On Tue, Aug 19, 2008 at 1:43 PM, Wietse Venema <[EMAIL PROTECTED]> wrote:
> Jeff:
>> On Tue, Aug 19, 2008 at 11:38 AM, Wietse Venema <[EMAIL PROTECTED]> wrote:
>> > Jeff:
>> >> It took me a while before I could test this. The recommended solution
>> >> succeeds at blocking the specified aliases when relayed through our
>> >> gateway, but it does not do so at the SMTP level. It generates bounce
>> >> notifications, which in the end will create back-scatter. The bounce
>> >> message I got in testing gave an error code of 554.
>> >
>> > Sorry, reject_unverified_recipient does not generate backscatter.
>> > If you believe this is not so, then you need to provide actual
>> > evidence so that we can point out your mistake.
>> >
>> >        Wietse
>>
>> Exactly! I can't figure out why I'm getting bounces instead of rejects.
>
> That's because your configuration does not work the way you describe it.
>
>> I did (moments after clicking "send") discover in "man -s 5 access"
>> that I can put the reject code (550) directly in the map. However, I
>> am still getting bounces when I send mail to the private address I am
>> using for testing.
>>
>> Updated config on the back-end MTA...
>
> Of course, reject_unverified_recipient is meaningful only when
> tun on the FRONT END MTA.
>

It IS turned on on the front end MTA. But the front end gateway
depends on having recipient verification functioning on the back-end
servers. The gateway has no knowledge of actual user accounts. The
gateway acts as a proxy for recipient verification. When an external
MTA is sending a message, the gateway contacts the back-end MTA to
verify the recipient (using a dummy MAIL FROM and RCPT TO), then
responds to the external MTA accordingly.

I want the back-end to tell the front-end gateway 550 for
[EMAIL PROTECTED], but I want it to tell my other internal MTAs OK,
whilst not breaking regular recipient verification.

-- 
Jeff

Reply via email to