Skip to content
Snippets Groups Projects
Select Git revision
  • f136e973dca6956496bcd788182455552c472adc
  • master default protected
  • pymilter-1.0.4
  • pymilter-1.0.3
  • pymilter-1.0.2
  • pymilter-1.0.1
  • pymilter-1_0
  • milter-0_8_18
  • pymilter-0_9_8
  • pymilter-0_9_7
  • pymilter-0_9_6
  • pymilter-0_9_5
  • pymilter-0_9_4
  • pymilter-0_9_2
  • pymilter-0_9_1
  • pymilter-0_9_0
  • pymilter-0_8_12
  • pymilter-0_8_11
  • pymilter-0_8_10
  • pymilter-0_8_9
  • milter-0_8_8
  • milter-0_8_7
22 results

spfmilter.cfg

Blame
  • spfmilter.cfg 849 B
    [milter]
    # The socket used to communicate with sendmail
    socketname = /tmp/spfmiltersock
    # Name of the milter given to sendmail
    name = pyspffilter
    # Trusted relays such as secondary MXes that should not have SPF checked.
    ;trusted_relay =
    # Internal networks that should not have SPF checked.
    internal_connect = 127.0.0.1,192.168.0.0/16
    
    # See http://www.openspf.com for more info on SPF.
    [spf]
    # Use sendmail access map or similar format for detailed spf policy.
    # SPF entries in the access map will override defaults.
    ;access_file = /etc/mail/access.db
    # Connections that get an SPF pass for a pretend MAIL FROM of 
    # postmaster@sometrustedforwarder.com skip SPF checks for the real MAIL FROM.
    # This is for non-SRS forwarders.  It is a simple implementation that
    # is inefficient for more than a few entries.
    ;trusted_forwarder = careerbuilder.com