On Mon, 2008-11-24 at 18:17 +0200, Henrik Krohns wrote: > On Mon, Nov 24, 2008 at 04:54:17PM +0100, Karsten Bräckelmann wrote:
> > So I set it up like I understand the docs (man page and wiki). My own > > server, which I got full control of, is internal, the forwarders are > > trusted (which I do). > > > > This however doesn't cut it when looking at the debug logs. We are using > > lastexternal for Spamhaus Zen -- which nicely checks if the GNOME or ASF > > forwarders might be listed in PBL... This doesn't seem right. > > > > Why do we use lastexternal here? Shouldn't it be like lastuntrusted or > > something? > > No, try reading through: > > https://issues.apache.org/SpamAssassin/show_bug.cgi?id=5856 A, right -- I recall I have seen a bug about it somewhere. Will have a look at that later, thanks. > And probably some others.. mailing lists are pretty full of it too.. maybe > one day it will be clear. ;) > > If you don't want GNOME or ASF to be checked in RBLs, then you need to add > them to trusted_networks so they won't be checked. Which doesn't even > currently work right without my patch (inside the bug above). > > If you want to check in RBLs the host (zombie/dynamic user?) that relays > through GNOME or ASF, then you could add these to internal_networks. The > "internal" is a bit misleading. To me it includes something like "trusted > third party MXs that may relay mail from zombies to you". Isn't that the very definition of trusted_networks rather than internal? "Will not originate spam, but might relay it." According to all docs at least... I knew this would be confusing. And now I am. -- char *t="[EMAIL PROTECTED]"; main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1: (c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}
