This content has been marked as final. Show 6 replies
I've already read that doc but what i need is something different because i need to limit also users who send mail with from address (envelope or header address) different from the account one.
I would like to replicate the same check under AUTH_REWRITE mapping table in order to apply the limit per auth userid.
I'm trying to write the correct check string but i can't find out the correct syntax to use right now.
At the moment i have:
BASE|*|*|* $C$[opt/sun/comms7u1/messaging64/lib/check_metermaid.so,throttle,ext_throttle,$2]$NExcessive$ email$ sent$ -$ Please$ try$ again$ later$E
It works, but if the spammer omit the "from:" field the above rule doesn't work
*|*|*|* $C$[IMTA_LIB:check_metermaid.so,throttle,ext_throttle,$3]$NExcessive$ email$ sent$ -$ Please$ try$ again$ later$E
This is a good find, thank you!
Are you also specifying the authrewrite channel option on tcp_auth/tcp_submit, potentially with values 1, 2, 3 or 4?
I have tcp_auth with "authrewrite 3" (just 3 and 4 are the correct values for authrewrite to let system read AUTH_REWRITE mapping table)
Finally i added
to FROM ACCESS table to rewrite the correct from (envelope from) in case of mismatch.
Now it seems to work fine.