Cami wrote:
> Matt Kettler wrote:
> 
>>
>> First, neither trusted nor internal networks is a whitelist. Don't try
>> to treat
>> them as such.
> 
> 
> I'm not treating them as such. All I'm trying to do is stop
> RBL checks happening for the 196.0.0.0/8 network.

Yes you are. You're trying to use them as an RBL whitelist, and it doesn't work
that way. You can use them to deal with the DUL RBLs, but these settings will
not offer you any exception to normal RBLS. Period.


> 
>> According to the docs:
>> --------------------------------
>> Trusted relays that accept mail directly from dial-up connections
>> should not be
>> listed in internal_networks. List them only in trusted_networks.
>> --------------------------------
>>
>> Fix your trusted_networks and internal_networks accordingly. And do
>> NOT list the
>> dialup source. Put your MX in trusted_networks, and make sure it's not in
>> internal_networks.
> 
> 
> I've tried that already. If i remove 'internal_networks'
> completely, RBL looks still occur for the 196.x.x.x range.

If you have no internal networks declaration SA will use the values in
trusted_networks as your internal_networks.

Neither trusted_networks or internal_networks can ever be empty. They must have
a value. If you don't declare one, SA will make educated guesses.

So, as I said before, fix your trusted_networks and internal_networks
accordingly. Don't try to remove either setting. Define them, but define them
with the correct values for your network.

Reply via email to