https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6681
--- Comment #33 from Mark Martinec <[email protected]> --- > netset: cannot include 127.0.0.0/8 as it has already been included This one is just an (unnecessary) warning. Loopback addresses are already in both lists (internal and trusted). > netset: illegal network address given: '[::1]/128' > netset: illegal network address given: '[fc00:10:137:242::]/64' Square brackets were not yet allowed in SpamAssassin 3.3, and are stripped off in 3.4 (trunk) before passing to NetAddr. No need to use them here, square brackets around IPv6 address are only needed where an address is combined with a port number. > netset: illegal network address given: '[fe80::%eth0]/64' Scoped address (...%eth0) is currently not useful and I believe it is not recognized by NetAddr::IP. The reason is that the information about a peer address coming from a socket does not currently carry scope information, so something like %eth0 at the end of an address never reaches an application. For the time being just use non-scoped fe80::/10 . -- You are receiving this mail because: You are the assignee for the bug.
