Justin Mason wrote:
Jo Rhett writes:
Justin Mason wrote:
do you mean the one I posted about earlier, or the original?
Sorry, I haven't looked at it in a while and wouldn't remember.

Looking at yours - why don't use use the global parameters that specify trusted header hosts instead of adding your own? I can't think of a time I would trust the headers from a host, but wouldn't trust it for bounces...

Tried, and it didn't work. :(  Unfortunately, trusted_networks etc.
is built on the IP address of trusted net ranges -- and that info
doesn't appear reliably in most bounce DSNs.   (I think there's
a bugzilla item with more info.)

Also, I think (I don't have time to read the ruleset in detail right now) that it seems a bit harsh. The goal would be to identify only backscatter right? It seems likely to hit almost every bounce, yes?

it'll hit every bounce, and the MY_SERVERS_FOUND rule then rescues
the "legit" bounces from that set.

yeah, I thought so. It seems too simple for anything but single-domain servers. (or at least single-organization servers)

I'll poke at it later and see if I can think up a better way to handle this. I'd include SPF results etc if I can reuse that information from the previous tests...

--
Jo Rhett
Network/Software Engineer
Net Consonance

Reply via email to