https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6062
Summary: barracude headers triggers FP on WEIRD_PORT
Product: Spamassassin
Version: 3.2.5
Platform: Other
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: Rules
AssignedTo: [email protected]
ReportedBy: [email protected]
the inclusion of an email forwared from a barracuda, with 'headers' included,
and this in the email:
x-barracuda-url:http://10.10.20.91:8000/cgi-bin/mark.cgi
which is possible in every email outbound from a barracuda, rule triggers
'WEIRD_PORT'
suggest excluding '^x-barracuda-url:http' from WEIRD_PORT tests.
rule has low score (0.001) UNLESS BAYES OR NET NOT ACTIVE
score WEIRD_PORT 1.599 1.499 1.089 0.001
(a 1.6 score could block an email from barracuda users, again, only if a full
email, with headers is sent)
--
Configure bugmail:
https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.