http://bugzilla.spamassassin.org/show_bug.cgi?id=4072





------- Additional Comments From [EMAIL PROTECTED]  2005-01-09 21:42 -------
yeah.  basically, it looks like we're passing "trusted => 1" to
Mail::SPF::Query, and according to the perldoc:

The default mechanism for trusted=>1 is "include:spf.trusted-forwarder.org".
[...]
           Set "trusted=>1" to turned on automatic trusted_forwarder process-
           ing.  The mechanism "include:spf.trusted-forwarder.org" is used
           just before a "-all" or "?all".  The precise circumstances are
           somewhat more complicated, but it does get the case of "v=spf1
           -all" right -- i.e. spf.trusted-forwarder.org is not checked.
[...]
       "$query->trusted_forwarder()"
                 my ($result, $smtp_comment, $header_comment) =
$query->best_guess();

           It is possible that the message is coming through a known-good
           relay like acm.org or pobox.com.  During the transitional period,
           many legitimate services may appear to forge a sender address: for
           example, a news website may have a "send me this article in email"
           link.

           The trusted-forwarder.org domain is a whitelist of known-good hosts
           that either forward mail or perform legitimate envelope sender
           forgery.

             "include:spf.trusted-forwarder.org"

           This will return either "pass" or "neutral".



So aol's "?all" in their record causes the trusted-forwarder.org lookup, which
apparently has kernel.org in it, either incorrectly, or kernel.org didn't
actually check the mail actually came from aol...  trusted-forwarder.org, btw,
has this in their wl:

*.189.152.204.wl.trusted-forwarder.org. 43200 IN A 127.0.0.2



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to