dbaa9dbd6c
on files in plugins dir: fixed a number of POD errors formatted some # comments into POD removed bare 1; (these are plugins, not perl modules) most instances of this were copy/pasted from a previous plugin that had it removed instances of # vim ts=N ... they weren't consistent, many didn't match .perltidyrc on modules that failed perl -c tests, added 'use Qpsmtpd::Constants;' Conflicts: plugins/async/check_earlytalker plugins/async/dns_whitelist_soft plugins/async/dnsbl plugins/async/queue/smtp-forward plugins/async/require_resolvable_fromhost plugins/async/rhsbl plugins/async/uribl plugins/auth/auth_checkpassword plugins/auth/auth_cvm_unix_local plugins/auth/auth_flat_file plugins/auth/auth_ldap_bind plugins/auth/auth_vpopmail plugins/auth/auth_vpopmail_sql plugins/auth/authdeny plugins/check_badmailfromto plugins/check_badrcptto_patterns plugins/check_bogus_bounce plugins/check_earlytalker plugins/check_norelay plugins/check_spamhelo plugins/connection_time plugins/dns_whitelist_soft plugins/dnsbl plugins/domainkeys plugins/greylisting plugins/hosts_allow plugins/http_config plugins/logging/adaptive plugins/logging/apache plugins/logging/connection_id plugins/logging/transaction_id plugins/logging/warn plugins/milter plugins/queue/exim-bsmtp plugins/queue/maildir plugins/queue/postfix-queue plugins/queue/smtp-forward plugins/quit_fortune plugins/random_error plugins/rcpt_map plugins/rcpt_regexp plugins/relay_only plugins/require_resolvable_fromhost plugins/rhsbl plugins/sender_permitted_from plugins/spamassassin plugins/tls plugins/tls_cert plugins/uribl plugins/virus/aveclient plugins/virus/bitdefender plugins/virus/clamav plugins/virus/clamdscan plugins/virus/hbedv plugins/virus/kavscanner plugins/virus/klez_filter plugins/virus/sophie plugins/virus/uvscan
56 lines
1.3 KiB
Perl
56 lines
1.3 KiB
Perl
#!perl -Tw
|
|
|
|
=head1 NAME
|
|
|
|
count_unrecognized_commands - Count unrecognized commands and disconnect when we have too many
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
Disconnect the client if it sends too many unrecognized commands.
|
|
Good for rejecting spam sent through open HTTP proxies.
|
|
|
|
=head1 CONFIGURATION
|
|
|
|
Takes one parameter, the number of allowed unrecognized commands
|
|
before we disconnect the client. Defaults to 4.
|
|
|
|
=cut
|
|
|
|
sub register {
|
|
my ($self, $qp, @args) = @_;
|
|
|
|
if (@args > 0) {
|
|
$self->{_unrec_cmd_max} = $args[0];
|
|
$self->log(LOGWARN, "WARNING: Ignoring additional arguments.") if (@args > 1);
|
|
} else {
|
|
$self->{_unrec_cmd_max} = 4;
|
|
}
|
|
|
|
}
|
|
|
|
sub hook_connect {
|
|
my ($self, $transaction) = @_;
|
|
|
|
$self->qp->connection->notes('unrec_cmd_count', 0);
|
|
return DECLINED;
|
|
}
|
|
|
|
sub hook_unrecognized_command {
|
|
my ($self, $cmd) = @_[0,2];
|
|
|
|
$self->log(LOGINFO, "Unrecognized command '$cmd'");
|
|
|
|
my $badcmdcount =
|
|
$self->qp->connection->notes( 'unrec_cmd_count',
|
|
($self->qp->connection->notes('unrec_cmd_count') || 0) + 1
|
|
);
|
|
|
|
if ($badcmdcount >= $self->{_unrec_cmd_max}) {
|
|
$self->log(LOGINFO, "Closing connection. Too many unrecognized commands.");
|
|
return (DENY_DISCONNECT, "Closing connection. $badcmdcount unrecognized commands. Perhaps you should read RFC 2821?");
|
|
}
|
|
|
|
return DECLINED;
|
|
}
|
|
|