Hey there all,
Recently, we noticed that one of our system's "cron" mails started getting
caught by our spam filter (because it had lots of hostnames in it about
failed ssh logins, which the uribl plugin didn't like).
This system is listed (v4 and v6) in trusted_networks -- and it sends it
straight to our MX host via v6. (no SMTP auth)
We're getting a warning about "unparseable relay", but I think that's just
the DMA [freebsd's default mailer] throwing it off:
Received: from dmahoney (uid 10302)
(envelope-from dmaho...@bommel.dayjob.org)
id 237584
by bommel.dayjob.org (DragonFly Mail Agent v0.13 on bommel.dayjob.org);
Thu, 07 Dec 2023 19:45:29 +0000
I also noticed that the all_trusted rule did not fire -- perhaps, again,
because of the above unparseable relay.
Is DMA putting a crappy header in that would cause this not to break if we
were running a local postfix/sendmail?
Maybe I'm unclear on how this all works, but I thought that putting a host
in trusted_networks basically sidestepped spam processing. What's the
"correct" way to do this? These are boxes that do not normally relay mail
-- they only generate it from system reports and cron jobs, and generally
speaking, only to us.
-Dan
--
--------Dan Mahoney--------
Techie, Sysadmin, WebGeek
Gushi on efnet/undernet IRC
FB: fb.com/DanielMahoneyIV
LI: linkedin.com/in/gushi
Site: http://www.gushi.org
---------------------------