> > The solution to my problem might or might not be related
> > to the vchkpw, so i'll try to find help here anyway.
> >
> > The problem is that if there is a virtual domain: bbb.zz
> > and there is a user [EMAIL PROTECTED]  and the whole thing
> > is located at address ADDR then any spammer
> > can connect to smtp port on addres ADDR enter
> > [EMAIL PROTECTED] as FROM address (MAIL FROM) and
> > spam a bunch of people. All the victims will think
> > that [EMAIL PROTECTED] is doing it to them.  Relaying is
> > allowed in this case, since bbb.zz is a local domain.
>
> From what I understand, users of bbb.zz are receiving the spam; in
this case
> the FROM: address is irrelevant.  The same thing will happen
regardless of
> who is sending the email.

No, people of bbb.zz are not getting any spam. The WORLD gets the
spam and the spam is propagated from the host ADDR and the
sender is [EMAIL PROTECTED], so the WORLD thinks that [EMAIL PROTECTED] sends
the spam, which he/she does not.

Reply via email to