What you are proposing would block all Outlook users (and who knows who
else) who are not configured to be part of an NT domain (others say HELO
COMPUTERNAME - what ever that may be).

So I think you can only implement that test if you have very tight control
of your users, or could somehow restrict the filter to processing locally
received messages only and not ones your users are sending out.

m/

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of
[EMAIL PROTECTED]
Sent: Sunday, August 31, 2003 12:46 PM
To: [EMAIL PROTECTED]
Subject: Re: [courier-users] queue getting overloaded


--On Samstag, 30. August 2003 15:17 -0700 Ricardo Kleemann
<[EMAIL PROTECTED]> wrote:

[reject trojan by helo]
> Yes, the perlfilter does parse the control file... as far as
> the helo string, what should I do with that? What should I
> check for?

the helo should contain a dot and look like a fqdn:

/^[-a-z0-9.]{3,32}\.[a-z]{2,4}$/i

and disallow those helo'ing with your hostname or the domain of the
victim.� Disallowing 'yahoo.com' and similar may be effective too.




-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
courier-users mailing list
[EMAIL PROTECTED]
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users

Reply via email to