Boris <[EMAIL PROTECTED]> writes:

> 192.168.0 RELAY
> 127.0.0.1 RELAY
> From:[EMAIL PROTECTED]   550 Spam denied
> From:[EMAIL PROTECTED]             550 SPAM F*CK YOU SH*T SPAMMER
> From:[EMAIL PROTECTED]         550 SPAMMER BUY YOURSELF
> From:[EMAIL PROTECTED]     550 LOAN YOURSELF, SPAMMER
> From:[EMAIL PROTECTED]     550 F*** YOU SPAMMER
> oo.net                          550 SPAAAAMMMEERRRR

> It looks like as if this file is similar as the rpcthosts (?) file on
> qmail, but its not the same. I relay incoming mails from my 192.168.0
> class c network as well as localhost mails.

This looks like a mixture of tcpserver's access rules and the badmailfrom
control file of qmail.

> Is there a qmail thingy to do the same?

Yes - but more separated and cleaner. Relaying has nothing to do with
spamming in the first place. Relay control and rejection of specified senders
are different tasks and are provided by different programs in qmail.
The relaying you control with the rules file of tcpserver, the bad senders
are rejected by /var/qmail/control/badmailfrom.

> Sometimes I think the qmail-people think that sendmail is an enemy to
> qmail, but I can´t understand this.

It's the difference in strategic design principles and of course coding
practice that binds people to qmail and not sendmail. I don't trust
sendmail but qmail. This is based on about ten years watching sendmails
security problems.

Regards, Frank

Reply via email to