Eric W. Bates wrote: > Matt Kettler wrote: >> Eric W. Bates wrote: >> >>> I recently upgraded from 2.63 to 3.1 and having done so, my entries for >>> trusted_networks no longer seem to functional. >>> >>> I have way to many trusted network lines, but in particular I know that: >>> >>> trusted_networks 68.64/13 >>> >>> is no longer working because: >>> >>> Content analysis details: (5.9 points, 5.0 required) >>> >>> pts rule name description >>> ---- ---------------------- >>> -------------------------------------------------- >>> -0.0 SPF_PASS SPF: sender matches SPF record >>> 2.0 RCVD_IN_SORBS_DUL RBL: SORBS: sent directly from dynamic IP >>> address >>> [68.64.105.61 listed in dnsbl.sorbs.net] >>> 2.2 RCVD_IN_WHOIS_INVALID RBL: CompleteWhois: sender on invalid IP block >>> [68.64.105.61 listed in >>> combined-HIB.dnsiplists.completewhois.com] >>> 1.7 RCVD_IN_NJABL_DUL RBL: NJABL: dialup sender did non-local SMTP >>> [68.64.105.61 listed in combined.njabl.org] >>> >>> >>> As you know, 68.64.105.61 falls within 68.64.0.0/13; so none of these >>> rules should have hit, correct? >> >> Maybe.. Were there any untrusted hosts in-between 68.64.105.61 and your >> network >> in the Received: headers? > > No. But even if there were, wouldn't the rule fire on the offensive IP > rather than the one listed as 'trusted'?
No, it could fire on *ANY* external IP that isn't the first hop.