Patrick's clue worked You need a db that says 1) this is a protected alias 2) And another one that says these are the domains that can send to that alias. I don't really like the solution because if you spoof the MAIL FROM: header then you get right through Would have been much harder to do IP spoofing if you were not sure what the internal network was. And a spammer sending to the email address will know the domain. Anyway its late and I hope that it works as an interim measure. Kiggs On Jun 20, 2005, at 7:51 PM, Ernest Byaruhanga wrote:
**************** ***************************** Kiggundu Mukasa # Computer Network Consultancy### KYM-NET LTD. # Intranets & Internet Solutions# Plot 80 Kanjokya Street P.O. Box 24284 Kampala, Uganda Tel: +256 77 972255 +256 71 221141 Fax: +256 31 262122 ***************************************************************** |
_______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
