Patrick's clue worked

You need a db that says 
1) this is a protected alias
2) And another one that says these are the domains that can send to that alias.

I don't really like the solution because if you spoof the MAIL FROM: header then you get right through
Would have been much harder to do IP spoofing if you were not sure what the internal network was.

And a spammer sending to the email address will know the domain.  Anyway its late and I hope that it works as an interim measure.

Kiggs



On Jun 20, 2005, at 7:51 PM, Ernest Byaruhanga wrote:

And please don't tell me to change the MTA to solve the problem :-)


dont flame Kiggs but, i'd use Mailman.

rgds
ernest
_______________________________________________
LUG mailing list
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/




****************                   *****************************

Kiggundu Mukasa                # Computer Network Consultancy###

KYM-NET LTD.                   # Intranets & Internet Solutions#

Plot 80 Kanjokya Street

P.O. Box 24284 Kampala, Uganda             

Tel:     +256 77 972255

         +256 71 221141

Fax:     +256 31 262122

*****************************************************************


_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

Reply via email to