Before you dump this mail message to /dev/null, I have a relaying
question.. 

I setup the anti-relaying rules all fine and dandy according to the FAQ
with tcpserver.. Everything works fine, *but* i need the ability to filter
by DNS hostmask and IP address.. I tried the following test:

This setup works:

209.142.1.150:allow,RELAYCLIENT=""
:allow

This setup does NOT work:
vadept.com:allow,RELAYCLIENT=""
:allow

I need the ability to just wildcard IP's based upon their DNS lookup, I
know I can enable paranoid mode to cut down on the spoofing, but will the
current anti-relaying rules support a *.vadept.com rather than about
150-200 class C's?

Saves me a lot of keystrokes, plus if we forget to reverse map an IP pool,
the phones dont light up (with paranoid mode off)... :(

Thanks!

Frank

-=-=-=-=-=-8<-=-=-=-=-=- 
'I sense much NT in you. NT leads to blue screen, blue screen leads to
downtime, downtime leads to much suffering.' --- unknown linux jedi

http://www.vadept.com/pgp-public.txt

Reply via email to