[Mimedefang] bounce check with sendmail and md_check_against

Steffen Kaiser skmimedefang at smail.inf.fh-bonn-rhein-sieg.de
Fri Dec 1 02:26:25 EST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thu, 30 Nov 2006, Wayne wrote:

What does a telnet session to mail.bwtelcom.net results with the invalid 
name?

I mean:

helo smtp1.hamilton.net
mail from: <>
rcpt to: bad_user
quit

? It looks that the host rejects a bad user, but you've said that you 
configured the host to act on sessions differently depending on the 
connecting host.

>        ($result, $rmesg)= md_check_against_smtp_server($sender, 
> $recip,"smtp1.hamilton.net","mail.bwtelcom.net");
>        }
>        else{
>        ($result, $rmesg)= md_check_against_smtp_server($sender, 
> $recip,"smtp1.hamilton.net","mail.hamilton.net");
>        }

I would add a md_syslog(" $recip, $result, $rmesg")  here and see the 
logs.

>       if($result =~ /CONTINUE/){

No deal, but eq/ne operators would be OK.

>       return ('CONTINUE' ,"ok");
>       }
>       elsif($result =~ /TEMPFAIL/){
>       return ('TEMPFAIL' ,"$rmesg");
>       }
>       else
>       {
>       if ( $relayflag ){
>                          return ('REJECT', "unknown user account", "550", 
> "5.1.1", "10");
>                         }
>       else{
>            return('REJECT',"unknown user account", "550", "5.1.1", "3");
>            }
>
> }

- -- 
Steffen Kaiser
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iQEVAwUBRW/ZJOgJIbZtwg6XAQJK1QgAnB+3UrG82gVj5s+KzQZk95Z57xe44ely
zBk6C6AZeHoMG9yQLMeokC7kgzxv1mUKUk9OSZDXY+6YUXyPfIMFkxVFOJU2a2yz
ECKfw9krpqlrqMn5fHafHYc93lbU3PCJpatLh42Dz0jRtBG51f3fTq1oApoYfDYf
S9Z9n9u3+2q/MC5csvAf3/BZ5cmfTtFd7u4b0cqaGAogw1vkMKQZfl4bG9oz2f9P
M6UMZ50Mpt1obTqfCcQlK3FWyr0gg9FaG7qbyuLmPoNnkNyzNown5couLlbHAG8F
yu0P021D6iAch9R2fGNW7slrX7YxdtBTUtBQUYNwU0yzfbodkoMRjA==
=NhUl
-----END PGP SIGNATURE-----



More information about the MIMEDefang mailing list