As near as I can tell from the courier auth*vchkpw.c code, it only triggers either the vset_lastauth or the open_smtp_relay() routines BEFORE authentication.
What good is that? Two problems - 1. The way it calls vset_lastauth in the pre* code means that you can have a denial of service race since it explicity sets the remote_ip field to "imap". If it already had a useful value in it, it's lost. As above - this is done before checking the password, so any putz that tries to fake a login can dork the contents of the table. Plus - it never updates the lastauth with a real ip, so that table is essentially useless when used with courier. 2. The open_smtp_relay() call is also done prior to login, so it's not actually protecting anything. Seems like the current code implements "Last time someone TRIED to log in from this IP", as opposed to "last successful auth from this ip". Anyone have a patch to courier to fix this completely useless/broken behavior? -- Nathan ------------------------------------------------------------ Nathan Neulinger EMail: [EMAIL PROTECTED] University of Missouri - Rolla Phone: (573) 341-4841 Computing Services Fax: (573) 341-4216