http://bugzilla.spamassassin.org/show_bug.cgi?id=3169
------- Additional Comments From [EMAIL PROTECTED] 2004-05-03 23:18 -------
actual.bblisa.org: yeah, internal_networks. trusted would work, too. however
the env-from info might then become unusable due to the extra received hop
making the header unsafe to use -- which is why we're hoping that MTA authors
will record env-from info in the Received hdrs so we can use that....
there's a *lot* of overbroad and broken SPF out there, btw. :(
blueyonder.co.uk has some, too, allowing their entire dialup ranges.
This is to be expected, because that's their policy; their customers really
*are* allowed to originate SMTP connections from the dialup pool.
BTW, regarding SPF_HELO_PASS: I think it won't get a very high score; it kind of
falls out "for free" as the opposite of SPF_HELO_FAIL and SPF_HELO_SOFTFAIL.
those are more accurate (normally ;).
oh, another thing -- it may be worthwhile making SPF_PASS a meta test that
works as
meta SPF_PASS (__SPF_PASS && !RCVD_IN_SBL)
on the assumption that making SPF records will make a spammer a "sitting duck"
target, and most of those will be SBL-listed.
grep SPF_PASS spam-net.log | wc -l
9
grep SPF_PASS spam-net.log | grep -v RCVD_IN_SBL, | wc -l
1
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.