Hey Arthur, On Mon, 2004-03-15 at 18:53, Arthur Gibbs wrote: > Using Mailman 2.1.3, we have had problems with virus-generated messages with > spoofed senders getting through to a one-way list.
IMHO this is not something Mailman should worry about, it's a problem for the MTA, either use SPF, DNSSEC, etc. Under Postfix you can just run two instances, one for inbound mail, one for outbound mail, the inbound instance doesn't accept mail appearing to come *from* your domain. Of course this doesn't solve other spoofed addresses, the answer to this lies in such things as SPF. You could suggest the idea of passwords for every post to the MM3-dev list, but other than that I don't think Mailman should have to worry about spoofed senders, it's not its job. Just my £0.02p -j -- -jamie <[EMAIL PROTECTED]> | spamtrap: [EMAIL PROTECTED] w: http://silverdream.org | p: [EMAIL PROTECTED] pgp key @ http://silverdream.org/~jps/pub.key 14:30:01 up 14:44, 9 users, load average: 0.13, 0.10, 0.09
signature.asc
Description: This is a digitally signed message part
------------------------------------------------------ Mailman-Users mailing list [EMAIL PROTECTED] http://mail.python.org/mailman/listinfo/mailman-users Mailman FAQ: http://www.python.org/cgi-bin/faqw-mm.py Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/