I have turned on require SMTP to authenticate to prevent open relay,
seems to be working well considering the amount of users that are
bitching because they need to change thier set-ups.
I have run a relay check utility at:
http://www.paladincorp.com.au/cgi-bin/spamlart.cgi?DESTINATION=mail.prupref.com
and I get a lot of vulnerabilities, does anyone know how to remedy
these:
250 OK - mail from <postm...@mail.prupref.com>
rcpt to: <"spam...@paladincorp.com.au"@mail.prupref.com>
250 OK - Recipient <"spam...@paladincorp.com.au"@mail.prupref.com>
** FAILURE / Potentital Vulnerability **
rcpt to: <spamtest%paladinco...@mail.prupref.com>
250 OK - Recipient <spamtest%paladinco...@mail.prupref.com>
** FAILURE / Potentital Vulnerability **
rcpt to: <paladincorp.com.au!spamtest>
250 OK - Recipient <paladincorp.com.au!spamtest>
** FAILURE / Potentital Vulnerability **
rcpt to: <paladincorp.com.au!spam...@mail.prupref.com>
250 OK - Recipient <paladincorp.com.au!spam...@mail.prupref.com>
** FAILURE / Potentital Vulnerability **
Thanks
"Chris McKeever" <cgmck...@yahoo.com> wrote in message
news:1a78c305.03022...@posting.google.com...
"Chris McKeever" <cgmck...@yahoo.com> wrote in message
news:1a78c305.03022...@posting.google.com...
John Karr
"Chris McKeever" <cgmck...@yahoo.com> wrote in message
news:1a78c305.03022...@posting.google.com...
"John Karr" <jk...@delmarvawebdesigns.com> wrote in message
news:#ZX24tC3...@TK2MSFTNGP09.phx.gbl...
John
"Ed Crowley [MVP]" <curs...@pacbellnospam.net> wrote in message
news:en5reJD3...@TK2MSFTNGP10.phx.gbl...