On Mon, Aug 02, 2021 at 04:11:42PM -0400, John Levine <jo...@iecc.com> wrote:
> People in the web world are in a kerfuffle about an attack called ALPACA > which (leaving out > a lot of details) gets a web browser to send requests to a non-web server and > then get the > browser to interpret the responses in unfortunate ways. Most of the > unfortunateness comes > from the server replying to invalid commands and including parts of the > commands in the reply. > Since most mail servers will let you send a lot of invalid commands, the bad > guy can splice > a lot of bits of invalid command response together. > > It occurs to me that real mail clients almost never send invalid commands, so > if a server > sees more than, say, two of them, it's not a real client, so it's better to > disconnect. > > I don't see a parameter to limit the number of bad commands in a session. Is > there one? > Would it be hard to add? > > R's, > John > > PS: I know this is not our problem but the web crowd can be awfully pushy. It's already there, and it stops at the first invalid command: smtpd_forbidden_commands (default: CONNECT GET POST regexp:{{/^[^A-Z]/ Bogus}}) Perhaps other HTTP reqeust methods could be added (i.e. HEAD PUT DELETE OPTIONS TRACE PATCH) but it's probably enough as it is. cheers, raf