On Mon, Nov 24, 2008 at 05:32:55PM +0100, Karsten Bräckelmann wrote:
> > 
> > If you want to check in RBLs the host (zombie/dynamic user?) that relays
> > through GNOME or ASF, then you could add these to internal_networks. The
> > "internal" is a bit misleading. To me it includes something like "trusted
> > third party MXs that may relay mail from zombies to you".
> 
> Isn't that the very definition of trusted_networks rather than internal?
> "Will not originate spam, but might relay it." According to all docs at
> least...
> 
> I knew this would be confusing. And now I am.

You could look at it this way also: internal_networks are always included in
trusted_networks.. so the clause applies to both. The main thing lacking is
documentation. Somewhere should be a clear list of checks with the
respective border (trusted/external) they are checked upon. But first all
developers should agree what all should be these used for. For example I use
trusted_networks heavily for whitelisting.

Reply via email to