On Tue, Jun 06, 2023 at 09:48:11 -0400, Wietse Venema via Postfix-users wrote: > * Optional: harden a Postfix SMTP server against remote SMTP > clients that violate RFC 2920 (or 5321) command pipelining > constraints. With "smtpd_forbid_unauth_pipelining = yes", the > server disconnects a client immediately, after responding with > "554 5.5.0 Error: SMTP protocol synchronization" and after > logging "improper command pipelining" with the unexpected remote > SMTP client input. This feature is disabled by default in Postfix > 3.5-3.8 to avoid breaking home-grown utilities, but it is enabled > by default in Postfix 3.9. A similar feature is enabled by > default in the Exim SMTP server.
Hi What is the relation between new "smtpd_forbid_unauth_pipelining" and existing "reject_unauth_pipelining" in smtpd_*_restrictions? Geert _______________________________________________ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org