Hi Aaron,
I know in our setup we just give trusted_networks a score of -120, that
way it usually doesn't matter if they kick off any PBL's etc on their
initial hop.
Regards
Eddie Hallahan
Enterprise Management Consulting
www.emcuk.com
Enterprise Management Consulting is a company registered in England and Wales
with company number 3134554. VAT registration number is 681038440.
Aaron Bennett wrote:
Hi,
I've got an issue where users off-campus who are doing authenticated SMTP/TLS
from home networks are having their mail hit by the PBL. I have
trusted_networks set to include the incoming relay, but still the PBL hits
it as follows:
Received: from cmail.clarku.edu (muse.clarku.edu [140.232.1.151])
by mothra.clarku.edu (Postfix) with ESMTP id D4FC2684FEA
for re...@clarku.edu; Tue, 7 Dec 2010 00:11:24 -0500 (EST)
Received: from SENDERMACHINE (macaddress.hsd1.ma.comcast.net
[98.216.185.77])
by cmail.clarku.edu (Postfix) with ESMTP id 82F21901E48
for re...@clarku.edu; Tue, 7 Dec 2010 00:11:24 -0500 (EST)
From: USER NAME sen...@clarku.edu
Despite that internal_networks and trusted_networks are set to
140.232.0.0/16, the message still triggers the PBL rule. Given that I know
that (unless there's a trojaned machine or whatever) I must trust email that
comes in over authenticated SMTP/TLS through the 'cmail' host, how can I
prevent it from hitting the PBL?
Thanks,
Aaron
---
Aaron Bennett
Manager of Systems Administration
Clark University ITS