Hi, > For clarity: assuming your MTA inserts a Return-Path: header, or adds a > clause to the Received header about the envelope sender, whitelist_from_rcvd > will match against it, in addition to the From: header, and several other > "from-like" headers. (however Resent-From should take priority if present..)
I ran a different message (don't have the original any longer), and it showed only loopback as the trusted network: [18656] dbg: received-header: parsed as [ ip=127.0.0.1 rdns=localhost.localdomain helo=localhost by=localhost ident= envfrom= intl=0 id=5161B400002 auth= msa=0 ] [18656] dbg: received-header: relay 127.0.0.1 trusted? yes internal? yes msa? no [18656] dbg: received-header: parsed as [ ip=127.0.0.1 rdns= helo=smtp01.example.com by=localhost ident= envfrom= intl=0 id=09005-449 auth= msa=0 ] [18656] dbg: received-header: relay 127.0.0.1 trusted? yes internal? yes msa? no What am I missing? Shouldn't there be an "ip=" entry for smtp01.example.com? I have trusted_networks defined in local.cf, and it includes the smtp01.example.com server. Thanks, Alex
