Sunday 08 February 2004 14.45 skrev Eduardo M. Bragatto:
Jeremy Kitchen wrote:
that could only be done in tcpserver by rate limiting connections by IP
address, and would also affect legitimate connections made by valid
users using proper authentication credentials. I'd be mighty upset if
Sunday 08 February 2004 01.44 skrev knom:
Hi !
Is there any patch for blocking too frequent pop3-logins (bruteforce
attacks) ??
If not, is anyone interested in some ?
I'm doing this right at the moment !
knom19.
Oden Eriksson wrote:
Sunday 08 February 2004 14.45 skrev Eduardo M. Bragatto:
Jeremy Kitchen wrote:
that could only be done in tcpserver by rate limiting connections by
IP address, and would also affect legitimate connections made by
valid users using proper authentication credentials. I'd
On Mon, 2004-02-09 at 05:58, Andrea Riela wrote:
Could pretty easily be done with:
http://www.deserve-it.com/sw/patches/patch-ucspi-tcp-0.88-periplimit
well, just a question.
With that patch, I could have problems with mailing lists?
And, with that patch, I could download from a lot of
I'm using vpopmail-5.2.1 with MySQL. 'vmoduser' seems not to work.
vmoduser -u -d -p -w -i -b -r [EMAIL PROTECTED]
After issuing the command, the user still can get POP access and
messages sent don't bounce.
'qmail-pop3d' is the POP server.
What's wrong?
--
[] Mauricio Teixeira -
On Feb 9, 2004, at 11:37 AM, Mauricio Teixeira (listas) wrote:
I'm using vpopmail-5.2.1 with MySQL. 'vmoduser' seems not to work.
vmoduser -u -d -p -w -i -b -r [EMAIL PROTECTED]
After issuing the command, the user still can get POP access and
messages sent don't bounce.
'qmail-pop3d' is the POP