Matt Kettler wrote:
> Eric W. Bates wrote:
> 
>>I recently upgraded from 2.63 to 3.1 and having done so, my entries for
>>trusted_networks no longer seem to functional.
>>
>>I have way to many trusted network lines, but in particular I know that:
>>
>>trusted_networks    68.64/13
>>
>>is no longer working because:
>>
>>Content analysis details:   (5.9 points, 5.0 required)
>>
>> pts rule name              description
>>---- ----------------------
>>--------------------------------------------------
>>-0.0 SPF_PASS               SPF: sender matches SPF record
>> 2.0 RCVD_IN_SORBS_DUL      RBL: SORBS: sent directly from dynamic IP
>>address
>>                            [68.64.105.61 listed in dnsbl.sorbs.net]
>> 2.2 RCVD_IN_WHOIS_INVALID  RBL: CompleteWhois: sender on invalid IP block
>>            [68.64.105.61 listed in
>>combined-HIB.dnsiplists.completewhois.com]
>> 1.7 RCVD_IN_NJABL_DUL      RBL: NJABL: dialup sender did non-local SMTP
>>                            [68.64.105.61 listed in combined.njabl.org]
>>
>>
>>As you know, 68.64.105.61 falls within 68.64.0.0/13; so none of these
>>rules should have hit, correct?
> 
> 
> Maybe.. Were there any untrusted hosts in-between 68.64.105.61 and your 
> network
> in the Received: headers?

No.  But even if there were, wouldn't the rule fire on the offensive IP
rather than the one listed as 'trusted'?

> Trust isn't just by IP.. it's a path. SA works backwards through the received:
> headers. Once it sees a host that isn't trusted, all the other received 
> headers
> can't be trusted or internal because that one untrusted host could have forged
> the extra Received: headers.
> 
> 

Reply via email to