[Mimedefang] bounce check with sendmail and md_check_against
Steffen Kaiser
skmimedefang at smail.inf.fh-bonn-rhein-sieg.de
Fri Dec 1 02:26:25 EST 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Thu, 30 Nov 2006, Wayne wrote:
What does a telnet session to mail.bwtelcom.net results with the invalid
name?
I mean:
helo smtp1.hamilton.net
mail from: <>
rcpt to: bad_user
quit
? It looks that the host rejects a bad user, but you've said that you
configured the host to act on sessions differently depending on the
connecting host.
> ($result, $rmesg)= md_check_against_smtp_server($sender,
> $recip,"smtp1.hamilton.net","mail.bwtelcom.net");
> }
> else{
> ($result, $rmesg)= md_check_against_smtp_server($sender,
> $recip,"smtp1.hamilton.net","mail.hamilton.net");
> }
I would add a md_syslog(" $recip, $result, $rmesg") here and see the
logs.
> if($result =~ /CONTINUE/){
No deal, but eq/ne operators would be OK.
> return ('CONTINUE' ,"ok");
> }
> elsif($result =~ /TEMPFAIL/){
> return ('TEMPFAIL' ,"$rmesg");
> }
> else
> {
> if ( $relayflag ){
> return ('REJECT', "unknown user account", "550",
> "5.1.1", "10");
> }
> else{
> return('REJECT',"unknown user account", "550", "5.1.1", "3");
> }
>
> }
- --
Steffen Kaiser
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iQEVAwUBRW/ZJOgJIbZtwg6XAQJK1QgAnB+3UrG82gVj5s+KzQZk95Z57xe44ely
zBk6C6AZeHoMG9yQLMeokC7kgzxv1mUKUk9OSZDXY+6YUXyPfIMFkxVFOJU2a2yz
ECKfw9krpqlrqMn5fHafHYc93lbU3PCJpatLh42Dz0jRtBG51f3fTq1oApoYfDYf
S9Z9n9u3+2q/MC5csvAf3/BZ5cmfTtFd7u4b0cqaGAogw1vkMKQZfl4bG9oz2f9P
M6UMZ50Mpt1obTqfCcQlK3FWyr0gg9FaG7qbyuLmPoNnkNyzNown5couLlbHAG8F
yu0P021D6iAch9R2fGNW7slrX7YxdtBTUtBQUYNwU0yzfbodkoMRjA==
=NhUl
-----END PGP SIGNATURE-----
More information about the MIMEDefang
mailing list