Solved

sendmail relay options

Posted on 1998-08-12
5
228 Views
Last Modified: 2013-12-23
how i avoid from people out of my domain using my sendmail 8.8.7 from using it as thier smtp server
0
Comment
Question by:sboaz
  • 2
  • 2
5 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 1583121
see following sendmails options for more details:

O PrivacyOptions=goaway
O AllowBogusHELO=false
O LogLevel=

You may also use the delivery agent F=w flag in the rules to identify "unfriendly mailusers" and reject delivery.

Probably most users go away when rhe PrivacyOptions are used.


0
 
LVL 1

Accepted Solution

by:
sherwood earned 100 total points
ID: 1583122
A much better solution for most users is to rip out sendmail
and drop in qmail, zmailer, or exim.  Of the three, I found
exim to be the easiest to configure.


0
 

Author Comment

by:sboaz
ID: 1583123
not helped
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 1583124
answer accepted, but comment "not helped"
What's the truth now?
0
 

Author Comment

by:sboaz
ID: 1583125
situation is that i have to upgrade the package
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Need help with VLAN issue 6 59
f5 Persistence 14 52
How do I determine past ip addresses of multiple computers logged onto my network? 5 74
Home lab datacenter 9 53
Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question