Am 27.08.2014 um 02:24 schrieb Karsten Bräckelmann:
> On Wed, 2014-08-27 at 01:08 +0200, Reindl Harald wrote:
>> below the stdout/sterr of following script filtered for "dns"
>> so the lists are asked, but the question remains why that
>> don't happen from a IP in the same network
> 
> Nope, no RBL queries. See below.

yes, and that makes it hard to simulate things just
in the internal network by add/remove hosts to own
DNSBL/DNSWL lists

>> in the meantime there are a lot of "cust<count>-lastexternal"
>> generated from a web-interface including the 4 below and
>> the local network range is listed on them, hence why i
>> want them used unconidtionally and not only with foreign IP's
> 
> If it's internal, it's internal. There is a reason you are setting up
> lastexternal DNSxL rules.

the intention is to handle the internal IP like it would be external

> Do not invalidate SA *_networks configuration in an attempt to adjust it
> to poorly, non real-live generated samples. Generate a proper sample
> instead, either by actually sending mail from external IPs, or if need
> be by manually editing the MX Received header, forging an external
> source (do pay attention to detail).

it's about simulate behavior by develop admin backends and
intergate existing tools

> Besides, there is no point in whitelisting your own LAN IPs. Those
> should simply hit ALL_TRUSTED, or just not be filtered in the first
> place.

not finally but at development

>> /usr/bin/spamassassin -D  < /var/lib/spamass-milter/spam-example.eml
> 
>> [sa-milt@mail-gw:~]$ cat debug.txt | grep -i dns
> 
>> Aug 27 00:59:29.249 [30833] dbg: metadata: X-Spam-Relays-Untrusted: [ 
>> ip=10.0.0.19 rdns=mail-gw.thelounge.net
>> helo=mail-gw.thelounge.net by=mail.thelounge.net ident= envfrom= intl=0 
>> id=3hjPzJ6TWVz23 auth= msa=0 ] [
>> ip=10.0.0.6 rdns=arrakis.thelounge.net helo=arrakis.thelounge.net 
>> by=mail-gw.thelounge.net ident= envfrom= intl=0
>> id=3hjPzJ2tkPz1w auth= msa=0 ]
> 
> There is no X-Spam-Relays-Trusted metadata in your grep for "dns", which
> means there is absolutely no trusted relay. Given those relays are in
> the 10/8 class A network and you deliberately breaking trusted_networks
> in a previous post, that seems about right...

the intention to berak it was to behave like it is external
and just check the RBL behavior

>> Aug 27 00:59:29.249 [30833] dbg: metadata: X-Spam-Relays-External: [ 
>> ip=10.0.0.19 rdns=mail-gw.thelounge.net
>> helo=mail-gw.thelounge.net by=mail.thelounge.net ident= envfrom= intl=0 
>> id=3hjPzJ6TWVz23 auth= msa=0 ] [
>> ip=10.0.0.6 rdns=arrakis.thelounge.net helo=arrakis.thelounge.net 
>> by=mail-gw.thelounge.net ident= envfrom= intl=0
>> id=3hjPzJ2tkPz1w auth= msa=0 ]
> 
> Same issue with X-Spam-Relays-Internal not showing up in the grep, thus
> being completely empty. Unless you specified internal_networks manually,
> it is set to trusted_networks. Thus equally invalid.

for testing in the own network

>> Aug 27 00:59:29.254 [30833] dbg: dns: checking RBL bl.spameatingmonkey.net., 
>> set cust12-lastexternal
>> Aug 27 00:59:29.254 [30833] dbg: dns: checking RBL spam.dnsbl.sorbs.net., 
>> set cust15-lastexternal
>> Aug 27 00:59:29.254 [30833] dbg: dns: checking RBL psbl.surriel.com., set 
>> cust14-lastexternal
> 
> All those third-party RBLs with your "cust" sets are extremely fishy.

there is a web-interface to enbale/disbale them per click
and have them at the same time enabled for postscreen
weighting while adjust positive/negative scoring for
all enabled RBL's in the interface yet at development

> Anyway, there are no "dbg: dns: IPs found:" and "dbg: dns: launching"
> lines, so this clearly shows the RBLs are NOT queried.

that's my problem :-)

>> Aug 27 00:59:29.254 [30833] dbg: dns: checking RBL dnswl-low.thelounge.net., 
>> set cust16-lastexternal
> 
> No activity with your custom RBL either. But well, how would you expect
> SA to query *last* external, given you deliberately told SA there are no
> internal relays...

well, there will never be internal relays, just a inbound-only MX

> All external. No internal, no last external aka "hop before first
> internal" either.

i want that RBL checks in general only for the *phyiscal* IP
with no header inspections - 90% of inflow will be finally
filtered out by postcsreen anyways

> First of all, do read and understand the (trusted|internal)_networks
> options in the M::SA::Conf [1] docs, section Network Test Options.
> 
> Then remove the current bad *_networks options in your conf. If you
> don't fully understand those docs, keep it at that, default. If you do
> understand and see an actual need to manually set them, do so, but do so
> *correctly*.

the intention is no trust / untrust at all and handle any IP
with it's phyiscal connection

> Hints on gathering relevant information from the debug output:
> 
> Don't just grep for generic "dns", but check specifics by grepping for
> X-Spam-Relays and (trusted|internal)_networks. Better yet, don't grep
> but search the debug output interactively, and read nearby / related
> info.
> 
> While debugging, actually reading, searching for terms or at least
> glimpsing the entire debug output is good advice anyway.
> 
> 
> [1] http://spamassassin.apache.org/doc/Mail_SpamAssassin_Conf.html

thanks!

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to