Chris Funk <[EMAIL PROTECTED]> wrote:

> On Thu, Dec 4, 2008 at 11:20 AM, Sahil Tandon <[EMAIL PROTECTED]> wrote:
> 
> > Chris Funk <[EMAIL PROTECTED]> wrote:
> >
> > <..snip>
> > > Obviously not a good thing to do as then no one internally could send
> > mail.
> > >
> > > Is there anything I can do that would say,  If the From: address is *@
> > > us-reports.com and it is not from mynetworks then REJECT it?
> >
> > Place the check after permitting your networks, SASL auth'd clients, and
> > reject_unauth_destination.
> >
> > > The check_sender_access option is working great for the MAIL FROM:
> > header,
> > > but that isn't catching these other ones.
> >
> > check_sender_access works on the ENVELOPE, not the HEADER.
> >
> > --
> > Sahil Tandon <[EMAIL PROTECTED]>
> >
> Thanks for all the information Sahil.
> 
> How would I
> 
> <<Place the check after permitting your networks, SASL auth'd clients, and
> reject_unauth_destination.

Search this mailing list's archives for examples; this and related
topics have been discussed several times over the last few days.

> Will the smtpd_*_restrictions  work on headers?

I don't think so.

-- 
Sahil Tandon <[EMAIL PROTECTED]>

Reply via email to