Skip to content
Snippets Groups Projects
Select Git revision
  • 9484e39795dfd9032add21a05a0d3d509bd7e4a7
  • master default protected
  • whiteB
  • dev-singlePicture
  • dev
  • newTest
6 results

qt_work.log

Blame
  • spfmilter.cfg 870 B
    [milter]
    # The socket used to communicate with sendmail
    socketname = /var/run/milter/spfmiltersock
    # Name of the milter given to sendmail
    name = pyspffilter
    # Trusted relays such as secondary MXes that should not have SPF checked.
    ;trusted_relay =
    # Internal networks that should not have SPF checked.
    internal_connect = 127.0.0.1,192.168.0.0/16,10.0.0.0/8
    
    # See http://www.openspf.com for more info on SPF.
    [spf]
    # Use sendmail access map or similar format for detailed spf policy.
    # SPF entries in the access map will override defaults.
    access_file = /etc/mail/access.db
    # Connections that get an SPF pass for a pretend MAIL FROM of 
    # postmaster@sometrustedforwarder.com skip SPF checks for the real MAIL FROM.
    # This is for non-SRS forwarders.  It is a simple implementation that
    # is inefficient for more than a few entries.
    ;trusted_forwarder = careerbuilder.com