On Tue, Nov 02, 2004 at 03:40:02PM +0000, Sean Doherty wrote:
>On Tue, 2004-11-02 at 15:16, George Georgalis wrote:
>
>> >> The setup I use routes mail at the tcp level, it's basically impossible
>> >> for a message to reach spam assassin if it's from a trusted network.
>
>> >So why not set trusted_networks to 127.0.0.1. That way you can
>> >be certain that the rule will never fire. You'll also get the
>> >benefit of the DNS blocklists been checked for the addresses in
>> >the Received headers - with your current setup, its possible 
>> >that some of these will be marked as trusted, and as such you'll
>> >lose the benefit of the RBL check.
>> 
>> There is lots of reasons not to do something. What I'm not seeing
>> is a reason why I can't stop trusted_networks from using cpu/dns.
>
>> your idea sounds okay for some applications (and I'm changing from
>> 192.168 to 127.0.0.1 as a matter of course), but I don't want every
>> address in headers looked up. I don't want any of them looked up.
>> I hope it's okay for me to be that way.
>> 
>> I am concerned about the IP a message is coming from, but in my setup,
>> that is dealt with before SA ever sees the message.
>
>You can stop dns lookups by setting "dns_available no" which 
>results in the following if trusted_networks is unset.
>
>debug: received-header: cannot use DNS, do not trust any hosts from here
>on
>
>However, this also disables SURBLs - which you probably still want!
>I don't think its possible to disable DNS lookups for trusted networks
>without also disabling it for the SURBLs.

Thanks, indeed I do use SURBLs. and am quite pleased with those!

// George


-- 
George Georgalis, systems architect, administrator Linux BSD IXOYE
http://galis.org/george/ cell:646-331-2027 mailto:[EMAIL PROTECTED]

Reply via email to