Would be nice if this was available in the server modules to thwart dictionary attacks like so:
17:43:14.765: >> AUTH LOGIN<cr><lf>
17:43:14.792: << 334 VXNlcm5hbWU6<cr><lf>
17:43:15.613: >> d2VibWFzdGVy<cr><lf>
17:43:15.613: << 334 UGFzc3dvcmQ6<cr><lf>
17:43:16.425: >> IUAjJCVeJio=<cr><lf>
17:43:16.425: << 501 Authentication failed - bad user or password.<cr><lf>
17:43:17.378: >> AUTH LOGIN<cr><lf>
17:43:17.404: << 334 VXNlcm5hbWU6<cr><lf>
17:43:18.213: >> d2VibWFzdGVy<cr><lf>
17:43:18.213: << 334 UGFzc3dvcmQ6<cr><lf>
17:43:18.028: >> OTEx<cr><lf>
17:43:18.028: << 501 Authentication failed - bad user or password.<cr><lf>
17:43:19.835: >> AUTH LOGIN<cr><lf>
17:43:19.839: << 334 VXNlcm5hbWU6<cr><lf>
17:43:20.643: >> d2VibWFzdGVy<cr><lf>
17:43:20.643: << 334 UGFzc3dvcmQ6<cr><lf>
17:43:21.447: >> OTEx<cr><lf>
17:43:21.447: << 501 Authentication failed - bad user or password.<cr><lf>
17:43:22.478: >> AUTH LOGIN<cr><lf>
17:43:22.567: << 334 VXNlcm5hbWU6<cr><lf>
17:43:23.369: >> d2VibWFzdGVy<cr><lf>
17:43:23.369: << 334 UGFzc3dvcmQ6<cr><lf>
17:43:24.191: >> OTExMTE=<cr><lf>
17:43:24.191: << 501 Authentication failed - bad user or password.<cr><lf>
17:43:24.998: >> AUTH LOGIN<cr><lf>
17:43:24.000: << 334 VXNlcm5hbWU6<cr><lf>
17:43:25.810: >> d2VibWFzdGVy<cr><lf>
17:43:25.810: << 334 UGFzc3dvcmQ6<cr><lf>
17:43:26.610: >> OTExMTE=<cr><lf>
17:43:26.610: << 501 Authentication failed - bad user or password.<cr><lf>
and it is still going!
Have added the ip to the Connection Control list but an automatic option would be nice!
<p>Would be nice if this was available in the server modules to thwart dictionary attacks like so:</p><p>17:43:14.765: &gt;&gt; AUTH LOGIN&lt;cr&gt;&lt;lf&gt;
17:43:14.792: &lt;&lt; 334 VXNlcm5hbWU6&lt;cr&gt;&lt;lf&gt;
17:43:15.613: &gt;&gt; d2VibWFzdGVy&lt;cr&gt;&lt;lf&gt;
17:43:15.613: &lt;&lt; 334 UGFzc3dvcmQ6&lt;cr&gt;&lt;lf&gt;
17:43:16.425: &gt;&gt; IUAjJCVeJio=&lt;cr&gt;&lt;lf&gt;
17:43:16.425: &lt;&lt; 501 Authentication failed - bad user or password.&lt;cr&gt;&lt;lf&gt;
17:43:17.378: &gt;&gt; AUTH LOGIN&lt;cr&gt;&lt;lf&gt;
17:43:17.404: &lt;&lt; 334 VXNlcm5hbWU6&lt;cr&gt;&lt;lf&gt;
17:43:18.213: &gt;&gt; d2VibWFzdGVy&lt;cr&gt;&lt;lf&gt;
17:43:18.213: &lt;&lt; 334 UGFzc3dvcmQ6&lt;cr&gt;&lt;lf&gt;
17:43:18.028: &gt;&gt; OTEx&lt;cr&gt;&lt;lf&gt;
17:43:18.028: &lt;&lt; 501 Authentication failed - bad user or password.&lt;cr&gt;&lt;lf&gt;
17:43:19.835: &gt;&gt; AUTH LOGIN&lt;cr&gt;&lt;lf&gt;
17:43:19.839: &lt;&lt; 334 VXNlcm5hbWU6&lt;cr&gt;&lt;lf&gt;
17:43:20.643: &gt;&gt; d2VibWFzdGVy&lt;cr&gt;&lt;lf&gt;
17:43:20.643: &lt;&lt; 334 UGFzc3dvcmQ6&lt;cr&gt;&lt;lf&gt;
17:43:21.447: &gt;&gt; OTEx&lt;cr&gt;&lt;lf&gt;
17:43:21.447: &lt;&lt; 501 Authentication failed - bad user or password.&lt;cr&gt;&lt;lf&gt;
17:43:22.478: &gt;&gt; AUTH LOGIN&lt;cr&gt;&lt;lf&gt;
17:43:22.567: &lt;&lt; 334 VXNlcm5hbWU6&lt;cr&gt;&lt;lf&gt;
17:43:23.369: &gt;&gt; d2VibWFzdGVy&lt;cr&gt;&lt;lf&gt;
17:43:23.369: &lt;&lt; 334 UGFzc3dvcmQ6&lt;cr&gt;&lt;lf&gt;
17:43:24.191: &gt;&gt; OTExMTE=&lt;cr&gt;&lt;lf&gt;
17:43:24.191: &lt;&lt; 501 Authentication failed - bad user or password.&lt;cr&gt;&lt;lf&gt;
17:43:24.998: &gt;&gt; AUTH LOGIN&lt;cr&gt;&lt;lf&gt;
17:43:24.000: &lt;&lt; 334 VXNlcm5hbWU6&lt;cr&gt;&lt;lf&gt;
17:43:25.810: &gt;&gt; d2VibWFzdGVy&lt;cr&gt;&lt;lf&gt;
17:43:25.810: &lt;&lt; 334 UGFzc3dvcmQ6&lt;cr&gt;&lt;lf&gt;
17:43:26.610: &gt;&gt; OTExMTE=&lt;cr&gt;&lt;lf&gt;
17:43:26.610: &lt;&lt; 501 Authentication failed - bad user or password.&lt;cr&gt;&lt;lf&gt;</p><p>&nbsp;</p><p>and it is still going!</p><p>Have added the ip to the Connection Control list but an automatic option would be nice!
&nbsp;</p>