Henrik K wrote:
On Thu, Sep 25, 2008 at 03:30:18PM +0200, mouss wrote:
However, since there will be many more domains hosted on this server
is there not a better way?
yes, there is: remove your check_sender_mx_access. did it ever catch spam on your server? it never caught anything here.

I don't use it purely for spam prevention. Checking that that sender and
recipient MX's arent pointing to places such as localhost prevents all sorts
of funny things. What's the point of receiving mail if you can't reply to it
anyway?

I agree on the principle of "reachable senders", but I have used it for so long and it never caught any spam. so why query dns for every email when it catches nothing. and given that the sender may be forged, you'll be hitting an innocent dns server. not a serious issue, but if the benefit is 0 hit, ...

note also that a wrong envelope sender doesn't mean you can't reply. The From: header may still be ok.

The only times I've seen an "unreachable" sender (not blocked by zen and other checks) was with legitimate mail. the most noticeable was very important mail (financial!) caused by an upgrade of the remote application server.


The REAL solution is not to check mx access for local mail. If sender and
recipient are on same domain, then mostly likely you should use
permit_mynetworks or such before the check.


He already has permit_mynetworks and so on. so his problem is different (and probably rare). He needs to exclude his domains from check_mx_access. If he puts check_mx_access at the end of his restrictions, he can use permit_auth_destination. but again, is all this worth the pain?

Reply via email to