Here is what my direct.xml file looks like
more direct.xml
-p tcp
--dport 22 -m state --state NEW -m recent --set
-p tcp
--dport 22 -m state --state NEW -m recent --update --seconds 30 --hitcount 4 -j
REJECT --reject-with tcp-reset
-p tcp
--dport 25 -m state --state NEW -m recent
Hi Eric:
This is the patch that we used with Bill's toaster and it was very
effective in limiting the damage from hijacked email accounts.
http://spamthrottle.qmail.ca/
Let me know what you think
Jeff
On 8/22/2019 7:18 PM, Eric Broch wrote:
What about this tcpserver limits patch
Hi Eric:
That patch might work - is it already installed?
Jeff
On 8/22/2019 7:18 PM, Eric Broch wrote:
What about this tcpserver limits patch
https://qmail.jms1.net/ucspi-tcp/
On 8/22/2019 9:32 AM, Jeff Koch wrote:
Hi List
Sometimes a user's email credentials get hijacked and before we