On Thu, 14 May 2009, Bowie Bailey wrote:
I have the whitelist_bounce_relays options set for vbounce and the rules are
hitting on bounce messages, but the whitelists don't seem to be working.
In my local.cf, I have:
whitelist_bounce_relays bnofimage1.buc.com
But, an email with this header comes through:
Received: from bnofimage1.buc.com (bnofimage1.buc.com
[::ffff:172.16.17.11])
by bnofmail.buc.com with esmtp; Thu, 14 May 2009 12:22:03 -0400
id 0013C1A3.4A0C452B.0000728E
and it gets hit with BOUNCE_MESSAGE and ANY_BOUNCE_MESSAGE.
What am I missing here?
...a pure IPv4 address in the Received header? That may be confusing the
parser.
If you edit that message so the header is pure IPv4 and test from the
command line does it suddenly work correctly?
I don't think SA is IPv6-clean yet - but I could be wrong, I'm not a dev.
--
John Hardin KA7OHZ http://www.impsec.org/~jhardin/
jhar...@impsec.org FALaholic #11174 pgpk -a jhar...@impsec.org
key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
Efficiency can magnify good, but it magnifies evil just as well.
So, we should not be surprised to find that modern electronic
communication magnifies stupidity as *efficiently* as it magnifies
intelligence. -- Robert A. Matern
-----------------------------------------------------------------------
7 days until the 5th anniversary of SpaceshipOne winning the X-prize