[9866] in bugtraq
Re: SMTP server account probing
daemon@ATHENA.MIT.EDU (Alan Cox)
Wed Mar 10 11:45:10 1999
Date: Tue, 9 Mar 1999 23:45:46 +0000
Reply-To: Alan Cox <alan@LXORGUK.UKUU.ORG.UK>
From: Alan Cox <alan@LXORGUK.UKUU.ORG.UK>
X-To: Valdis.Kletnieks@VT.EDU
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <199903092108.QAA12696@black-ice.cc.vt.edu> from
"Valdis.Kletnieks@VT.EDU" at Mar 9, 99 04:08:32 pm
> Maybe what's needed is a new ioctl on a socket, so you can do this:
>
> if (vrfy_cnt > 25) {
> ioctl(net_socket,SO_NOSENDFIN);
> clkose(net_socket);
> }
How about adding a firewall rule for the site concerned ? Thats programatically
similar and has the advantage they wont be back until you get bored enough
to remove the block