If you have no plans of using your SMTP server outside your LAN, then just close the port from spammers by changing the line:
:allow,QMAILQUEUE="/package/mail/qscanq/command/qscanq to :deny But if you plan to allow relaying outside then use SMTPAUTH to prevent unauthorized relaying. HyperAxe Email: [EMAIL PROTECTED] Web: http://www.hyperaxe.com -----Original Message----- From: Roger Thomas [mailto:[EMAIL PROTECTED] Sent: Tuesday, August 02, 2005 1:48 PM To: [email protected] Subject: RE: rcpthosts and locals OK thanks, I'll just insert example.com then. The reason I asked is bcos I noticed that somehow spammers are able to use my server to send out their mail. My tcp.smtp looks like: 127.:allow,RELAYCLIENT="",QMAILQUEUE="/package/mail/qscanq/command/qscan q" 192.168.1.:allow,RELAYCLIENT="",QMAILQUEUE="/package/mail/qscanq/command /qscanq" :allow,QMAILQUEUE="/package/mail/qscanq/command/qscanq" and my rcpthosts and locals have example.com and imap.example.com Is/Are there anything else that I am missing ? -- Roger
