EASY steve.h...@digitalcertainty.co.uk a écrit :
> On Fri, 2009-06-12 at 12:51 +0200, Magnus Bäck wrote:
>> On Fri, June 12, 2009 12:12 pm, Steve said:
>>
>>> Is this right?
>>>
>>> "You cannot whitelist a sender or client in an access list to bypass
>>> header or body checks.  Header and body checks take place whether you
>>> explicitly "OK" a client or sender, in access lists, or not."
>> Yes, that's correct.
>>
> Is there any kind of feature request to change this behaviour? Such as
> allowing a map list of client ip's or ranges that can 'hop over' the
> header/body checks all together?
> 

well, the hard part is to come up with a design that is
generic/flexible/... it is possible that different people/sites want
different things. if this is true, then "the thing" is better
implemented via proxy_filter or milters.

of course, if you have a good design in mind, please share it. the
problem here is to chose between a simple design (such as a "table
driven checks") and a complete design (if/then/else/for/while ...
grammar). if it's too complex, I 'd prefer to run a series of programs.


> If I forward a spam mail to an abuse department quoting full headers
> (even in the body of the mail) they seem to 'catch' on header rules.


by default:

mime_header_checks = $header_checks
nested_header_checks = $header_checks

so header_checks apply to more than 822 headers.

> I'm
> not sure if this is a bug/'feature' - but to have to keep commenting out
> certain rules to get them sent is a minor hassle.

I personally only use few header_checks (reject "forged" mail, reject
unauthorized attachments).

Reply via email to