Description of problem:
Logwatch does not handle "improper command pipelining after (NOOP|RSET)" as
it is shipped right now with RHEL 6. Reproducing is easily possible, simply
add "reject_unauth_pipelining" to "smtpd_recipient_restrictions" in main.cf
and get a dumb spammer who didn't learn to behave according to SMTP RFCs.
Version-Release number of selected component (if applicable):
Everytime, see above and below.
Logwatch does not handle "improper command pipelining after (NOOP|RSET)"
Logwatch should handle "improper command pipelining after (NOOP|RSET)"
According to logwatch upstream there seems to be a patch for this already:
Actually, we see NOOP/RSET/HELO in the wild currently, the patch covers them
all - which is likely the best.
Cross-filed case 00775789 in the Red Hat customer portal.
Created attachment 678237 [details]
[Patch] handle "improper command pipelining" message correctly
Applying this package removes the patch from bug #799987 - which unfortunately
still did not make it into any stable release yet.
The testing RPM fixes the initially described issue for me, however comment #5
applies for that testing package.
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory, and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.