On Fri, 2010-10-01 at 04:27 +0200, Karsten Bräckelmann wrote: > On Thu, 2010-09-30 at 21:09 -0400, dhottin...@... wrote:
> > [...] I did have some mail going to /opt/spam, however it was > > internal mail. So I added our domain to the local.cf file: > > whitelist_from *...@harrisonburg.k12.va.us > > What Jason said. Do NOT do this. This is the most obvious and often Since it has come to my attention, the previous sentence might be mis-leading... I do not object to what Jason said. In fact, I fully agree with what he wrote, just felt some additional info might be warranted. "This" in all above sentences refer to the OPs whitelist_from, the unconstrained variant that *never* should be used without a really solid reason. Especially *not* with the recipient's domain. > abused forgery of a sender. IFF you really need white-listing at all, > use one of the constrained variants, but not the plain _from one. > > Besides, if you even need something like that, your problem usually is > something else. Like outgoing SMTP equals MX, or scanning outbound mail. > Both can easily be fixed my using SMTP AUTH. -- char *t="\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4"; main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1: (c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}