The IMail possible hack algorithm is based on input exceeding the resonable
maximum length for the command state.   There is no limit on requests from a
single IP as seen when someone connects with hundreds of simultaneous
harvesters - the only solution is to block their IP.

   The Imail possible hack algorithm is great for autoblocking spamBlaster
software that just cluelessly blasts out spam without waiting for a complete
transaction.    There's something wrong with the WebShield server setup -
they may have a configuration option to work better with Imail, but allow
keeping the "deny possible hack attempt" on.

----- Original Message -----

> The Imail "deny possible" routine
> counts incoming msgs from one ip, and assumes "too many" is a flood and
> rejects the ip.


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to