Before you dump this mail message to /dev/null, I have a relaying question.. I setup the anti-relaying rules all fine and dandy according to the FAQ with tcpserver.. Everything works fine, *but* i need the ability to filter by DNS hostmask and IP address.. I tried the following test: This setup works: 209.142.1.150:allow,RELAYCLIENT="" :allow This setup does NOT work: vadept.com:allow,RELAYCLIENT="" :allow I need the ability to just wildcard IP's based upon their DNS lookup, I know I can enable paranoid mode to cut down on the spoofing, but will the current anti-relaying rules support a *.vadept.com rather than about 150-200 class C's? Saves me a lot of keystrokes, plus if we forget to reverse map an IP pool, the phones dont light up (with paranoid mode off)... :( Thanks! Frank -=-=-=-=-=-8<-=-=-=-=-=- 'I sense much NT in you. NT leads to blue screen, blue screen leads to downtime, downtime leads to much suffering.' --- unknown linux jedi http://www.vadept.com/pgp-public.txt
