On Mon, Nov 24, 2008 at 05:32:55PM +0100, Karsten Bräckelmann wrote: > > > > If you want to check in RBLs the host (zombie/dynamic user?) that relays > > through GNOME or ASF, then you could add these to internal_networks. The > > "internal" is a bit misleading. To me it includes something like "trusted > > third party MXs that may relay mail from zombies to you". > > Isn't that the very definition of trusted_networks rather than internal? > "Will not originate spam, but might relay it." According to all docs at > least... > > I knew this would be confusing. And now I am.
You could look at it this way also: internal_networks are always included in trusted_networks.. so the clause applies to both. The main thing lacking is documentation. Somewhere should be a clear list of checks with the respective border (trusted/external) they are checked upon. But first all developers should agree what all should be these used for. For example I use trusted_networks heavily for whitelisting.
