On 01.12.21 11:25, Matus UHLAR - fantomas wrote:
hoping that adding sending IP Address to X-Originating-IP: header will help
me fight against spam posted via webmail it seems I caused more problems
than it was supposed to solve.
mail sent from external IP 192.0.2.1 via webmail on 192.168.0.10, then pushed
to SMTP server 192.168.0.10 (authenticated).
On 2021-12-01 at 07:01:40 UTC-0500 (Wed, 1 Dec 2021 13:01:40 +0100) Matus
UHLAR - fantomas <uh...@fantomas.sk> is rumored to have said:
yes, I said that ;-)
this line is configured in (debian system):
/etc/roundcube/plugins/additional_message_headers/config.inc.php
$config['additional_message_headers']['X-Originating-IP'] = '[' .
$_SERVER['REMOTE_ADDR'] .']';
I see that adding mailserver local IP (192.168.0.10) to msa_networks will
hide the remote IP if the local IP is trusted/internal.
On 03.12.21 15:25, Bill Cole wrote:
That's why the *_networks config parameters exist: so that it is possible
for SA to figure out which which recorded transit hop to both trust as
accurately recorded and to interpret as a transfer from a potentially
hostile sender.
Is there some reason you would not want 192.168.0.10 in msa_networks?
I was hoping that the client IP gets looked up in blacklists, but I haven't
expected HELO and RDNS rules to fire.
--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
(R)etry, (A)bort, (C)ancer