Displaying 4 results from an estimated 4 matches for "imap_id_command_arg".
Did you mean:
imap_id_command_args
2019 Apr 12
2
Mail account brute force / harassment
...oftware to forward client IP.
>
I did get a reply from the Squirrelmail list:
"Well, I've had code sitting around for a while that implements RFC2971 (ID
command), so I just committed it. You can use it for this purpose by
putting something like this into your config/config_local.php
$imap_id_command_args = array('remote-host' => '###REMOTE ADDRESS###');"
Which I also added previously. But that doesn't address emacs/RMail users.
Could there be a setting in sendmail.mc/cf file that I'm missing?
-------------- next part --------------
An HTML attachment was scrubbed....
2019 Apr 12
1
Mail account brute force / harassment
...; > I did get a reply from the Squirrelmail list:
> > "Well, I've had code sitting around for a while that implements RFC2971
> (ID command), so I just committed it. You can use it for this purpose by
> putting something like this into your config/config_local.php
> > $imap_id_command_args = array('remote-host' => '###REMOTE ADDRESS###');"
> >
> > Which I also added previously. But that doesn't address emacs/RMail
> users.
> >
> > Could there be a setting in sendmail.mc/cf (
> https://urldefense.proofpoint.com/v2/url?u=http-3...
2019 Apr 12
0
Mail account brute force / harassment
...ward client IP.
>
> I did get a reply from the Squirrelmail list:
> "Well, I've had code sitting around for a while that implements RFC2971 (ID command), so I just committed it. You can use it for this purpose by putting something like this into your config/config_local.php
> $imap_id_command_args = array('remote-host' => '###REMOTE ADDRESS###');"
>
> Which I also added previously. But that doesn't address emacs/RMail users.
>
> Could there be a setting in sendmail.mc/cf (http://sendmail.mc/cf) file that I'm missing?
Can you verify following?...
2019 Apr 12
2
Mail account brute force / harassment
>
> Probably there's an existing solution for both problems (subsequent
> attempts and dnsbl):
>
> >
>