http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-19 16:46 ---
That code segment is not used in the URIDNSBL code
Ah, I must have assumed more sharing of code from Dns.pm than there is. Now I
see a comment in the
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-19 21:59 ---
Vance, what version of Net::DNS were you running when the log entry in
bug comment 23 happened?
perl -le 'use Net::DNS; print $Net::DNS::VERSION';
---
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-18 16:39 ---
Subject: Re: SURBL FP on a particular domain name
I would expect this is handled, but what if multiple surbl requests are made
for different urls, and they come
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-18 17:36 ---
Normally, yes, I'd be more than happy to test, but as I said in one of my
comments, the bug isn't hitting me anymore. It was no reproducable before, but
it
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-19 00:29 ---
Loren,
Each DNS query creates a new IO::Socket object which is put into an array object
which is put into a hash table in the DNS::Resolver object, keyed by the
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-19 00:43 ---
Subject: Re: SURBL FP on a particular domain name
# skip any A record that isn't on 127/8
If Verisign reinstates wildcard DNS and a DNS blacklist's domain
next if ($answer-type ne 'A' $answer-type ne 'TXT');
# skip any A record that isn't on 127/8
next if ($answer-type eq 'A' $answer-rdatastr !~ /^127\./);
Shouldn't that prevent what Vance's comment #23 debug log output shows
even if
the wrong query's results were associated with a
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-19 00:53 ---
Subject: Re: SURBL FP on a particular domain name
Oops, forgot to change the reply to BZ.
next if ($answer-type ne 'A' $answer-type ne 'TXT');
# skip
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-19 11:20 ---
Daniel, I didn't mean that the code I quoted was wrong, only that it should have
prevented the debug log output that Vance posted. As Loren pointed out in the
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-19 13:32 ---
Daniel, I didn't mean that the code I quoted was wrong, only that it should
have
prevented the debug log output that Vance posted.
That code segment is not
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-19 13:53 ---
Created an attachment (id=2611)
-- (http://bugzilla.spamassassin.org/attachment.cgi?id=2611action=view)
possible workaround patch
This patch might help,
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-18 07:18 ---
I just saw this bug occur this morning, with a mailing-list message from
samba.org. According to Jeff Chan at surbl.org, samba.org has been permanently
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-18 10:49 ---
I was looking over Vance's comment #23 and had an idea. We're sending out
multiple DNS queries that run in the background, then match up results with
queries as
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-11 22:57 ---
I am a novice to this Bugzilla database, so I apologize in advance for any
faux pas that I commit.
I am CEO of Enfish Software (www.enfish.com) and we did a
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-02 19:34 ---
I've been staring at the code for a while, upped the debugging, and watched a
few more message come through marked as spam without reason.
My guess as to the
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-03 00:48 ---
Thanks for the additional info. SURBL checks in general should only apply to
message bodies and not headers, so this result is odd. FWIW what we want for
SURBL
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-03 12:02 ---
here is a thought.
the current uribl code pulls mailto:'s out of the body of the emails just the
same as it does for http:// links. so, lets say someone
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-03 13:15 ---
to be honest, I don't think we should be retrieving mailto:'s in the uri_list,
at least not the one used for the URIBL tests.
--- You are receiving this
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
[EMAIL PROTECTED] changed:
What|Removed |Added
CC||[EMAIL PROTECTED]
---
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-01 20:47 ---
Created an attachment (id=2586)
-- (http://bugzilla.spamassassin.org/attachment.cgi?id=2586action=view)
Email flagged as spam by spam assassin
Note that spam
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2005-01-01 20:49 ---
Created an attachment (id=2587)
-- (http://bugzilla.spamassassin.org/attachment.cgi?id=2587action=view)
DNS action while checking a message flagged as spam
This
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-12-07 22:43 ---
Subject: Re: SURBL FP on a particular domain name
ping, nslookup and host won't provide much info (unless you use host -v,
but that's really dig anyway) since
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-12-07 23:34 ---
Anything that does name resolution will tell you if a particular domain is on
SURBLs or not at the time you check (same test works on other RBLs, usually
needing
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-12-07 23:35 ---
...depending on how the code deals with the resolutions.
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-12-08 00:50 ---
By all means use the best query tool available. More info is better. :)
--- You are receiving this mail because: ---
You are the assignee for the
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
[EMAIL PROTECTED] changed:
What|Removed |Added
CC||[EMAIL PROTECTED]
---
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-11-24 17:28 ---
The domain has never been on SC.
We have seen several reports of intermittent
SURBL FPs where the domains were never on any SURBLs.
I'm not sure this is a
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-11-24 20:03 ---
Subject: Re: SURBL FP on a particular domain name
On Wed, Nov 24, 2004 at 07:54:41PM -0800, [EMAIL PROTECTED] wrote:
Now I'm reopening to hopefully gather more
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-11-24 20:30 ---
If you are sure that the domain was never on SC, then I'll reopen this while
maybe some people will think about what could have caused it.
Yes, this domain was
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-11-24 20:32 ---
It sounds like an odd bug to me. Have folks checked to make sure that the
domain actually wasn't listed, even for a short time?
Yes, we had similar FP reports
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-11-24 14:58 ---
Created an attachment (id=2538)
-- (http://bugzilla.spamassassin.org/attachment.cgi?id=2538action=view)
email that triggers the bug
--- You are receiving
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-11-24 15:00 ---
Created an attachment (id=2539)
-- (http://bugzilla.spamassassin.org/attachment.cgi?id=2539action=view)
log output from spamassassin -D on the example email
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
--- Additional Comments From [EMAIL PROTECTED] 2004-11-24 15:20 ---
Subject: Re: SURBL FP on a particular domain name
Created an attachment (id=2539)
-- (http://bugzilla.spamassassin.org/attachment.cgi?id=2539action=view)
--
http://bugzilla.spamassassin.org/show_bug.cgi?id=3997
[EMAIL PROTECTED] changed:
What|Removed |Added
Status|NEW |RESOLVED
Resolution|
34 matches
Mail list logo