Sorry to cause a worry.
The problem turned out to be the % hack, but not on the qmail box. It
acts as a relay for another box running sendmail. It was the sendmail
doing the %hack and then forwarding the message back to the qmail box for
deleviery.
Thanks for the help all the same.
John.
John Newbigin wrote:
> I just received a message from the ORBS database. It seems that qmail
> has a bug.feature which allows relaying of messages in the form
> jn%it.swin.edu.au@[1.2.3.4]
> Where 1.2.3.4 is the IP address of my mail server, not for
> it.swin.edu.au. (I don't want everyone on the list to try it :).
>
> The machine should accept mail for 1.2.3.4, but the message is actualy
> sent to [EMAIL PROTECTED]
> The mail relay should only accept mail for [EMAIL PROTECTED]
>
> I have tcpd set up to allow relaying only from machines inside 1.2.3.0
>
> Is there a way to dissable this feature/bug.
>
> If you want to test your system, use the telnet service from here
> http://maps.vix.com/tsi/ar-test.html
>
> I am sure that there are many people with a simalar setup which could
> pose a large spam risk.
>
> I would appreciate a speedy reply.
>
> John.
>
> --
> Information Technology Innovation Group
> Swinburne University. Melbourne, Australia
> http://uranus.it.swin.edu.au/~jn
--
Information Technology Innovation Group
Swinburne University. Melbourne, Australia
http://uranus.it.swin.edu.au/~jn