On Thu, Feb 26, 2015 at 10:01:37AM -0800, Don Armstrong wrote: > But is msvc245.server.lan under your control? If so, the received > headers that spamass-milter adds will be ignored, and this will be the > last one. To really know, though, I'd have to see the full headers, and > ideally the spam report that SA did, which would have the actual header > spamass-milter submitted.
i am very sorry, i just tried to reproduce the behavior and failed to; deeper analysis showed that i had just during testing failed to re-enable the trusted_networks setting again, which led to the test input i ran to reproduce it to be correctly flagged. (sending webmail from a dial-up machine was time consuming during debugging). after all, the original problem was indeed solved with the `milter_connect_macros` line from README.Debian.gz i mentioned in the original report, just my testing method was already flawed by the time i had that right. sorry for having bothered you, closing the bug. chrysn
signature.asc
Description: Digital signature