Am 26.08.2014 um 20:29 schrieb Axb:
> On 08/26/2014 08:08 PM, Reindl Harald wrote:
>>
>> Am 26.08.2014 um 18:11 schrieb Axb:
>>> On 08/26/2014 05:42 PM, Reindl Harald wrote:
>>>> they are *not* i sepecially added the following lines
>>>> to prevent the automatic adding to "trusted_networks"
>>>> since the IP range is outside
>>>>
>>>> clear_trusted_networks
>>>> trusted_networks 192.168.168.0/24
>>>>
>>>> there was no trust at all in the headers and no
>>>> hint why the DNSWL was skipped at all
>>>>
>>>> ADVANCE_FEE_4_NEW
>>>> ADVANCE_FEE_4_NEW_MONEY
>>>> ADVANCE_FEE_5_NEW
>>>> ADVANCE_FEE_5_NEW_MONEY
>>>> BAYES_99
>>>> BAYES_999
>>>> DEAR_SOMETHING
>>>> DKIM_ADSP_CUSTOM_MED
>>>> FREEMAIL_FROM
>>>> LOTS_OF_MONEY
>>>> SPF_SOFTFAIL
>>>> T_MONEY_PERCENT
>>>> URG_BIZ
>>>
>>> comment out
>>>
>>> #tflags   RCVD_IN_RP_TLDNS1 net
>>>
>>> run that msg against spamassassin -D dns
>>> see what it spits out
>>
>> sorry, no idea what you mean with "run that message against"
>>
>> spamassassin is running spamd and spamass-milter and no way
>> to get the message passed over SMTP to that box with
>> another configuration
>>
>> fact is that the message has no "ALL_TRUSTED" in the headers
>> and it makes little sense that DNSWL lists are skipped only
>> because the client is in the same network range because
>> that makes behavior hard to test and compare
>>
>> that's (partly) how are the processes started
>> /usr/bin/spamd -c -H --max-children=25 --min-children=10 --min-spare=5 
>> --max-spare=15 --port=10027
>> /usr/sbin/spamass-milter -p /run/spamass-milter/spamass-milter.sock -g 
>> sa-milt -r 10 -- -s 1048576 --port=10027
> 
> fact is: you're making assumptions without making use of the basic 
> spamassassin command line debugging features

i just don't know how to do that with the setup and mailflow
by just start "spamassassin -D dns" which runs the process
but how to get the mail there?

yes, i make assumptions, but without touch anything else and having none
of the IP's as "trusted" using the exact same message but from a IP outside
the own subnet shows that rules are used

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to