0 Members and 2 Guests are viewing this topic.
Note: this scheme does not authenticate the user, and therefore it can be bypassed in several ways:By sending mail via a less restrictive mail relay host.By sending mail as someone else who does have permission to send mail to off-site destinations.