Craig Jackson [EMAIL PROTECTED] wrote:
> Why don't you perform several useful checks of the email
> before checking
> for a valid recipient. That's what I do. Checking valid
> recipient is the
> last thing I do in the rcpt acl. 

Interesting.... pretty much diametrically opposed to the aproach we take
here - if we can't deliver it, we won't waste any effort doing other
checks...

regards

Richard

-- 
Richard Rogers
IT Development and Innovation Manager
Information Services, Staffordshire University 


The information in this email is confidential and is intended solely for the 
addressee.  Access to this email by anyone else is unauthorised.  



If you are not the intended recipient, any disclosure, copying, distribution or 
any action taken or omitted to be taken in reliance on it, except for the 
purpose of delivery to the addressee, is prohibited and may be unlawful.  
Kindly notify the sender and delete the message and any attachment from your 
computer.

-- 
## List details at http://lists.exim.org/mailman/listinfo/exim-users 
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to