On 29.04.20 00:05, listsb wrote:
i'm experimenting with whitelist_from_spf, just to learn a little about how
it works, and not getting the result i am expecting. i've created a small
test message emulating mail from github [taken from an actual message] and
have added an entry for whitelist_from_spf. when testing, it doesn't
appear to be working:
http://dpaste.com/0MCGSBN
Apr 28 23:32:43.287 [21556] dbg: spf: relayed through one or more trusted
relays, cannot use header-based Envelope-From, skipping
Apr 28 23:32:43.287 [21556] dbg: spf: def_spf_whitelist_from: could not find
useable envelope sender
Apr 28 23:32:43.342 [21556] dbg: spf: whitelist_from_spf: already checked spf
and didn't get pass, skipping whitelist check
this appears to be because of the presence of this header:
Received: from mta.example.com (mta.example.com [198.19.20.212])
by mda.example.com (Postfix) with ESMTPS id 49BRLq64qfzGpCT
for <j...@example.com>; Tue, 28 Apr 2020 12:05:23 -0400 (EDT)
with that header removed, it works as expected, but i don't understand why.
mail passes through the mta, is relayed to mda, which then passes it to
spamassassin [amavis].
why does spamassassin have a problem when mail passes through this additional
relay? what am i missing [or doing wrong]?
you apparently need to add 198.19.20.212 to your trusted_networks and
internal_networks - I assume It's your ISP from which you receive the email.
sorrect?
--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Micro random number generator: 0, 0, 0, 4.33e+67, 0, 0, 0...