summaryrefslogtreecommitdiff
path: root/Mailman/MailCommandHandler.py
diff options
context:
space:
mode:
authorbwarsaw2000-06-23 07:47:39 +0000
committerbwarsaw2000-06-23 07:47:39 +0000
commitef28350d0373f77c66d6f5bf60cf2db6ac66ebeb (patch)
tree0b4a8a117cb65909215c1575005e66868655164b /Mailman/MailCommandHandler.py
parent1849822f70644ce6d79806679a1308a34be12948 (diff)
downloadmailman-ef28350d0373f77c66d6f5bf60cf2db6ac66ebeb.tar.gz
mailman-ef28350d0373f77c66d6f5bf60cf2db6ac66ebeb.tar.zst
mailman-ef28350d0373f77c66d6f5bf60cf2db6ac66ebeb.zip
dispose_message(): If the sender of the message comes from
LIKELY_BOUNCE_SENDERS, then this message is probably bounced from a bogus admin address. Catch and stop the loop by not attempting delivery again. Fixes PR#285, BUG#106592
Diffstat (limited to 'Mailman/MailCommandHandler.py')
0 files changed, 0 insertions, 0 deletions