On Thu, Feb 26, 2015 at 10:01:37AM -0800, Don Armstrong wrote:
> But is msvc245.server.lan under your control? If so, the received
> headers that spamass-milter adds will be ignored, and this will be the
> last one. To really know, though, I'd have to see the full headers, and
> ideally the spam report that SA did, which would have the actual header
> spamass-milter submitted.

i am very sorry, i just tried to reproduce the behavior and failed to;
deeper analysis showed that i had just during testing failed to
re-enable the trusted_networks setting again, which led to the test
input i ran to reproduce it to be correctly flagged. (sending webmail
from a dial-up machine was time consuming during debugging).

after all, the original problem was indeed solved with the
`milter_connect_macros` line from README.Debian.gz i mentioned in the
original report, just my testing method was already flawed by the time i
had that right.

sorry for having bothered you, closing the bug.
chrysn

Attachment: signature.asc
Description: Digital signature

Reply via email to