Solved

Sendmail Active Directory script?

Posted on 2006-10-19
3
455 Views
Last Modified: 2008-02-26
Okay guys - need a solution. I need to reduce the amount of junk coming through our system.

Here's a quick outline of the problem;

1) Email gets sent to fred@domain.com
2) Exchange says, we don't have a fred@domain.com, lets send a bounce message.
3) Exchange sends a bounce message to the sender, who of course doesn't exist because it was spoofed, so the email sits on sendmails outgoing mail queue.
4) Times this by 25,000 and I have a problem.

Who has a script (or can send me to the right location) for sendmail that can check if the recipient email is valid in active directoy before forwarding it on?
0
Comment
Question by:JigsawTech
3 Comments
 
LVL 19

Accepted Solution

by:
alextoft earned 500 total points
ID: 17771822
Best way to do this is via LDAP, ie. to have your mailserver query AD for a valid user and bounce accordingly. However if you deal with a large quantity of mail, this can slow things up quite a lot. Here's a good way to do it; cron a regular job to retrieve all AD users and drop them into a sendmail access file:

http://www.mimedefang.org/kwiki/index.cgi?Exchange2Access

0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
CentOS7 Xvnc gdm login 9 209
resolv.conf empty ubuntu server 14 3 73
How to enable SSH in Ubuntu. 7 93
Squid Authentication 7 69
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question