http://bugzilla.spamassassin.org/show_bug.cgi?id=3169





------- Additional Comments From [EMAIL PROTECTED]  2004-05-03 23:18 -------
actual.bblisa.org: yeah, internal_networks.  trusted would work, too.  however
the env-from info might then become unusable due to the extra received hop
making the header unsafe to use -- which is why we're hoping that MTA authors
will record env-from info in the Received hdrs so we can use that....

there's a *lot* of overbroad and broken SPF out there, btw. :(  
blueyonder.co.uk has some, too, allowing their entire dialup ranges.
This is to be expected, because that's their policy; their customers really
*are* allowed to originate SMTP connections from the dialup pool.

BTW, regarding SPF_HELO_PASS: I think it won't get a very high score; it kind of
falls out "for free" as the opposite of SPF_HELO_FAIL and SPF_HELO_SOFTFAIL. 
those are more accurate (normally ;).

oh, another thing -- it may be worthwhile making SPF_PASS a meta test that 
works as

  meta SPF_PASS    (__SPF_PASS && !RCVD_IN_SBL)

on the assumption that making SPF records will make a spammer a "sitting duck"
target, and most of those will be SBL-listed.

grep SPF_PASS spam-net.log  | wc -l
      9
grep SPF_PASS spam-net.log | grep -v RCVD_IN_SBL, | wc -l
      1






------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to