https://bz.apache.org/SpamAssassin/show_bug.cgi?id=8280

--- Comment #9 from William Herrin <herrin-spamassas...@dirtside.com> ---
Ran spamd with -D spf,dns as suggested. Trimmed logs follow:

Sep 24 15:41:18 speech spamd[2151352]: spf: found EnvelopeFrom
'donotre...@overdrive.com' from header
Sep 24 15:41:18 speech spamd[2151352]: dns: attempt 1/4, trying connect/sendto
to [192.168.95.53]:53
Sep 24 15:41:18 speech spamd[2151352]: dns: connect_sock, resolver: yes
Sep 24 15:41:18 speech spamd[2151352]: dns: 53959 configured local ports for
DNS queries
Sep 24 15:41:18 speech spamd[2151352]: dns: LocalAddr: [0.0.0.0]:57269, name
server: [192.168.95.53]:53, module IO::Socket::IP
Sep 24 15:41:18 speech spamd[2151352]: dns: resolver socket rx buffer size is
212992 bytes, local port 57269
Sep 24 15:41:18 speech spamd[2151352]: dns: providing a callback for id:
11739/IN/TXT/overdrive.com
Sep 24 15:41:18 speech spamd[2151352]: dns: dns reply 11739 is OK, 0 answer
records
Sep 24 15:41:18 speech spamd[2151352]: dns: reply to 11739/IN/TXT/overdrive.com
truncated (EDNS 1220 bytes), 0 answer records
Sep 24 15:41:18 speech spamd[2151352]: dns: providing a callback for id:
61786/IN/TXT/overdrive.com
Sep 24 15:41:18 speech spamd[2151352]: dns: dns reply 61786 is OK, 0 answer
records
Sep 24 15:41:18 speech spamd[2151352]: dns: reply to 61786/IN/TXT/overdrive.com
truncated (EDNS 1220 bytes), 0 answer records

No further debug output related to TXT queries for overdrive.com, hence no
apparent attempt to query via TCP.

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to