> Hello!
>
> The solution to my problem might or might not be related
> to the vchkpw, so i'll try to find help here anyway.
>
> The problem is that if there is a virtual domain: bbb.zz
> and there is a user [EMAIL PROTECTED] and the whole thing
> is located at address ADDR then any spammer
> can connect to smtp port on addres ADDR enter
> [EMAIL PROTECTED] as FROM address (MAIL FROM) and
> spam a bunch of people. All the victims will think
> that [EMAIL PROTECTED] is doing it to them. Relaying is
> allowed in this case, since bbb.zz is a local domain.
>
> How can I solve the problem? SMTP authorization?
> but how? Any other ways?
>
> Regards,
> Artem
>From what I understand, users of bbb.zz are receiving the spam; in this case
the FROM: address is irrelevant. The same thing will happen regardless of
who is sending the email.
If people /othe/ than your own local domains are getting spam from you (you
are an open relay) then you need to enable roaming users and only allow smtp
after pop.
If the former is the case, you may want to try rblsmtpd and filter
connections. Check the archives of this list or www.qmail.org for more info
on rblsmtpd.
Tim