https://bz.apache.org/SpamAssassin/show_bug.cgi?id=8280
--- Comment #9 from William Herrin <herrin-spamassas...@dirtside.com> --- Ran spamd with -D spf,dns as suggested. Trimmed logs follow: Sep 24 15:41:18 speech spamd[2151352]: spf: found EnvelopeFrom 'donotre...@overdrive.com' from header Sep 24 15:41:18 speech spamd[2151352]: dns: attempt 1/4, trying connect/sendto to [192.168.95.53]:53 Sep 24 15:41:18 speech spamd[2151352]: dns: connect_sock, resolver: yes Sep 24 15:41:18 speech spamd[2151352]: dns: 53959 configured local ports for DNS queries Sep 24 15:41:18 speech spamd[2151352]: dns: LocalAddr: [0.0.0.0]:57269, name server: [192.168.95.53]:53, module IO::Socket::IP Sep 24 15:41:18 speech spamd[2151352]: dns: resolver socket rx buffer size is 212992 bytes, local port 57269 Sep 24 15:41:18 speech spamd[2151352]: dns: providing a callback for id: 11739/IN/TXT/overdrive.com Sep 24 15:41:18 speech spamd[2151352]: dns: dns reply 11739 is OK, 0 answer records Sep 24 15:41:18 speech spamd[2151352]: dns: reply to 11739/IN/TXT/overdrive.com truncated (EDNS 1220 bytes), 0 answer records Sep 24 15:41:18 speech spamd[2151352]: dns: providing a callback for id: 61786/IN/TXT/overdrive.com Sep 24 15:41:18 speech spamd[2151352]: dns: dns reply 61786 is OK, 0 answer records Sep 24 15:41:18 speech spamd[2151352]: dns: reply to 61786/IN/TXT/overdrive.com truncated (EDNS 1220 bytes), 0 answer records No further debug output related to TXT queries for overdrive.com, hence no apparent attempt to query via TCP. -- You are receiving this mail because: You are the assignee for the bug.