Hi,

> For clarity: assuming your MTA inserts a Return-Path: header, or adds a
> clause to the Received header about the envelope sender, whitelist_from_rcvd
> will match against it, in addition to the From: header, and several other
> "from-like" headers. (however Resent-From should take priority if present..)

I ran a different message (don't have the original any longer), and it
showed only loopback as the trusted network:

[18656] dbg: received-header: parsed as [ ip=127.0.0.1
rdns=localhost.localdomain helo=localhost by=localhost ident= envfrom=
intl=0 id=5161B400002 auth= msa=0 ]
[18656] dbg: received-header: relay 127.0.0.1 trusted? yes internal? yes msa? no
[18656] dbg: received-header: parsed as [ ip=127.0.0.1 rdns=
helo=smtp01.example.com by=localhost ident= envfrom= intl=0
id=09005-449 auth= msa=0 ]
[18656] dbg: received-header: relay 127.0.0.1 trusted? yes internal? yes msa? no

What am I missing? Shouldn't there be an "ip=" entry for
smtp01.example.com? I have trusted_networks defined in local.cf, and
it includes the smtp01.example.com server.

Thanks,
Alex

Reply via email to