On Mon, 2004-11-01 at 18:24, Matt Kettler wrote:
> At 01:07 PM 11/1/2004, Sean Doherty wrote:
> > > so the *next* step must be the external MX.
> >
> >My 10.x server is inside a firewall which NATs port 25 so this
> >conclusion is not correct. I imagine that my setup isn't all
> >that different from a lot of other peoples.
> 
> Yes, it is incorrect, but SA can't know that. Thus, SA assumes, 
> incorrectly, that any 10.x host must not be externally addressable. It's 
> not a very good assumption in modern networks, but there's not much else 
> one can do.
> 
> SA's trust path code has pretty much always been incompatible with NAT'ed 
> mailservers. And it's hard for SA to autodetect such things from mail headers.

Obviously, there's no way to deduce that the mail path has come
through a NAT'ed firewall, and as such in certain situations
guessing the trusted_networks is not the correct thing to do.

I have always (incorrectly) been running SpamAssassin without
trusted_networks been set, which when running SA 2.64 resulted
in no DNSBL checks. Because I was running Bayes, SURBLs and
a bunch of custom rules I wasn't seeing FPs. 

However, after upgrading to 3.0 I suddenly started seeing much 
more FPs, which I could be attributed to ALL_TRUSTED. Setting 
trusted_networks appropriately has solved the problem, however, 
given that the inference algorithm doesn't deal well with NAT'ed
networks - which IMO is quite common for SMEs - there should be 
perhaps something in the debug output which informs the user 
that trusted_networks is not set and as such will be guessed.

Another option would be to either trust nobody, or not run
those tests that rely on knowing what the trusted networks are.

Regards,
                - Sean

Reply via email to