On Fri, Jun 26, 2015, at 01:23 PM, RW wrote:
> They shouldn't be trusted unless there is a chain of trust. They don't
> matter anyway since they are from the original relay before the email
> was forwarded.

I thought that 'chain of trust' was established by their inclusion in the 
internal_networks/trusted_networks.  Apparently not ...

What's the correct means/place to establish that chain of trust?

If they "don't matter anyway" since they're from prior hop, should they not be 
ignored, rather than parsed & identified as untrusted?
  
> >     internal_networks  127.0.0.0/8 192.168.1.100/24
> > 192.168.2.100/24 X.X.X.142/32 X.X.X.143/32
> > trusted_networks               192.168.1.100/24 192.168.2.100/24
> > X.X.X.142/32 X.X.X.143/32 66.111.4.0/24 82.221.106.240/29
> 
> >     X-Spam-Relays-Untrusted:
> >             [ ip=66.111.4.29 rdns=out5-smtp.messagingengine.com
> >                     helo=out5-smtp.messagingengine.com

> What's actually odd here is that 66.111.4.29 is in 66.111.4.0/24 and so
> should be trusted.

Well, now, that's a good point.  I hadn't yet looked past the other problem ...

Reply via email to