On 02/04/18 14:26, David Jones wrote:
On 04/02/2018 07:18 AM, Sebastian Arcus wrote:
Thank you - one example here: https://pastebin.com/UGStfCys


On 02/04/18 13:10, Kevin A. McGrail wrote:
Pastebin a sample(s).

On Mon, Apr 2, 2018, 08:06 Sebastian Arcus <s.ar...@open-t.co.uk <mailto:s.ar...@open-t.co.uk>> wrote:

    I have a client which handles a lot of hotel bookings as part of their     work - and all hotel booking confirmations coming from Travelodge (a UK
    hotel chain) hit FUZZY_XPILL.

    I've tried looking at the regex of the rule, but can't quite get my head     around what it is supposed to do, and can't figure out why it triggers     on all the Travelodge emails either. Could anybody provide some hints -     or have others seen this as well? I can provide some sample mail, if it
    helps. Thank you.


I have added an entry to 60_whitelist_auth.cf to help with this in all SA instances that run sa-update regularly.  This will be out there in a couple of days trusting email from that sender when there is an SPF_PASS or DKIM_VALID_AU hit.

def_whitelist_auth *@travelodge.co.uk

These emails from Travelodge are important enough to be DKIM signed as well for http://dkimwl.org which I would eventually like to get added to the default SA ruleset.

Thank you very much for the fix and for the quick replies.

Reply via email to