<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sendmail sent mails limit / thresholds in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/sendmail-sent-mails-limit-thresholds/m-p/3897112#M25943</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;  One of the servers I admin is a sendmail server. It has &amp;gt; 8000 accounts, and our users are majorly dumb users using dumb passwords.&lt;BR /&gt;&lt;BR /&gt;  Last Friday night, I've found out that one of the accounts (user 'simon' with pass 'simon') was used to send thousand of emails to randomly generated hotmail accounts. Due to it, we've been banned and now our connections to any of hotmail's MX time out. I've solved temporarily the problem using another IP for outgoing mails, but I know that's not the solution.&lt;BR /&gt;&lt;BR /&gt;  Of course the solution is setting strict and complex passwords, but this task can be done easiy due to politic issues in the company with the users, and will take some time (weeks, months) to be able to be done.&lt;BR /&gt;&lt;BR /&gt;  So I'd like to know if there's any way of limiting the amount of emails sent using an authed sesion per unit of time. For example... 100 mails per hour? Something in that way. I'm not talking about limiting the number of opened sessions as, in fact, the spammer opened "only" 200-300 sessions but in each session sent 10,20,30,40,50,60,etc emails. Limiting the number of rcpt's isnt a solution for this problem due to this.&lt;BR /&gt;&lt;BR /&gt;  Any suggestion for this?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.&lt;BR /&gt;</description>
    <pubDate>Mon, 13 Nov 2006 08:05:37 GMT</pubDate>
    <dc:creator>Ruben C.</dc:creator>
    <dc:date>2006-11-13T08:05:37Z</dc:date>
    <item>
      <title>Sendmail sent mails limit / thresholds</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sendmail-sent-mails-limit-thresholds/m-p/3897112#M25943</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;  One of the servers I admin is a sendmail server. It has &amp;gt; 8000 accounts, and our users are majorly dumb users using dumb passwords.&lt;BR /&gt;&lt;BR /&gt;  Last Friday night, I've found out that one of the accounts (user 'simon' with pass 'simon') was used to send thousand of emails to randomly generated hotmail accounts. Due to it, we've been banned and now our connections to any of hotmail's MX time out. I've solved temporarily the problem using another IP for outgoing mails, but I know that's not the solution.&lt;BR /&gt;&lt;BR /&gt;  Of course the solution is setting strict and complex passwords, but this task can be done easiy due to politic issues in the company with the users, and will take some time (weeks, months) to be able to be done.&lt;BR /&gt;&lt;BR /&gt;  So I'd like to know if there's any way of limiting the amount of emails sent using an authed sesion per unit of time. For example... 100 mails per hour? Something in that way. I'm not talking about limiting the number of opened sessions as, in fact, the spammer opened "only" 200-300 sessions but in each session sent 10,20,30,40,50,60,etc emails. Limiting the number of rcpt's isnt a solution for this problem due to this.&lt;BR /&gt;&lt;BR /&gt;  Any suggestion for this?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.&lt;BR /&gt;</description>
      <pubDate>Mon, 13 Nov 2006 08:05:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sendmail-sent-mails-limit-thresholds/m-p/3897112#M25943</guid>
      <dc:creator>Ruben C.</dc:creator>
      <dc:date>2006-11-13T08:05:37Z</dc:date>
    </item>
    <item>
      <title>Re: Sendmail sent mails limit / thresholds</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sendmail-sent-mails-limit-thresholds/m-p/3897113#M25944</link>
      <description>So, i think is better to change a password with something like : SimoN or SimoN123&lt;BR /&gt;&lt;BR /&gt;But if don't want, try to check the parameter :&lt;BR /&gt;confCONNECTION_RATE_THROTTLE into the sendmail.mc&lt;BR /&gt;&lt;BR /&gt;This limit the max connection</description>
      <pubDate>Mon, 13 Nov 2006 08:34:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sendmail-sent-mails-limit-thresholds/m-p/3897113#M25944</guid>
      <dc:creator>Alpha977</dc:creator>
      <dc:date>2006-11-13T08:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: Sendmail sent mails limit / thresholds</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sendmail-sent-mails-limit-thresholds/m-p/3897114#M25945</link>
      <description>Hi Ruben, Welcome to the forum (Bienvenido!!).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Probably this is what you are looking for:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.milter.info/sendmail/milter-limit/" target="_blank"&gt;http://www.milter.info/sendmail/milter-limit/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;But you should re-check/enforce your access policy (firewall policy and relay policy) until you implement the password restrictions.&lt;BR /&gt;&lt;BR /&gt;Por favor, asegurate de ver tambien:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/helptips.do?#28" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/helptips.do?#28&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 13 Nov 2006 08:38:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sendmail-sent-mails-limit-thresholds/m-p/3897114#M25945</guid>
      <dc:creator>Ivan Ferreira</dc:creator>
      <dc:date>2006-11-13T08:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: Sendmail sent mails limit / thresholds</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sendmail-sent-mails-limit-thresholds/m-p/3897115#M25946</link>
      <description>Check also:&lt;BR /&gt;&lt;BR /&gt;default_process_limit &lt;BR /&gt;initial_destination_concurrency &lt;BR /&gt;local_destination_concurrency_limit &lt;BR /&gt;default_destination_concurrency_limit &lt;BR /&gt;&lt;BR /&gt;and &lt;BR /&gt;&lt;BR /&gt;smtpd_error_sleep_time&lt;BR /&gt;smtpd_soft_error_limit&lt;BR /&gt;smtpd_hard_error_limit &lt;BR /&gt;&lt;BR /&gt;This last 3 parameters are for the errors (if it generate address, more are wrong...)</description>
      <pubDate>Mon, 13 Nov 2006 08:38:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sendmail-sent-mails-limit-thresholds/m-p/3897115#M25946</guid>
      <dc:creator>Alpha977</dc:creator>
      <dc:date>2006-11-13T08:38:56Z</dc:date>
    </item>
  </channel>
</rss>

