wimpunk: > If you want to check on malicious links, postfix could verify if the > link it points to is a file with the correct features.
The .forward file is a "program" that can execute arbitrary shell commands and that can write to arbitrary files, with the privileges of the recipient (which may be "root"). All this makes .forward a sensitive file. Common-sense measures to protect a sensitive file are: - Keeping the file within a directory that is writable only by the recipient or by the system adminstrator. - Using a "hidden" name in the user's home directory, such that the file isn't easily destroyed by mistake. If you want Postfix to look for .forward files in other locations, then you can edit the forward_path parameter setting. The default is to look under the home directory. forward_path = $home/.forward${recipient_delimiter}${extension}, $home/.forward Here is an example with per-user files under /var/forward: forward_path = /var/forward/$user Of course you can mix the two models. Wietse