Useful Tables
Two tables are of interest for aiding the suppression of spam:
Relay Features
Several mc configuration features
affect
relaying. Table 7-1 lists the features that
determine how mail will, or will not, be relayed.
Table 7-1. Relay features
|
Feature |
sendmail text reference |
Description |
|---|---|---|
|
|
7.5[3ed] |
Screen addresses and set policy |
|
|
7.4.2[3ed] |
Allow percent-hack relaying |
|
|
7.4.3[3ed] |
Allow all relaying |
|
|
7.4.4[3ed] |
Relay for any site for which you are an MX server |
|
|
7.4.5[3ed] |
Relay based on |
|
|
7.4.6[3ed] |
Interpret domains in relay-domains and access database as hosts |
|
|
7.4.7[3ed] |
Relay if SMTP MAIL domain is in |
|
|
7.4.8[3ed] |
Relay if SMTP MAIL address is |
Access Database Righthand-Side Values
The access database was introduced in V8.9
sendmail and improved upon in V8.10. It provides
a single, central database with rules to accept, reject, and discard
messages based on the sender name, address, or IP number. It is
enabled with the access_db feature.[11]
In Table 7-2, we list the possible
access database
righthand-side values (which can be keywords or values) and describe the affect each has ...