Bowie Bailey wrote:
John Hardin wrote:
On Thu, 14 May 2009, Bowie Bailey wrote:
I have the whitelist_bounce_relays options set for vbounce and the
rules are hitting on bounce messages, but the whitelists don't seem
to be working.
In my local.cf, I have:
whitelist_bounce_relays bnofimage1.buc.com
But, an email with this header comes through:
Received: from bnofimage1.buc.com (bnofimage1.buc.com
[::ffff:172.16.17.11])
by bnofmail.buc.com with esmtp; Thu, 14 May 2009 12:22:03 -0400
id 0013C1A3.4A0C452B.0000728E
and it gets hit with BOUNCE_MESSAGE and ANY_BOUNCE_MESSAGE.
What am I missing here?
...a pure IPv4 address in the Received header? That may be confusing
the parser.
If you edit that message so the header is pure IPv4 and test from the
command line does it suddenly work correctly?
I don't think SA is IPv6-clean yet - but I could be wrong, I'm not a
dev.
I changed the header:
Received: from bnofimage1.buc.com (bnofimage1.buc.com [172.16.17.11])
by bnofmail.buc.com with esmtp; Thu, 14 May 2009 12:22:03 -0400
id 0013C1A3.4A0C452B.0000728E
but I still get the same results. A bounce originating from the local
server also gets tagged with BOUNCE_MESSAGE.
Received: from localhost (localhost [127.0.0.1])
(ftp://ftp.isi.edu/in-notes/rfc1894.txt)
by bnofmail.buc.com with dsn; Thu, 14 May 2009 12:37:21 -0400
id 0013C1FC.4A0C48C1.000076CE
I added "localhost" to the whitelist, but it didn't have any effect.
Is there any way I can see what vbounce is doing? I didn't see any
details in the debug output.
Anyone have any other ideas? This should be a basic setting for
vbounce, but it simply doesn't work for me.
--
Bowie