Nigel Woodley writes:

 > I understand other mailman type products offer this functionality for the
 > very reason that I have outlined.

What you are saying implies that an explicitly untrusted host is
allowed to inject content into a secure network based on the most
easily forged identification on the Internet.  This seems unlikely to
be true to me, and if true, I would say the security policy is broken.

Are you sure you understand the actual rules for mail distribution on
this network?  I have to suspect that even if you got what you say you
want, you still would not be able to distribute posts via a Mailman
based on that host.

There are better methods for identification like DKIM (though they
still have technical problems w.r.t. mailing lists).  Perhaps such a
protocol is in use on your network and you need not munge headers at
all (in fact, you can not munge DKIM-signed headers without breaking
DKIM).

HTH
------------------------------------------------------
Mailman-Users mailing list Mailman-Users@python.org
http://mail.python.org/mailman/listinfo/mailman-users
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/
Unsubscribe: 
http://mail.python.org/mailman/options/mailman-users/archive%40jab.org

Reply via email to