Am 26.08.2014 um 18:11 schrieb Axb:
> On 08/26/2014 05:42 PM, Reindl Harald wrote:
>> they are *not* i sepecially added the following lines
>> to prevent the automatic adding to "trusted_networks"
>> since the IP range is outside
>>
>> clear_trusted_networks
>> trusted_networks 192.168.168.0/24
>>
>> there was no trust at all in the headers and no
>> hint why the DNSWL was skipped at all
>>
>> ADVANCE_FEE_4_NEW
>> ADVANCE_FEE_4_NEW_MONEY
>> ADVANCE_FEE_5_NEW
>> ADVANCE_FEE_5_NEW_MONEY
>> BAYES_99
>> BAYES_999
>> DEAR_SOMETHING
>> DKIM_ADSP_CUSTOM_MED
>> FREEMAIL_FROM
>> LOTS_OF_MONEY
>> SPF_SOFTFAIL
>> T_MONEY_PERCENT
>> URG_BIZ
> 
> comment out
> 
> #tflags   RCVD_IN_RP_TLDNS1 net
> 
> run that msg against spamassassin -D dns
> see what it spits out

sorry, no idea what you mean with "run that message against"

spamassassin is running spamd and spamass-milter and no way
to get the message passed over SMTP to that box with
another configuration

fact is that the message has no "ALL_TRUSTED" in the headers
and it makes little sense that DNSWL lists are skipped only
because the client is in the same network range because
that makes behavior hard to test and compare

that's (partly) how are the processes started
/usr/bin/spamd -c -H --max-children=25 --min-children=10 --min-spare=5 
--max-spare=15 --port=10027
/usr/sbin/spamass-milter -p /run/spamass-milter/spamass-milter.sock -g sa-milt 
-r 10 -- -s 1048576 --port=10027

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to