> That whoosh you just heard was the sound of the joke going way over your
> head.

No that whoosh was the sound of the sendmail config going way over my
head ;-)

Sendmail seems to be in the way way too hard basket (besides Rodos said
it wouldn't work anyway). So perhaps I need to look at qmail or see if
our local resident perl genius can really "whip up my own mta". I just 
love these guys that can build a nuclear reactor with three lines of 
perl code.

Anyway, for the curious, the point of the exercise is.....

Many different users set their mua to use the mail server as their
outbound smtp. Some users are allowed to have their e-mail delivered
without any tampering, others however are obviously evil and their
mail must go via the corporate server to have whatever degrading
indignaties are to be imposed on them (virus scanning, long winded 
legalise tacked on the end, all nudie pictures removed etc...)

Why can't I just tell the good guys to use the mta, and the bad guys
the corporate e-mail server? Well...there's this "firewall" thing so
the corporate server only excepts mail from the mta... (well sometimes
you have to put OSS between "commercial" software and the internet to
stop it from becoming spam central. ;-)

Of course a smart user might try to set their "mail from" to something
else and put a quite note in the body of the message requesting the 
recipient not reply to the envelope address but to the address written
in the message body. Thus they could maybe get around the system and
have their e-mails set free onto the ether without corporate tampering.

But unfortunately for them, their e-mail admin has forseen this and is 
busy working out how to configure the smtp agent to use authenticated 
smtp to fetch the users "mail" attribute from the ldap directory. If
this doesn't match the envelop "mail from" something nasty might happen
to their e-mail...

Now the tricky bit, if the "mail from" is NOT in the "naughty users
list" 
their mail gets released to the ether undamaged, otherwise, their mail
is 
routed to the corporate server for appropriate tampering before heading
out. 

Clear as Mud?

rgds

Pete


-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug

Reply via email to