Bowie Bailey wrote:
John Hardin wrote:
On Thu, 14 May 2009, Bowie Bailey wrote:

I have the whitelist_bounce_relays options set for vbounce and the rules are hitting on bounce messages, but the whitelists don't seem to be working.

In my local.cf, I have:

  whitelist_bounce_relays bnofimage1.buc.com

But, an email with this header comes through:

Received: from bnofimage1.buc.com (bnofimage1.buc.com [::ffff:172.16.17.11])
     by bnofmail.buc.com with esmtp; Thu, 14 May 2009 12:22:03 -0400
     id 0013C1A3.4A0C452B.0000728E

and it gets hit with BOUNCE_MESSAGE and ANY_BOUNCE_MESSAGE.

What am I missing here?

...a pure IPv4 address in the Received header? That may be confusing the parser.

If you edit that message so the header is pure IPv4 and test from the command line does it suddenly work correctly?

I don't think SA is IPv6-clean yet - but I could be wrong, I'm not a dev.

I changed the header:

   Received: from bnofimage1.buc.com (bnofimage1.buc.com [172.16.17.11])
     by bnofmail.buc.com with esmtp; Thu, 14 May 2009 12:22:03 -0400
     id 0013C1A3.4A0C452B.0000728E

but I still get the same results. A bounce originating from the local server also gets tagged with BOUNCE_MESSAGE.

   Received: from localhost (localhost [127.0.0.1])
     (ftp://ftp.isi.edu/in-notes/rfc1894.txt)
     by bnofmail.buc.com with dsn; Thu, 14 May 2009 12:37:21 -0400
     id 0013C1FC.4A0C48C1.000076CE

I added "localhost" to the whitelist, but it didn't have any effect. Is there any way I can see what vbounce is doing? I didn't see any details in the debug output.

Anyone have any other ideas? This should be a basic setting for vbounce, but it simply doesn't work for me.

--
Bowie

Reply via email to