On Wednesday, March 31, 2004 at 6:52:31 AM you wrote (at least in
>>> I have a peculiar requirement of just trashing a particular "Mail From:" to
>>> any of the virtual domains hosted on a Server.
>>echo SENDERADDRESS >>/var/qmail/control/badmailfrom
> Thanks for your solution. But, the "badmailfrom" would give a bounce from
> qmail-smtpd (MTA).
No, it'd give a 5xx code from your qmail-smtpd and the bounce is
created by somebody else. Your system does /NOT/ bounce the message,
it just rejects it. If the other side bounces is not within your
> I just wanted to blackhole it, without sending any intimation even if it
> violates any RFC.
Than you have two options:
1) hacking qmail source to read a "dev-null" list and deliver all
mails with sender address on this list to /dev/null (i.e. to drop
2) manipulate all dot-qmail files that could be involved in a delivery
and check if the message came from $BAD_SENDER. If so exit(99) from
this check and no further delivery instructions in this dot-qmail
file will be processed. Quite a lot of work to do, and you'd have
to take care of all new created dot-qmail files in your setup.
COBOL: Crappy Obsolete Butthead Oriented Language.