On Sat, 25 Aug 2007 at 13:42 -0700, [EMAIL PROTECTED] confabulated:

Duane Hill wrote:
On Sat, 25 Aug 2007 at 13:08 -0700, [EMAIL PROTECTED] confabulated:

Further, how does check_sender_mx_access differ from Sender Address Verification (SAV)? (where SAV is an INCREDIBLY bad idea, and a blight upon the internet)

(meaning: if check_sender_mx_access is just the postfix name for SAV, then we not only shouldn't avoid techniques that break check_sender_mx_access, we should all openly adopt techniques that break check_sender_mx_access as a means to further remove the SAV blight from the internet)

Unfortunately, John, it's not SAV. It's an access table used against the MX hosts for the MAIL FROM.

So, it's a table stored in the local postfix instance, that says which addresses are valid mail-froms?

No. Here's from the docs:

  "Search the specified access(5) database for the MX hosts for the MAIL
   FROM address, and execute the corresponding action."

How does that collide with a remote MX being bogus? It seems like the problem isn't that the remote MX is bogus, the problem would be that the local postfix admin is entering a value into said table.

What happens if the remote MX is within a private IP range? Should I accept that message, knowing fully, the recipient would never be able to respond?

-------
  _|_
 (_| |

Reply via email to