George Georgalis wrote:

> 
> Well since my MTA doesn't have an IP put in the header (it gets
> mail from stdin -- and SA runs from stdin forwarding the exit code
> to the MTA which then accept or rejects to the remote relay), I
> think I'll have to settle with incomplete functionality.

Your MTA doesn't need to put it's IP in the received: header. Most MTA's don't.
Mine doesn't. The insertion can be a hostname as long as that's resolvable via 
DNS.

Looking at this, your MTA is inserting a perfectly usable Received header:

2005-09-07 13:49:10.986551500 debug: received-header: parsed as [
ip=83.x2.166.71 rdns=eac71.neoplus.adsl.tpnet.pl
helo=eac71.neoplus.adsl.tpnet.pl by=sta.galis.org ident= envfrom= intl=0 id= 
auth= ]

But whatever sta.galis.org resolves to isn't trusted, that's the problem.

Put the IP that your spamassassin box will get if it does a DNS lookup of
"sta.galis.org" into your trusted_networks.

i.e: I resolve sta.galis.org as 66.250.170.210, so I'd put 66.250.170.210/32 in
my trusted networks.

Fix that, as I told you before, and quit worrying about stdin.


> 
> Shouldn't the default be, if nothing is trusted, test the first
> relay?

No, because that's not safe.

If there's no trusted Received: headers, SA cannot make any safe assumptions
about what IPs are or are not a part of your network.

At a very fundamental level it is complete garbage input. There MUST be a
Received: header that can be trusted. If there are none, the message shouldn't
be there.
r.

Reply via email to