0 Members and 1 Guest are viewing this topic.
Note: this scheme does not authenticate the user, and therefore it can be bypassed in several ways:By sending mail via a less restrictive mail relay host.By sending mail as someone else who does have permission to send mail to off-site destinations.