Gary Steiner wrote:

> In antirelay, I've always had localnets set to "no" as it seems that
> spammers are able to exploit the use of 127.0.0.1, which is something
> that open relay testers like www.ordb.org can catch.  But how does
> that affect local mail sent by things like cgi form handlers?  Is
> there a better setup for localnets than what comes as the
> antirelay.ini default?

A number of points:

(1) Why aren't you using SMTPRCV? Antirelay doesn't catch all possible
relays, and it should be avoided. (Perhaps you are, and you have just not
made it clear whether you are talking about the Antirelay program or the
antirelay function is SMTPRCV.)

(2) The IPs in the localnets setting are the ones that the mail actually
comes from. It would be impossible for a spammer to send mail from a
loopback address like 127.0.0.1 unless they have a virus running on your
server. That's different than domains that resolve to 127.0.0.1 or explicit
use of 127.0.0.1, both of which have no impact on relay processing.

(3) If you have localnets off, you shouldn't be able to send any mail at all
through the server, as all outgoing mail would look like a relay attempt
(effectively, that's what it is). So I would not be surprised if you can't
get a CGI to send through the server. If you can send mail through it, it
probably is because of one of the antirelay bugs... I believe that setting
is intended for receive-only servers (like my incoming server).

                      Randy.


This is the discussion list for the IMS Free email server software.
  To unsubscribe send mailto:[EMAIL PROTECTED]

            Delivered by Rockliffe MailSite
           http://www.rockliffe.com/mailsite
                Rock Solid Software (tm)

Reply via email to