ports/58630: silently drop messages in noattach (change request)

Luigi Rizzo rizzo at icir.org
Tue Oct 28 14:00:32 UTC 2003


>Number:         58630
>Category:       ports
>Synopsis:       silently drop messages in noattach (change request)
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Tue Oct 28 06:00:27 PST 2003
>Closed-Date:
>Last-Modified:
>Originator:     Luigi Rizzo
>Release:        FreeBSD 4.8-RELEASE i386
>Organization:
Dip.Ing.Informazione - univ.pisa
>Environment:
System: FreeBSD xorpc.icir.org 4.8-RELEASE FreeBSD 4.8-RELEASE #0: Mon Apr 7 20:59:56 PDT 2003 root at xorpc.icir.org:/usr/src/sys/compile/ICIR-4.8-USB i386


>Description:
noattach will send a REJECT for messages it does not want to
deal with. But the vast majority of these virus-generated
messages contain a fake sender address, so the reject will
cause an additional bounced email, or even worse a backfire
towards the unlucky owner of the fake address.

I have been in both categories with the recent Sobig.F
virus, receiving between 60 and 80000 (yes no typo, eighty
thousand) messages per day, and it is no fun.

I believe it is a lot safer to silently drop unwanted
messages rather than bouncing them.

The attached patch does it.

>How-To-Repeat:
	
>Fix:

	


--- noattach.c.orig	Thu Aug 21 13:52:48 2003
+++ noattach.c	Tue Oct 28 13:37:49 2003
@@ -651,7 +651,11 @@
 			safe_free(lines[i]);
 		    safe_free(lines);
 		    (void)mlfi_cleanup(ctx, true);
+#if 0
 		    return SMFIS_REJECT;
+#else
+		    return SMFIS_DISCARD;
+#endif
 		}
 		else if (cl_err == -1) {
 		    /* can't accept this message right now */
>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list