If you have no plans of using your SMTP server outside your LAN, then
just close the port from spammers by changing the line:

:allow,QMAILQUEUE="/package/mail/qscanq/command/qscanq

to 

:deny

But if you plan to allow relaying outside then use SMTPAUTH to prevent
unauthorized relaying.

HyperAxe
Email: [EMAIL PROTECTED]
Web: http://www.hyperaxe.com 

-----Original Message-----
From: Roger Thomas [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, August 02, 2005 1:48 PM
To: [email protected]
Subject: RE: rcpthosts and locals

OK thanks, I'll just insert example.com then. The reason I asked is bcos
I noticed that somehow spammers are able to use my server to send out
their mail.
My tcp.smtp looks like:

127.:allow,RELAYCLIENT="",QMAILQUEUE="/package/mail/qscanq/command/qscan
q"
192.168.1.:allow,RELAYCLIENT="",QMAILQUEUE="/package/mail/qscanq/command
/qscanq"
:allow,QMAILQUEUE="/package/mail/qscanq/command/qscanq"

and my rcpthosts and locals have example.com and imap.example.com

Is/Are there anything else that I am missing ?

--
Roger


Reply via email to