On Mon, 2008-11-24 at 18:17 +0200, Henrik Krohns wrote:
> On Mon, Nov 24, 2008 at 04:54:17PM +0100, Karsten Bräckelmann wrote:

> > So I set it up like I understand the docs (man page and wiki). My own
> > server, which I got full control of, is internal, the forwarders are
> > trusted (which I do).
> >
> > This however doesn't cut it when looking at the debug logs. We are using
> > lastexternal for Spamhaus Zen -- which nicely checks if the GNOME or ASF
> > forwarders might be listed in PBL... This doesn't seem right.
> >
> > Why do we use lastexternal here? Shouldn't it be like lastuntrusted or
> > something?
> 
> No, try reading through:
> 
> https://issues.apache.org/SpamAssassin/show_bug.cgi?id=5856

A, right -- I recall I have seen a bug about it somewhere. Will have a
look at that later, thanks.

> And probably some others.. mailing lists are pretty full of it too.. maybe
> one day it will be clear. ;)
> 
> If you don't want GNOME or ASF to be checked in RBLs, then you need to add
> them to trusted_networks so they won't be checked. Which doesn't even
> currently work right without my patch (inside the bug above).
> 
> If you want to check in RBLs the host (zombie/dynamic user?) that relays
> through GNOME or ASF, then you could add these to internal_networks. The
> "internal" is a bit misleading. To me it includes something like "trusted
> third party MXs that may relay mail from zombies to you".

Isn't that the very definition of trusted_networks rather than internal?
"Will not originate spam, but might relay it." According to all docs at
least...

I knew this would be confusing. And now I am.


-- 
char *t="[EMAIL PROTECTED]";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to