-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Monday, 2009-04-06 at 11:05 -0700, Randall R Schulz wrote:
Looks like you may have to give your mail server a proper domain name, to get past the security checks at sonic.com
Can I get the primary outgoing mail to use the empty domain the way the bounces do? I see these FROM_HEADER and POSTFIX_MASQUERADE_DOMAIN parameters whose descriptions suggest vaguely that this could be done.
Nop. You need to do two things, IMO: a) Send the email with an existing "from" address (a valid return address is needed in order to be able to bounce or return the email if there is a problem). You could use the same destination address in the from. b) Configure postfix so that it authenticates to the remote server using your ISP login/pass - provided they use that method. How to do a), I'm unsure. Perhaps deliver locally and use a forward rule, perhaps using procmail and formail to change the from. Maybe there is an easier way via postfix map files :-? Sandy will know that. - -- Cheers, Carlos E. R. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEARECAAYFAknaW5sACgkQtTMYHG2NR9Va2ACfXQUAQTVpwavUP5Cq+UVBDzm4 vucAn05zqXua0qeZxTqsKKMNBXBxsfVP =nW8A -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org