From: Per Hedeland on
In article <I2Wbh.30953$ed6.1174776(a)weber.videotron.net> Cedric Tardif
<cedrict(a)derytelecom.ca> writes:
>
>Just a update and a question.
>
>This :
> > To:user1(a)example.com RELAY
> > To:user2(a)example.com RELAY
>
>Work great but you have to had this :
>
>To:example.com REJECT
>
>This way only know user will pass through.
>
>Now the question would be what is the undocumented limit of entry you
>can add in the access file ?

If you need to ask, you're nowhere near it.:-) It's a matter of hundreds
of thousands if not millions, and even then the major problem is the
rebuild time, not access times. This assuming you're using Berkeley DB
(i.e. type 'hash'), and not the ancient dbm that is probably still
available on commercial Unixen.

--Per Hedeland
per(a)hedeland.org