https://bz.apache.org/SpamAssassin/show_bug.cgi?id=8280

Bill Cole <billc...@apache.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |billc...@apache.org

--- Comment #2 from Bill Cole <billc...@apache.org> ---
The sample message passes for me:


Content preview:  NecroTek Jonathan Maberry Go to your Holds in the app or on
   our OverDrive site to borrow this title. DON'T WANT THIS TITLE YET? You can
   suspend the hold to stay on the wait list without the title becoming
available
   for you. When the suspension ends, your hold will be active and you'll be
   notified whe [...] 

Content analysis details:   (-0.2 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record
-0.0 SPF_PASS               SPF: sender matches SPF record
-0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from
                            envelope-from domain
-0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from
author's
                            domain
-0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
 0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily
valid
 0.0 HTML_MESSAGE           BODY: HTML included in message
 0.0 MIME_BASE64_TEXT       RAW: Message text disguised using base64 encoding
 0.0 MSGID_FROM_MTA_HEADER  Message-Id was added by a relay
-0.0 T_SCC_BODY_TEXT_LINE   No description available.


This sounds like a problem with UDP truncation and TCP fallback. If your
resolver fails to do TCP fallback or is firewall-blocked, very large TXT
responses will break SPF.

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to