RobertH wrote:
Mouss and Greg
In my experience the most important thing is to add the IP address of systems that take mail from the internet and send it on to you to trusted_networks. This will enable RBL checks on the previous-hop addresses. I have added not only peer mail servers within my organization but also some servers that catch mail to [EMAIL PROTECTED] and forward it to me, and a few mailing list servers that don't have adequate spam filtering.

After you've done that, take some spam and run "spamassassin -D -t" and read the output for "X-Spam-Relays-Trusted".


What I mean is external mail server with different email account and domain
for me or others I can forward to main email address or addresses

I would trust the server not to "originate" spam yet it doesn't relay for my
servers or domains.


it does relay mail for you. the fact that it is not the mx of a domain you own doesn't matter.


It would just forward email to me from old email account(s)

These would not be "free" email service addresses which I think would cause
another round of issues with possible solution

 - rh


Reply via email to