On Tue, October 4, 2011 20:59, Frank Leonhardt wrote:
> On 04/10/2011 19:22, Kris Deugau wrote:
>> Frank Leonhardt wrote:
>>> Here's the problem:
>>>
>>> I have a single mail server (not commercial) using sendmail to accept
>>> incoming mail from all sources, and filtering using spamassassin. It
>>> also accepts mail from roaming users - encrypted mail using port 465
>>> and
>>> authenticating users with SASL, and is expected to relay this. It all
>>> works fine except that the trusted mail goes through the milter like
>>> any
>>> other, and if it's coming from a dodgy location there's a danger that
>>> SA
>>> will block it. (This happens - sent from a WiFi hotspot, non-static DSL
>>> or mobile network that's been blacklisted everywhere).
>>>
>>> Is there an easy way I can treat trusted mail differently?
>>
>> Configure whatever actually calls SA to not do so on authenticated mail.
>>
>> This is possible with MIMEDefang, may be possible with amavis.  I
>> can't say about other milters - you don't say how you're calling SA
>> from sendmail.
>>
>> FWIW, this general answer applies no matter where in the mail chain
>> you're calling SA - if you don't want it scanned, configure whatever
>> calls SA to skip the call on whatever conditions you want.  Whether
>> you *can* actually configure <x> to do this is another matter.
>>
>
> Thanks Kris, Kelson and Noel - pretty unanimous answer - just don't call
> the milter for stuff on 465! Unfortunately I don't know how to achieve
> this, but I'll go off and do some research now I know what I'm trying to
> find.
>

I use a version of spamass-milter, 0.3.2.

It has the following option:

 -I: skip (ignore) checks if sender is authenticated


Reply via email to