CSS:
> >> If your relay restrictions look like:
> >> 
> >>    main.cf:
> >>    indexed = ${default_database_type}:${config_directory}/
> >>    smtpd_relay_restrictions =
> >>        check_sasl_access ${indexed}sasl-access,
> >>        permit_sasl_authenticated,
> >>        permit_mynetworks,
> >>        reject_unauth_destination
> >> 
> >> (before any user account is compromised), then once an account
> >> is hijacked:
> >> 
> >>    sasl-access:
> >>    lu...@example.com REJECT 5.7.1 Your login is compromised.
> > 
> > This is a particularly good solution as it allows the user to continue
> > receiving email so that you can send them them a message explaining
> > exactly what the problem is.
> 
> And I assume this can be sql-backed, correct?  So it should be easy
> to build a web-based tool for staff to nuke/un-nuke account once the
> issue has been addressed.

Correct. To estimate the SQL query load, there will be one query
per "RCPT TO" command.

        Wietse

Reply via email to