Benedict wrote: > At the moment local email comes in to postfix, and if it is from an address > postfix recognises > it forwards it to a different amavisd-new port which only checks for viruses > and then forwards it > back to yet another different postfix port, which then pipes it to a bash > script which in turn passes it > to altermime which does the scary mime stuff. All well and good.
Not good if the sender's address is spoofed. On a related thread you asked: > I am trying to find information on preventing people spoofing email sent to a > domain. There are ways to detect when they have, and do something about it when they have, but no way to prevent them from doing it. It has been discussed on the Postfix list many times how to prevent mail with a spoofed sender address from entering your system, but the bottom line is it breaks forwarding. See what I'm referring to here: http://marc.theaimsgroup.com/?l=postfix-users&w=2&r=1&s=breaks+forwarding&q=b mouss recently explains here: http://marc.theaimsgroup.com/?l=postfix-users&m=115093039719542&w=2 Here is Ralf's example: http://www.stahl.bau.tu-bs.de/~hildeb/postfix/postfix_incoming.shtml For SPF info, see http://www.openspf.org/ SPF also breaks forwarding, but in a different manner. http://new.openspf.org/FAQ/Forwarding Gary V Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _______________________________________________ AMaViS-user mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/amavis-user AMaViS-FAQ:http://www.amavis.org/amavis-faq.php3 AMaViS-HowTos:http://www.amavis.org/howto/
