On 10/16/19 6:57 AM, Simon Wilson wrote:
So how do I configure it such that if it's an authenticated submission (587) mail through my mail host at (int)192.68.1.230/(ext)119.18.34.29 further upstream RECEIVED headers are NOT scanned by SA for dynamic IP? Am I still totally misunderstanding trust path in SA?

Can you configure your upstream MSA to not include the client IP address in it's Received: header?

I have my MSA insert a header like the following:

Received: from Contact-TNet-Consulting-Abuse-for-assistance …

The rest of the header has germane information that TNet Abuse can use to identify the sending host.

This means that there is nothing for downstream servers to detect as a dynamic IP and get cross with.



--
Grant. . . .
unix || die

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to