Hello, When I make a lot of connections with cyradm in a row, the connection fails after processing some of them, I don't know where this limit comes from, the problem is that the imap server is definitely not available, see details below.
Is it a known behaviour when imapd is started from inetd, do you consider this as a vulnerability to a DOS attack ? Alain The line in /etc/inetd.conf is: imap2 stream tcp nowait cyrus /usr/sbin/tcpd \ /usr/sbin/imapd >From a python script which launches cyradm feeded with a tcl script trough a pipe. It fails to connect after 76 connections in 3.3 s. It needs a sleep of about 0.4 seconds between each execution of cyradm to success. cyradm: creating the mailbox 'INBOX.ML.dev.modpython.archive.Y2001.M10' cyradm: creating the mailbox 'INBOX.ML.dev.modpython.archive.Y2001.M11' cyradm: creating the mailbox 'INBOX.ML.dev.modpython.archive.Y2001.M12' cyradm: creating the mailbox 'INBOX.ML.dev.modpython.archive.Y2002' cyradm error: Command: eval cyr_conn createmailbox "INBOX.ML.dev.modpython.archive.Y2002" Error: authentication failed server connection closed nmap shows that the imap2 port is unavailable: Starting nmap V. 2.54BETA30 ( www.insecure.org/nmap/ ) sendto in send_tcp_raw: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Operation not permitted Interesting ports on localhost (127.0.0.1): (The 1543 ports scanned but not shown below are in state: closed) Port State Service 25/tcp open smtp 53/tcp open domain 80/tcp open http 515/tcp open printer 631/tcp open cups 953/tcp open rndc Nmap run completed -- 1 IP address (1 host up) scanned in 0 seconds when I restart inetd it works again. If I wait for some time it works again after some minutes. 00:07:16 root ~ #/etc/init.d/inetd restart Restarting internet superserver: inetd. 00:07:29 root ~ #nmap 127.0.0.1 Starting nmap V. 2.54BETA30 ( www.insecure.org/nmap/ ) sendto in send_tcp_raw: sendto(3, packet, 40, 0, 127.0.0.1, 16) => Operation not permitted Interesting ports on localhost (127.0.0.1): (The 1542 ports scanned but not shown below are in state: closed) Port State Service 25/tcp open smtp 53/tcp open domain 80/tcp open http 143/tcp open imap2 515/tcp open printer 631/tcp open cups 953/tcp open rndc Nmap run completed -- 1 IP address (1 host up) scanned in 0 seconds