Thanks for the reminder . . . 

joe a.

>>> On 2/5/2013 at 1:03 PM, <dar...@chaosreigns.com> wrote:
> I feel like this comes up often enough, people not having trusted_networks
> or internal_networks set.  
> 
> Probably for most people it's unnecessary.  But if you have some server
> relaying / forwarding mail to your server, and you don't have one of these
> set, spamassassin is using the IP address of that relaying server for
> blacklist lookups, which is not useful.  
> 
> And all you have to do is add a line to your local.cf containing:
> 
> trusted_networks IP
> 
> Where "IP" is the IP address of the relaying machine.  You can have
> multiple, separated by a space.
> 
> Often, it seems, people are getting email relayed and have forgotten about
> it.  So to look for that, you can add to your local.cf:
> 
> add_header all RelaysUntrusted _RELAYSUNTRUSTED_
> 
> Then wait till you get a bunch of email, then run something like:
> 
> cat ~/Maildir/cur/* ~/Maildir/new/* | grep ^X-Spam-RelaysUntrusted | cut -d' 
> ' 
> -f3 | sort | uniq -c | sort -nr | less
> 
> This will list the untrusted IPs you most commonly get email from.  You
> should make sure the ones near the top aren't actually trusted relays you
> should add to trusted_networks.
> 
> These are the related wiki pages:
> http://wiki.apache.org/spamassassin/TrustPath 
> http://wiki.apache.org/spamassassin/TrustedRelays 
> 
> I should probably add this testing stuff somewhere.
> 
> -- 
> "I'd rather be happy than right any day."
> - Slartiblartfast, The Hitchhiker's Guide to the Galaxy
> http://www.ChaosReigns.com 



Reply via email to