-
Do not allow command pipelining and enforce! (Postfix
can do this)
-
Catch attack via log monitor and halt with blackhole route
or REJECT record in access control database
-
Limit number and rate of connections from one IP
-
Pretend to accept all addresses ("opaque" server)
|