http://bugzilla.spamassassin.org/show_bug.cgi?id=4072
------- Additional Comments From [EMAIL PROTECTED] 2005-01-09 21:42 -------
yeah. basically, it looks like we're passing "trusted => 1" to
Mail::SPF::Query, and according to the perldoc:
The default mechanism for trusted=>1 is "include:spf.trusted-forwarder.org".
[...]
Set "trusted=>1" to turned on automatic trusted_forwarder process-
ing. The mechanism "include:spf.trusted-forwarder.org" is used
just before a "-all" or "?all". The precise circumstances are
somewhat more complicated, but it does get the case of "v=spf1
-all" right -- i.e. spf.trusted-forwarder.org is not checked.
[...]
"$query->trusted_forwarder()"
my ($result, $smtp_comment, $header_comment) =
$query->best_guess();
It is possible that the message is coming through a known-good
relay like acm.org or pobox.com. During the transitional period,
many legitimate services may appear to forge a sender address: for
example, a news website may have a "send me this article in email"
link.
The trusted-forwarder.org domain is a whitelist of known-good hosts
that either forward mail or perform legitimate envelope sender
forgery.
"include:spf.trusted-forwarder.org"
This will return either "pass" or "neutral".
So aol's "?all" in their record causes the trusted-forwarder.org lookup, which
apparently has kernel.org in it, either incorrectly, or kernel.org didn't
actually check the mail actually came from aol... trusted-forwarder.org, btw,
has this in their wl:
*.189.152.204.wl.trusted-forwarder.org. 43200 IN A 127.0.0.2
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.