besides that the setup is now in production

Am 27.08.2014 um 03:48 schrieb Karsten Bräckelmann:
> Again: Craft your samples to match real-life (production) environment.
> Do not configure or try to fake an environment that will not match
> production later. It won't work.
> 
> You want to configure SA. So configure SA. Correctly.

finally yes, not at development and testing

that is what testing is for:

* no access from outside
* try to set trust on single IP's lacking different ranges

> If you insist on not following that advice, please refrain from further
> postings to this list.

the simple answer to my question would have been "no, in no case SA does
any RBL check if the client is from the same network range and there is
no way to change that temporary even for development" instead start
debug sessions with CLI tools while i already statet that i found
out the RBL's are check if the connection comes from a foreign network

that behavior still is a bug, not in production but it is a bug

if there is no hop before and hence no received headers before
there is still a known IP - the one and only and in that case
the currently connection client - there is no reason not fire
a DNSBL/DNSWL against that IP

>> the intention to berak it was to behave like it is external
>> and just check the RBL behavior
> 
> Read my previous post again, carefully. If you define everything to be
> external, there is no *last* external SA can trust.

if there is only *one* received header it's from the MTA
on which SA is running

>> well, there will never be internal relays, just a inbound-only MX
> 
> That IS an internal relay. Your MX must be in your internal_networks,
> and it is by the very definition of MX an SMTP relay.

the machine SA is running on *is the MX itself*

> Besides: SA is not an SMTP. It does not add the Received header. And it
> absolutely has to inspect headers, whether you like that or not. That is
> how SA determines exactly that last, trustworthy, "physical" IP. And for
> that, trusted and internal networks need be correct, so by extension
> external networks also are correct.

and the machine SA is running on receiving the message adds that
header which is in case of direct testing the one and only and
so trustable

> In particular, your MX, your first internal relay, absolutely MUST be
> trusted by SA. That is the SMTP relay identifying the sending host,
> complete with IP and rDNS.

again: the machine running SA *is the MX*

> Received headers before that simply CANNOT be trusted. There is no way
> to guarantee the host they claim to have received the message from is
> legit

in case running postfix with SA as milter *there are no* Received
headers *before* because there is nobody before

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to