What you are proposing would block all Outlook users (and who knows who else) who are not configured to be part of an NT domain (others say HELO COMPUTERNAME - what ever that may be).
So I think you can only implement that test if you have very tight control of your users, or could somehow restrict the filter to processing locally received messages only and not ones your users are sending out. m/ -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of [EMAIL PROTECTED] Sent: Sunday, August 31, 2003 12:46 PM To: [EMAIL PROTECTED] Subject: Re: [courier-users] queue getting overloaded --On Samstag, 30. August 2003 15:17 -0700 Ricardo Kleemann <[EMAIL PROTECTED]> wrote: [reject trojan by helo] > Yes, the perlfilter does parse the control file... as far as > the helo string, what should I do with that? What should I > check for? the helo should contain a dot and look like a fqdn: /^[-a-z0-9.]{3,32}\.[a-z]{2,4}$/i and disallow those helo'ing with your hostname or the domain of the victim.� Disallowing 'yahoo.com' and similar may be effective too. ------------------------------------------------------- This sf.net email is sponsored by:ThinkGeek Welcome to geek heaven. http://thinkgeek.com/sf _______________________________________________ courier-users mailing list [EMAIL PROTECTED] Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users
