All,

I have several remote users in a country well known to inject spam mail.
These users are connected via dialup links to our backend Exchange
Server and they are able to send email.  The Exchange Server relays all
email to the front end mail server running Red Hat Enterprise Linux AS 4
and SpamAssassin ver 3.1.7.  All incoming and outgoing email is scanned
- no ifs, no buts, just is (we've been on a block list due to a
compromised machine sending junk email - never again shall we trust all
our internal clients)!  I have the following in my
/etc/mail/spamassassin/local.cf file:

whitelist_from_rcvd     [EMAIL PROTECTED]       mailsrvr.domain.com

Local users send email trigger the ALL_TRUSTED rule but remote users
aren't.  Some email is even escaping to our clients with a modified
subject alluding to the fact that it is spam and hence being relegated
to the junk folder by our customers (suffice that to mean that the "no
ifs, no buts" clause has been overruled).  I can only guess that
internal users are firing the ALL_TRUSTED rule as there is only one
Received: header (the trusted backend server) by the time spamassassin
scans the email.

How then can I tell spamassassin to fire the ALL_TRUSTED rule if the
connecting host is on the trusted list and ignore further Received:
header checks?  I have read Mail::SpamAssassin::Conf help file but
cannot find the solution yet.  I thought the whitelist_allows_relays
would help, but I'm not too sure what that does!  Is there a better
source of documentation somewhere?


Cheers
ak.

Reply via email to