On Tue, Jun 07, 2011 at 10:38:44AM -0400, Michael Way wrote:
> > So why not just take MSexChange out of the picture? Set up direct
> > authentication to gmail. SASL_README.html#client_sasl just as you
> > did, setting it up to authenticate to MSexChange.
> >
> > Have your .forward invoke sendmail(1) with your gmail address as 
> > the sender. Then maybe a transport_maps entry to force your gmail 
> > address to use the gmail submission service.
> >
> > Did I miss something? Does that not achieve the original goal?
> 
> Yes, I agree that this would be the obvious way to attack it except 
> that our corporate firewall does not allow such outbound smtp 
> packets on ports less than 1024: e.g.
> % telnet smtp.gmail.com 587
> Trying 209.85.225.109...
> 
> and never connecting... while for my corporate smtp server it does 
> connect. You see, I'm trying to get around what *they* think is 
> best for me and them...

Need Able System Administrators ;)

I could suggest some sort of tunnelling to a host outside the Great 
Firewall, but that would likely be a violation of network use rules. 
The best next step that occurs to me would be to go to the IT gang 
and ask for support. If the answer is as I suspect, "No, you may not 
and cannot do this," I guess you must either obey or resort to 
sneakernet solutions.

Another possible approach is to see if there's any software to 
automate the gmail webmail interface. I know spammers have done it, 
because stuff like that is about the only spam that gets through to 
my mailboxes.

Good luck.
-- 
    Offlist mail to this address is discarded unless
    "/dev/rob0" or "not-spam" is in Subject: header

Reply via email to