I can scarcely believe this, so I'm posing this concept to the list in the hopes that someone can tell me if I'm overlooking something, but it would appear that if you merely take the default postfix config as presented by SuSE, you will be operating an open relay on all interfaces. If you're like most people, you would have your email server sitting behind a firewall, and this would be fine. However, if your email server *is* your firewall, the SMTP port is going to be open to your internet connection, otherwise you're not going to receive mail. So the default SuSE config will allow anyone on your local broadband subnet to relay mail through your server. Since spammers love throw-away shared broadband connections, this is going to be a problem. The #1 thing that postfix needs as a configuration parameter with respect to relaying email is ``mynetworks''. To wit: http://www.postfix.org/basic.html#relaying The problem is that SuSE's /etc/sysconfig/postfix doesn't have the ``mynetworks'' parameter. This leaves postfix open to relay mail on _any_ interface. You can fix this by adding something _like_ this to your /etc/sysconfig/postfix file: POSTFIX_ADD_MYNETWORKS="192.168.0.0/24, 127.0.0.1/32" This will restrict access to relaying email to your local machine and your local network behind the firewall. Just FYI, dk