Hi!
I'm ashamed to ask because this problem is like boomerang but still
can't find solution. I'm reading e.g.:
http://spamassassin.1065346.n5.nabble.com/How-to-ignore-multiple-Received-headers-td52450.html

I set trusted_networks but I can't see how can it helps (and it doesn't
work as I wish). I'm using Exim and I'm connecting to spamd to check
mail status. Headers of problematic email are:

Delivery-date: Tue, 05 May 2015 08:22:49 +0200
Received: from v034244.home.net.pl ([89.161.182.208])
        by poczta.cibet.pl with smtp (Exim 4.84)
        (envelope-from <xxxx...@yyyyyyy.pl>)
        id 1YpWFk-0001BY-EC
        for spamt...@cibet.pl; Tue, 05 May 2015 08:22:49 +0200
Received: from public-gprs514716.centertel.pl (31.61.129.221) (HELO Toszzzz)
 by yyyyyyy.home.pl (89.161.182.208) with SMTP (IdeaSmtpServer v0.80)
 id ea61105d60d70d9d; Tue, 5 May 2015 08:22:44 +0200

and SA report for this:
X-Spam-Report: X-Spam-ASN:                      AS12824 89.161.128.0/17
 X-Szczegoly:(mohikanin.in.cibet.pl)(6.9 points)
  pts rule name              description
 ---- ---------------------- ---------------------------------------------
  0.8 RCVD_IN_SORBS_WEB      RBL: SORBS: nadawca posiada nadu<BF>ywany
serwer WWW
                             [31.61.129.221 listed in dnsbl.sorbs.net]
 -1.9 BAYES_00               BODY: Bayesowskie prawdopodobie<F1>stwo
spamu wynosi 0 do 1%
                             [score: 0.0011]
  2.1 HTML_IMAGE_ONLY_12     BODY: HTML: grafika i 1000-1200 bajt<F3>w
s<B3><F3>w
  0.0 HTML_MESSAGE           BODY: Wiadomo<B6><E6> zawiera kod HTML
  3.3 RCVD_IN_SBL_CSS        RBL: Received via a relay in Spamhaus SBL-CSS
                             [31.61.129.221 listed in zen.spamhaus.org]
  0.0 HTML_SHORT_LINK_IMG_2  HTML is very short with a linked image
  1.0 KAM_HTMLNOISE          Spam containing useless HTML padding
  0.0 LR_RCVD_NOT_IN_IPREPDNS Sender not listed at
                             http://www.chaosreigns.com/iprep/
  0.6 LR_SHORT               Has URI and short body
  1.0 KAM_LAZY_DOMAIN_SECURITY Sending domain does not have any
                             anti-forgery methods
  0.0 T_REMOTE_IMAGE         Message contains an external image


My goal is to configure SA to not check IP of client (in this example
31.61.129.221).
I'm reading https://wiki.apache.org/spamassassin/TrustPath ,
_RELAYSUNTRUSTED_ gives: X-RelaysUntrusted [ ip=89.161.182.208
rdns=v034244.home.net.pl helo=v034244.home.net.pl by=poczta.cibet.pl
ident= envfrom=x...@yyyyy.pl intl=0 id=1YpWFk-0001BY-EC auth= msa=0 ] [
ip=31.61.129.221 rdns=public-gprs514716.centertel.pl
helo=public-gprs514716.centertel.pl by=hosttelekom.home.pl ident=
envfrom= intl=0 id=ea61105d60d70d9d auth= msa=0 ]

but still can find what configuration would give me needed behavior.
Thanks for advices.
Marcin

Reply via email to