On Mon, 8 Jan 2007, Daryl C. W. O'Shea wrote:
> Rob Mangiafico wrote:
> > On Mon, 8 Jan 2007, Daryl C. W. O'Shea wrote:
> >>> User emails from his/her dialup IP directly to trusted_networks server 1
> >>> (which is allowed by access not SMTPAUTH), which then goes to my server.
> >>> It seems this email gets flagged as DUL, PBL, etc...
> >>>
> >>> user1 -> trusted_networks server 1 -> final destination
> >>>
> >>> Is there any way to not have this happen (get flagged) besides SMTPAUTH
> >>> checks? Remove server 1 from trusted_networks? ...
> >> Is "server 1" acting only as an MSA, or is it also acting as an MX, or 
> >> intermediate relay?
> > 
> > server 1 is an MSA/MTA. Each server is an independent sendmail server both 
> > receiving and sending email.
> 
> OK, as long as they're not acting as an MX or passing mail from your MX 
> to the machine running SA, which sounds like is the case, you'll want to 
> make sure that the server (that is acting as an MSA) is not in your 
> internal_networks.
> 
> So either (i) have trusted_networks include all your servers and 
> internal_networks include all your servers except the MSA, or (ii) just 
> define your trusted_networks to include all your servers except the MSA 
> (and take a really small hit on some extra DNS lookups that are going to 
> end up cached by your DNS server) and don't bother setting 
> internal_networks.

Thanks! I was getting wrapped around the axle on trusted_networks, and had 
it set for all our servers that are also MSA/MTA's. I removed them all 
from trusted_networks, and no more dynamic IP false hits.  :)

Rob

Reply via email to