Am 28.02.2015 um 16:53 schrieb Ian Zimmerman:
On Sat, 28 Feb 2015 13:37:29 +0100, Mark Martinec <mark.martinec...@ijs.si> wrote:Ian> trusted_networks 198.1.2.3/32 Ian> [...lots snipped...] Ian> whitelist_from_rcvd *@wetransfer.com *.wetransfer.com Mark> It seems the: Mark> Received: (from itz@localhost) Mark> by myalias.trusted.mx (8.14.4/8.14.4/Submit) id t1N7YK8O020727 Mark> for i...@my.post.office; Sun, 22 Feb 2015 23:34:20 -0800 Mark> is breaking a trust chain. It shouldn't. I forgot to add that all of the following resolve to 198.1.2.3: my.domain my.trusted.mx myalias.trusted.mx
not true: Received: from myalias.trusted.mx (localhost [127.0.0.1]) 127.0.0.1 != 198.1.2.3and *what are* all that Received: hops and where is SA running in that chain? SpamAssassin should always be the first hop receiving messages from the WAN
signature.asc
Description: OpenPGP digital signature