On 10/16/19 6:57 AM, Simon Wilson wrote:
So how do I configure it such that if it's an authenticated submission (587) mail through my mail host at (int)192.68.1.230/(ext)119.18.34.29 further upstream RECEIVED headers are NOT scanned by SA for dynamic IP? Am I still totally misunderstanding trust path in SA?
Can you configure your upstream MSA to not include the client IP address in it's Received: header?
I have my MSA insert a header like the following: Received: from Contact-TNet-Consulting-Abuse-for-assistance …The rest of the header has germane information that TNet Abuse can use to identify the sending host.
This means that there is nothing for downstream servers to detect as a dynamic IP and get cross with.
-- Grant. . . . unix || die
smime.p7s
Description: S/MIME Cryptographic Signature