From 7fd3afbe2480275fe41fa0169ed72abd1f425048 Mon Sep 17 00:00:00 2001 From: bwarsaw <> Date: Tue, 14 Dec 2004 04:27:49 +0000 Subject: Committing lots of documentation updates, including linking up to the new mailman-installation guide, and filling out the other formats that seemed to be missing. --- admin/www/mailman-install/node26.html | 139 ++++++++++++++++++++++++++++++++++ 1 file changed, 139 insertions(+) create mode 100644 admin/www/mailman-install/node26.html (limited to 'admin/www/mailman-install/node26.html') diff --git a/admin/www/mailman-install/node26.html b/admin/www/mailman-install/node26.html new file mode 100644 index 00000000..68ca1212 --- /dev/null +++ b/admin/www/mailman-install/node26.html @@ -0,0 +1,139 @@ + + +
+ + + + + + + + + ++Exim's SMTP callback feature is an even more powerful way to detect bogus +sender addresses than normal sender verification. Unfortunately, lots of +servers send bounce messages with a bogus address in the header, and there are +plenty that send bounces with bogus envelope senders (even though they're +supposed to just use an empty envelope sender for bounces). + +
+In order to ensure that Mailman can disable/remove bouncing addresses, you +generally want to receive bounces for Mailman lists, even if those bounces are +themselves not bounceable. Thus, you might want to disable SMTP callback on +bounce messages. + +
+With Exim 4, you can accomplish this using something like the following in
+your RCPT TO
ACL:
+
+
+
+ # Accept bounces to lists even if callbacks or other checks would fail + warn message = X-WhitelistedRCPT-nohdrfromcallback: Yes + condition = \ + ${if and {{match{$local_part}{(.*)-bounces\+.*}} \ + {exists {MAILMAN_HOME/lists/$1/config.pck}}} \ + {yes}{no}} + {yes}{no}} + + accept condition = \ + ${if and {{match{$local_part}{(.*)-bounces\+.*}} \ + {exists {MAILMAN_HOME/lists/$1/config.pck}}} \ + {yes}{no}} + {yes}{no}} + + # Now, check sender address with SMTP callback. + deny !verify = sender/callout=90s +
+If you also do SMTP callbacks on header addresses, you'll want something like
+this in your DATA
ACL:
+
+
+
+ deny !condition = $header_X-WhitelistedRCPT-nohdrfromcallback: + !verify = header_sender/callout=90s +
+ +
+ + + + -- cgit v1.2.3