W dniu 2015-05-05 o 22:07, Benny Pedersen pisze:
> Marcin Mirosław skrev den 2015-05-05 21:21:
> 
>>>> My goal is to configure SA to not check IP of client (in this example
>>>> 31.61.129.221).
>>>
>>> Can you elaborate about what's going on here? What do the two hand-overs
>>> represent? What do you mean by "real MTA"?
>>
>> Thanks for both answers. I'll try to describe it using ascii art:
>> ------------------------------            --------------------------
>> |random user sending email   |sends email |89.161.182.208 from this |
>> |(in my case: 31.61.129.221) |----------->|MTA I'm getting email    |
>> ------------------------------            --------------------------
>>
>>     --------------------------
>> --->|my MTA -poczta.cibet.pl |
>>     --------------------------
>>
>>
>> So it's not important for my if address 31.61.129.221 is on any rbl
>> because I'm not getting email directly from this ip. It's important for
>> me if server 89.161.182.208 (which directly connects to my mta) is in
>> any RBL. I'd like SA to check only ip which diectly connects to my
>> server against RBL.
> 
> please show the problem in spamassassin
> 
> are 31.61.129.221 a smtp auth user ?, in this case you should NOT add
> this ip to trusted_networks since the client ip would be your server ip
> in spamassassin

In 99% yes. Header with ip 31.61.129.221 was added by external MTA so I
can't trust in 100%.

> spamassassin -D -t sample-msg-file 2>&1 | less
> 
> in less press s to save test results, post this results headers so we
> can help solve it, what mta are you using ?, and how is spamassassin
> used in mta ?

In my first email I sended report from SA. Now 31.61.129.221 isn't
listed by Spamhaus SBL-CSS, I suspect that pasting another report from
SA would makes more problem.
I'm thinking how to describe my problem in different way...






Reply via email to