Therefore my question is if there is a way to configure Sendmail to
actually follow the DNS and show the actual match. If someone maintains
Nov 25 09:27:30 srv02 sendmail[28382]: 1AP7RRup028382: ruleset=check_mail, arg1=<bounces+922094-f85e-user=domain.com@em9713.email.wetransfer.com>, relay=o1.email.wetransfer.com [192.254.117.71], reject=550 5.7.1 <bounces+922094-f85e-user=domain.com@em9713.email.wetransfer.com>... Access denied
Maybe you can write a patch and make it available as an optional
feature?
Therefore my question is if there is a way to configure Sendmail to
actually follow the DNS and show the actual match. If someone maintains
Can I also substitute plain REJECT entries with this? I mean, entries
which block IPs/domains and not specific senders.
Try using an explicit error message and include %0 in it.
Argument "%0" indicates the database key.
From:cyberspammer.com ERROR:"550 no mail %0"
Can I also substitute plain REJECT entries with this? I mean, entries
which block IPs/domains and not specific senders.
In case I am not being clear enough, I actually mean entries that do not start with "From:" keyword.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 308 |
Nodes: | 16 (2 / 14) |
Uptime: | 88:55:14 |
Calls: | 6,923 |
Calls today: | 1 |
Files: | 12,382 |
Messages: | 5,433,813 |