On Sat, 7 Jul 2001, Chris Adams wrote:
> Better yet, have your POP daemon update the access file directly, and
> then you don't have any of the hokey "tail the log file" stuff going on
> at all. All you need to add is a daemon to remove entries from the
> access file.
All of which is an awful horrendous hack.
SMTP AUTH is fairly easy to implement. It's reliable. You don't have to
worry about IPs being accidentally left in a hash resulting in unwanted
relaying and you can properly trace the sender of mails.
Jason