On 14 Apr 2011, at 08:59, David Woodhouse wrote: > On Wed, 2011-04-13 at 10:28 +0000, Ian Eiloart wrote: >> Well, except that the unauthenticated use of originator IDs is >> precisely what makes it so hard to deal with abuse. The practice needs >> to be discouraged at every turn. The OP should rewrite the return-path >> into a domain that he controls. Perhaps using SRS. > > Or the *messages* should be signed with a scheme like DKIM, so that they > *are* authenticated.
Yes, that was my first response. But we've established that the OP doesn't have control of his company's mail server. He does have control of his list server. > -- > dwmw2 > -- ## List details at http://lists.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://wiki.exim.org/
