Jussi Hirvi wrote:
For real-world use, I guess the source files (in my case aliases, virtusertable) should be prepared first - the list will include unwanted users like "bin" or "mysql", mailing list name defined in virtusertable, and possibly other strange things too.
and what about the user accounts in /etc/passwd ?