From: Per Hedeland on 1 Dec 2006 17:41 In article <I2Wbh.30953$ed6.1174776(a)weber.videotron.net> Cedric Tardif <cedrict(a)derytelecom.ca> writes: > >Just a update and a question. > >This : > > To:user1(a)example.com RELAY > > To:user2(a)example.com RELAY > >Work great but you have to had this : > >To:example.com REJECT > >This way only know user will pass through. > >Now the question would be what is the undocumented limit of entry you >can add in the access file ? If you need to ask, you're nowhere near it.:-) It's a matter of hundreds of thousands if not millions, and even then the major problem is the rebuild time, not access times. This assuming you're using Berkeley DB (i.e. type 'hash'), and not the ancient dbm that is probably still available on commercial Unixen. --Per Hedeland per(a)hedeland.org
First
|
Prev
|
Pages: 1 2 Prev: Vacation and Sendmail Next: Vacation program - Connection refused by [127.0.0.1] |