the "deny possible hack attempt" on. ----- Original Message ----- > The Imail "deny possible" routine > counts incoming msgs from one ip, and assumes "too many" is a flood and > rejects the ip. To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
