This is a multi-part message in MIME format.
--
I have been going nuts trying to figure out why this does not work. I have
a feeling it a ACL problem but commented out so many thing you would expect
a direct error msg by now. My comment are noted with "drb" on them. I am
getting a 550 Administrative prohibition error followed by a 421 err when
every I send mail to this server. I have been reading the 4.30 manual about
ACL's and as many howto's as I can lay my hands on but so far I think I have
broke more then I have fixed. Any comments would be greatly appreciated.
I did remove most of the comments to reduce the email size. I hope this
does cause any problems.
Please reply directly as I am not on the list but I do read the archives
from time to time.
doug@???
SMTP error from remote mailer after RCPT
TO:<doug@???>:
host newmail.efastfunding.com [10.1.7.254]: 550 Administrative
prohibition
____________________________________________________________________________
____
VERSION 4.31
primary_hostname =newmail.efastfunding.com
domainlist local_domains = @efastfunding.com : @mail.efastfunding.com
@newmail.efastfunding.com
domainlist relay_to_domains =
hostlist relay_from_hosts = 127.0.0.1 : 10.0.0.0/8 : 192.168.1.0/24
#
# domainlist relay_to_domains = *.myco.com : my.friend.org
#
# hostlist relay_from_hosts = 127.0.0.1 : 192.168.0.0/16
#acl_smtp_rcpt = acl_check_rcpt drb
acl_smtp_mime = acl_check_mime
acl_smtp_data = acl_check_content
av_scanner = clamd:127.0.0.1 3310
spamd_address = 127.0.0.1 783
# qualify_domain =
# qualify_recipient =
allow_domain_literals
never_users = root
#host_lookup = * drb
rfc1413_hosts = *
rfc1413_query_timeout = 30s
#
# sender_unqualified_hosts =
# recipient_unqualified_hosts =
# percent_hack_domains =
ignore_bounce_errors_after = 2d
timeout_frozen_after = 7d
#acl_smtp_data = acl_check_data
helo_allow_chars = _
begin acl
acl_check_rcpt:
acl_check_data:
# deny message = This message contains malformed MIME
($demine_reason).
# demime = *
# condition = ${if >{$demime_ererlevel}{2}{1}{0}}
# deny message = This message contaims an attachment of a type which we
do not accept (.$found_extension)
# accept (.$found_extension)
# demime =
bat:com:exe:pif:prf:scr:vbs:chm:cmd:com:cpl:crt:hlp:hta:isp:reg:sct:
# warn message = X-Spam-Score: $spam_score
# spam = nobody:true
# warn message = X-Spam-Report: $spam_report
# spam = nobody:true
# warn message = Subject: ****SPAM**** $h_Subject
# spam = nobody
# deny message = This message scored $spam_score spam poins.
# spam = nobody:true
# condition = ${if >{$spam_score_int}{50}{1}{0}}
#deny message = This message contains a virus or other harmful content
# demime = *
# malware = *
accept hosts = :
# accept
deny domains = +local_domains
local_parts = ^[.] : ^.*[@%!/|]
deny domains = !+local_domains
local_parts = ^[./|] : ^.*[@%!] : ^.*/\\.\\./
############################################################################
#
accept local_parts = postmaster
domains = +local_domains
# Deny unless the sender address can be verified.
require verify = sender
accept domains = +local_domains
endpass
#verify = recipient drb
# Accept if the address is in a domain for which we are relaying, but
again,
# only if the recipient can be verified.
accept domains = +relay_to_domains
endpass
# verify = recipient drb
# If control reaches this point, the domain is neither in +local_domains
# nor in +relay_to_domains.
accept hosts = +relay_from_hosts
# accept authenticated = * drb
# deny message = relay not permitted drb
acl_check_mime:
# Decode MIME parts to disk. This will support virus scanners later.
warn decode = default
# File extension filtering.
deny message = Blacklisted file extension detected
condition = ${if match \
{${lc:$mime_filename}} \
{\N(\.exe|\.pif|\.bat|\.scr|\.lnk|\.com)$\N} \
{1}{0}}
# Reject messages that carry chinese character sets.
# WARNING: This is an EXAMPLE.
deny message = Sorry, noone speaks chinese here
condition = ${if eq{$mime_charset}{gb2312}{1}{0}}
accept
acl_check_content:
# Reject virus infested messages.
# deny message = This message contains malware ($malware_name)
# drb malware = *
# Always add X-Spam-Score and X-Spam-Report headers, using SA system-wide
settings
# (user "nobody"), no matter if over threshold or not.
# warn message = X-Spam-Score: $spam_score ($spam_bar)
# drb spam = nobody:true
# warn message = X-Spam-Report: $spam_report
# spam = nobody:true
# Add X-Spam-Flag if spam is over system-wide threshold
# warn message = X-Spam-Flag: YES
# drb spam = nobody
# Reject spam messages with score over 10, using an extra condition.
#@ deny message = This message scored $spam_score points. Congratulations!
# drb spam = nobody:true
# condition = ${if >{$spam_score_int}{100}{1}{0}}
# finally accept all the rest
accept
begin routers
# domain_literal:
# driver = ipliteral
# domains = ! +local_domains
# transport = remote_smtp
dnslookup:
driver = dnslookup
domains = ! +local_domains
transport = remote_smtp
ignore_target_hosts = 0.0.0.0 : 127.0.0.0/8
no_more
system_aliases:
driver = redirect
allow_fail
allow_defer
data = ${lookup{$local_part}lsearch{/mail/aliases}}
# user = exim
file_transport = address_file
pipe_transport = address_pipe
userforward:
driver = redirect
check_local_user
file = $home/.forward
no_verify
no_expn
check_ancestor
# allow_filter
file_transport = address_file
pipe_transport = address_pipe
reply_transport = address_reply
localuser:
driver = accept
check_local_user
transport = local_delivery
cannot_route_message = Unknown user
begin transports
remote_smtp:
driver = smtp
local_delivery:
driver = appendfile
file = /home/$local_part/Maildir
maildir_format
delivery_date_add
envelope_to_add
return_path_add
# group = mail
# mode = 0660
address_pipe:
driver = pipe
return_output
address_file:
driver = appendfile
delivery_date_add
envelope_to_add
return_path_add
address_reply:
driver = autoreply
begin retry
# Address or Domain Error Retries
# ----------------- ----- -------
* * F,2h,15m; G,16h,1h,1.5; F,4d,6h
begin rewrite
#begin authenticators
######################################################################
# begin local_scan
# End of Exim configuration file
____________________________________________________________________________
_______________
Doug Block
Chief Information Officers of Efast Funding
713-983-4055 (Direct)
888-338-3863 x 4055 (Toll Free)
--
[ Doug Block (dblock@???).vcf of type text/x-vcard deleted ]
--