Am 29.08.2014 um 01:51 schrieb Karsten Bräckelmann:
> On Fri, 2014-08-29 at 01:06 +0200, Reindl Harald wrote:
>> the question was just "how can i enforce RBL tests inside the own LAN"
> 
>> the question was just "how can i enforce RBL tests inside the own LAN"
> 
>> the question was just "how can i enforce RBL tests inside the own LAN"
> 
> RBL tests cannot be enforced. Internal and trusted networks settings
> need to be configured correctly to match the RBL test's scope, in your
> case last-external.
> 
> If there are trusted relays found in the Received headers, and the first
> trusted one's connecting relay is external (not in the internal_networks
> set), then an RBL test for last-external will be run.
> 
> This is entirely unrelated to "own LAN" or "network range"

that may all be true for blacklists and default RBL rules

it is no longer true in case of 4 internal WHITELISTS which you
want to use to LOWER scores to reduce false positives while
otherwise bayes may hit - such traffic can also come from
the internal network

in case of having postscreen and scoring in front of SA it
is even a valid usecase to *completly* skip SA's using of
blacklists and have 4 different DNSWL in the internal
network with different trust-levels and hence different
negative scores

frankly it is somehow pervert that you can send a specific
mailbody from outside and get a DNSWL negative score
leading to accpet the message correctly and send the
exactly same message from the own LAN and get it
rejected by bayse filters

that's also a lot of more trustable then sender whitelisting




Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to