On 29.04.20 00:05, listsb wrote:
i'm experimenting with whitelist_from_spf, just to learn a little about how
it works, and not getting the result i am expecting.  i've created a small
test message emulating mail from github [taken from an actual message] and
have added an entry for whitelist_from_spf.  when testing, it doesn't
appear to be working:

http://dpaste.com/0MCGSBN

Apr 28 23:32:43.287 [21556] dbg: spf: relayed through one or more trusted 
relays, cannot use header-based Envelope-From, skipping
Apr 28 23:32:43.287 [21556] dbg: spf: def_spf_whitelist_from: could not find 
useable envelope sender
Apr 28 23:32:43.342 [21556] dbg: spf: whitelist_from_spf: already checked spf 
and didn't get pass, skipping whitelist check


this appears to be because of the presence of this header:

Received: from mta.example.com (mta.example.com [198.19.20.212])
        by mda.example.com (Postfix) with ESMTPS id 49BRLq64qfzGpCT
        for <j...@example.com>; Tue, 28 Apr 2020 12:05:23 -0400 (EDT)

with that header removed, it works as expected, but i don't understand why.  
mail passes through the mta, is relayed to mda, which then passes it to 
spamassassin [amavis].

why does spamassassin have a problem when mail passes through this additional 
relay?  what am i missing [or doing wrong]?

you apparently need to add 198.19.20.212 to your trusted_networks and
internal_networks - I assume It's your ISP from which you receive the email.
sorrect?
--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Micro random number generator: 0, 0, 0, 4.33e+67, 0, 0, 0...

Reply via email to