>> There's one more question now, I'm a bit scared of the security risks
>> of this, could this be used for some spammer to send mail using my
>> server?
>> I would like to limit this option to the mail sent from
>> "local_interfaces", but looking to the router preconditions (3.12 from
>> the manual) there's apparently no straightforward way to do this,
>> should I create a new condition for this, or it is already save the
>> way it is.
>
> If you want to secure it you should test for protocol = local.
> A locally generated bounce shows up in the log:
>
> 2009-06-16 16:00:58 1MGZDd-0001kA-Uy <= <> R=1MGZDc-0001k2-35 U=exim P=local ...
>
>
Ok, I finally got something :)
I was trying to use protocol = local in the preconditions wich
obviously doesn't work and I finally used a condition (I wanted to
avoid the overhead of yet another comparision but I couldn't)
Here goes how is it now, hope it helps someone...
#Router so MX can send outgoing bounces
router_bounces:
debug_print = "R: router_bounces"
driver = dnslookup
senders = :
transport = remote_smtp
condition = ${if eq {$received_protocol}{local} \
{1}{0}}
# ignore private rfc1918 and APIPA addresses
ignore_target_hosts = 0.0.0.0 : 127.0.0.0/8 : 192.168.0.0/16 :\
172.16.0.0/12 : 10.0.0.0/8 : 169.254.0.0/16 :\
255.255.255.255
Thanks a lot for your help.