Mark Turrin <[EMAIL PROTECTED]> writes: > Isn't there a way to deny mail that spoofs your own address by checking > the IP# of the connecting machine. If the machine's IP# isn't in your > domain the mail address is forged and should be rejected. > > It seems that this kind of checking should be something the MTA would > handle straight away before tmda even sees the mail. Authentic mail from > [EMAIL PROTECTED] would have to connect from a machine in your pool of IP > numbers. > > Does qmail do this?
The badmailfrom file is the closest qmail comes to this and that applies to all messages sent through qmail-smtpd, regardless of IP. The only workaround I'm aware of is to run a second instance of tcpserver/qmail-smtpd that is only available to local clients and make sure you *don't* have a badmailfrom file in that configuration and that you *do* have a badmailfrom in the publically accessible one. Tim _____________________________________________ tmda-users mailing list ([EMAIL PROTECTED]) http://tmda.net/lists/listinfo/tmda-users
