On Fri, 2009-05-15 at 23:36 +0200, Karsten Bräckelmann wrote:
> On Fri, 2009-05-15 at 17:17 -0400, Bowie Bailey wrote:
> > Here is a real sample.  The only way I can get this message to pass 
> > VBounce as legitimate is to add bnifstg2.buc.com to the whitelist.  
> > However, this is *not* a mailserver, this is the client.  
> > bnofimage1.buc.com is my mailserver, and it is in the whitelist, but 
> > VBounce doesn't pick up on it.

Since that option supports wildcards, this might be a viable workaround.
Just a hack, though, which includes the local client machines as per the
one sample, like they where MTAs.

  whitelist_bounce_relays *.buc.com

I just hope they're all set up like that, and that you fully control the
domain. ;)


Hmm, *might* actually exempt blow-backs with forged Received headers, so
could result in less backscatter bounces caught. Still might be worth a
try.


> Ah, crap, that one again. It's a multi-line header with the whitelisted
> relay not in the first line. Bug 5912 [1]. The relevant header from your
> legit bounce sample:
> 
>   Received: (from bnifstg2.buc.com [172.16.17.14])
>    by bnofimage1.buc.com (SAVSMTP 3.1.0.29) with SMTP [...]
> 
> 
> [1] https://issues.apache.org/SpamAssassin/show_bug.cgi?id=5912

-- 
char *t="\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to