Am 26.08.2014 um 21:08 schrieb Martin Gregorie:
> On Tue, 2014-08-26 at 20:08 +0200, Reindl Harald wrote:
>> Am 26.08.2014 um 18:11 schrieb Axb:
>>> On 08/26/2014 05:42 PM, Reindl Harald wrote:
>>>> they are *not* i sepecially added the following lines
>>>> to prevent the automatic adding to "trusted_networks"
>>>> since the IP range is outside
>>>>
>>>> clear_trusted_networks
>>>> trusted_networks 192.168.168.0/24
>>>>
>>>> there was no trust at all in the headers and no
>>>> hint why the DNSWL was skipped at all
>>>
>>> comment out
>>>
>>> #tflags   RCVD_IN_RP_TLDNS1 net
>>>
>>> run that msg against spamassassin -D dns
>>> see what it spits out
>>
>> sorry, no idea what you mean with "run that message against"
>>
> Under the same directory as spamass-milter run:
> 
> spamc -your_normal_spamc_options <message_to_be_tested

are we really talking about the same?
that won't involve the network

* the rule works
* it is skipped from client IP 192.168.196.6 while SA runs in 192.168.196.19
* it is not skipped if the client comes from 62.178.103.85 outside the own 
network
* "192.168.196.0/24" is not defined as trusted because to avoid that the only
  trusted configuration is the non-existing/involved "192.168.168.0/24"

clear_trusted_networks
trusted_networks 192.168.168.0/24
______________________________________________________

the question was how to tell SA not skip any RBL rule in no case
to make it easier test implementations when client and SA server
are on the same network

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to