On 14 Apr 2011, at 08:59, David Woodhouse wrote:

> On Wed, 2011-04-13 at 10:28 +0000, Ian Eiloart wrote:
>> Well, except that the unauthenticated use of originator IDs is
>> precisely what makes it so hard to deal with abuse. The practice needs
>> to be discouraged at every turn. The OP should rewrite the return-path
>> into a domain that he controls. Perhaps using SRS.
> 
> Or the *messages* should be signed with a scheme like DKIM, so that they
> *are* authenticated.

Yes, that was my first response. But we've established that the OP doesn't have 
control of his company's mail server. He does have control of his list server.


> -- 
> dwmw2
> 


-- 
## List details at http://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to