Craig Jackson [EMAIL PROTECTED] wrote: > Why don't you perform several useful checks of the email > before checking > for a valid recipient. That's what I do. Checking valid > recipient is the > last thing I do in the rcpt acl.
Interesting.... pretty much diametrically opposed to the aproach we take here - if we can't deliver it, we won't waste any effort doing other checks... regards Richard -- Richard Rogers IT Development and Innovation Manager Information Services, Staffordshire University The information in this email is confidential and is intended solely for the addressee. Access to this email by anyone else is unauthorised. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, except for the purpose of delivery to the addressee, is prohibited and may be unlawful. Kindly notify the sender and delete the message and any attachment from your computer. -- ## List details at http://lists.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://wiki.exim.org/
