On 01.12.21 11:25, Matus UHLAR - fantomas wrote:
hoping that adding sending IP Address to X-Originating-IP: header will help
me fight against spam posted via webmail it seems I caused more problems
than it was supposed to solve.

mail sent from external IP 192.0.2.1 via webmail on 192.168.0.10, then pushed
to SMTP server 192.168.0.10 (authenticated).

this line is configured in (debian system):

/etc/roundcube/plugins/additional_message_headers/config.inc.php

$config['additional_message_headers']['X-Originating-IP'] = '[' . 
$_SERVER['REMOTE_ADDR'] .']';

I see that adding mailserver local IP (192.168.0.10) to msa_networks will
hide the remote IP if the local IP is trusted/internal.


results
- ALL_TRUSTED doesn't fire because 192.0.2.1 in X-Originating-IP

- HELO_NO_DOMAIN fires
- RDNS_NONE fires
- both because X-Originating-IP contains no helo/DNS data.

any idea what could I do here, besides disabling X-Originating-IP
generation?

so fat I have idea of putting dummy host/helo name into received header
either in X-Originating-IP or in spamassassin, so the:


X-Originating-IP: [192.0.2.1]

Dec  1 13:24:15.044 [10589] dbg: received-header: parsed as [ ip=192.0.2.1 
rdns= helo= by= ident= envfrom= intl=0 id= auth= msa=0 ]

would change to something like

X-Originating-IP: example.com(example.com[192.0.2.1])

Dec  1 13:24:15.044 [10589] dbg: received-header: parsed as [ ip=192.0.2.1 
rdns=example.com helo=example.com by= ident= envfrom= intl=0 id= auth= msa=0 ]


can I to this in the PHP script above?

I tried to read the SA sources but I'm not that deeply into perl/SA to
understand if that is possible.

my blind attempts failed so far.

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety. -- Benjamin Franklin, 1759

Reply via email to