On Thu, 14 May 2009, Bowie Bailey wrote:

I have the whitelist_bounce_relays options set for vbounce and the rules are hitting on bounce messages, but the whitelists don't seem to be working.

In my local.cf, I have:

  whitelist_bounce_relays bnofimage1.buc.com

But, an email with this header comes through:

Received: from bnofimage1.buc.com (bnofimage1.buc.com [::ffff:172.16.17.11])
     by bnofmail.buc.com with esmtp; Thu, 14 May 2009 12:22:03 -0400
     id 0013C1A3.4A0C452B.0000728E

and it gets hit with BOUNCE_MESSAGE and ANY_BOUNCE_MESSAGE.

What am I missing here?

...a pure IPv4 address in the Received header? That may be confusing the parser.

If you edit that message so the header is pure IPv4 and test from the command line does it suddenly work correctly?

I don't think SA is IPv6-clean yet - but I could be wrong, I'm not a dev.

--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 jhar...@impsec.org    FALaholic #11174     pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  Efficiency can magnify good, but it magnifies evil just as well.
  So, we should not be surprised to find that modern electronic
  communication magnifies stupidity as *efficiently* as it magnifies
  intelligence.                                   -- Robert A. Matern
-----------------------------------------------------------------------
 7 days until the 5th anniversary of SpaceshipOne winning the X-prize

Reply via email to