CSS:
> >> If your relay restrictions look like:
> >>
> >> main.cf:
> >> indexed = ${default_database_type}:${config_directory}/
> >> smtpd_relay_restrictions =
> >> check_sasl_access ${indexed}sasl-access,
> >> permit_sasl_authenticated,
> >> permit_mynetworks,
> >> reject_unauth_destination
> >>
> >> (before any user account is compromised), then once an account
> >> is hijacked:
> >>
> >> sasl-access:
> >> [email protected] REJECT 5.7.1 Your login is compromised.
> >
> > This is a particularly good solution as it allows the user to continue
> > receiving email so that you can send them them a message explaining
> > exactly what the problem is.
>
> And I assume this can be sql-backed, correct? So it should be easy
> to build a web-based tool for staff to nuke/un-nuke account once the
> issue has been addressed.
Correct. To estimate the SQL query load, there will be one query
per "RCPT TO" command.
Wietse