https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6681

--- Comment #33 from Mark Martinec <[email protected]> ---
> netset: cannot include 127.0.0.0/8 as it has already been included

This one is just an (unnecessary) warning.
Loopback addresses are already in both lists (internal and trusted).

> netset: illegal network address given: '[::1]/128'
> netset: illegal network address given: '[fc00:10:137:242::]/64'

Square brackets were not yet allowed in SpamAssassin 3.3,
and are stripped off in 3.4 (trunk) before passing to NetAddr.
No need to use them here, square brackets around IPv6 address
are only needed where an address is combined with a port number.

> netset: illegal network address given: '[fe80::%eth0]/64'

Scoped address (...%eth0) is currently not useful and I believe
it is not recognized by NetAddr::IP. The reason is that the
information about a peer address coming from a socket
does not currently carry scope information, so something
like %eth0 at the end of an address never reaches an application.
For the time being just use non-scoped fe80::/10 .

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to