From owner-freebsd-isp Sun May 11 17:08:06 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id RAA19475 for isp-outgoing; Sun, 11 May 1997 17:08:06 -0700 (PDT) Received: from obiwan.psinet.net.au (obiwan.psinet.net.au [203.19.28.59]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id RAA19454 for ; Sun, 11 May 1997 17:08:01 -0700 (PDT) Received: from localhost (adrian@localhost) by obiwan.psinet.net.au (8.8.5/8.8.5) with SMTP id HAA10315; Mon, 12 May 1997 07:51:39 +0800 (WST) Date: Mon, 12 May 1997 07:51:39 +0800 (WST) From: Adrian Chadd To: Dev Chanchani cc: freebsd-isp@FreeBSD.ORG Subject: Re: Sendmail hack In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-isp@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > I and my users have been receiving a lot of spam mail recently. Usually, > this is not so bad because I will just reply to remove me. However, more > and more spammers are using fake domain names to send their spam from. I > was wondering if you could hack sendmail to do a lookup on the reply to or > from address. If the domain name is non-existant, reject the mail. [snip] Info to do this is freely avaliable on the internet, however just add this to the end of your sendmail.cf file : Scheck_mail # Check for valid domain name R$* $: $>3 $1 R $* < @ $+ . > $: R $* < @ $+ > $#error $: 451 Domain must resolve Note this is incompatible with the DeliveryMode=defer option, since it requires that a DNS lookup be done immediately upon mail receipt. Adrian.