manu@... wrote: > Oliver Fromme wrote: > > > (The only problem is that the primary MX isn't running > > a web server, and it really shouldn't. But maybe I can > > hack something up for that purpose, maybe a simple app > > that receives HTTP GET requests ... I'll look into that.) > > You can query another machine that will do a SMTP VRFY on your primary > MX within a CGI. Yes, I could do that, but I don't want to tie yet another machine into the equation. It increases the number of potential "points of failure". > That's a simple script that can be hacked within a few minutes. Yes, in fact I have just written a small script in Python that performs the SMTP VRFY part on a given number of addresses. It's only 5 lines. I think I'm going to add a HTTP server part to that script. which is also very easy in Python. So I don't need to install a fully-fledged web server like Apache. It might even has better performance. I'll let it run on a non- standard port on the primary MX. Thanks for all your help! Best regards Oliver -- Oliver Fromme, secnetix GmbH & Co. KG, Marktplatz 29, 85567 Grafing Dienstleistungen mit Schwerpunkt FreeBSD: http://www.secnetix.de/bsd Any opinions expressed in this message may be personal to the author and may not necessarily reflect the opinions of secnetix in any way. Passwords are like underwear. You don't share them, you don't hang them on your monitor or under your keyboard, you don't email them, or put them on a web site, and you must change them very often.
Message
Re: [milter-greylist] Backup MX: verifying addresses
2006-12-08 by Oliver Fromme
Attachments
- No local attachments were found for this message.