On 02/04/18 14:26, David Jones wrote:
On 04/02/2018 07:18 AM, Sebastian Arcus wrote:
Thank you - one example here: https://pastebin.com/UGStfCys
On 02/04/18 13:10, Kevin A. McGrail wrote:
Pastebin a sample(s).
On Mon, Apr 2, 2018, 08:06 Sebastian Arcus <s.ar...@open-t.co.uk
<mailto:s.ar...@open-t.co.uk>> wrote:
I have a client which handles a lot of hotel bookings as part of
their
work - and all hotel booking confirmations coming from Travelodge
(a UK
hotel chain) hit FUZZY_XPILL.
I've tried looking at the regex of the rule, but can't quite get
my head
around what it is supposed to do, and can't figure out why it
triggers
on all the Travelodge emails either. Could anybody provide some
hints -
or have others seen this as well? I can provide some sample mail,
if it
helps. Thank you.
I have added an entry to 60_whitelist_auth.cf to help with this in all
SA instances that run sa-update regularly. This will be out there in a
couple of days trusting email from that sender when there is an SPF_PASS
or DKIM_VALID_AU hit.
def_whitelist_auth *@travelodge.co.uk
These emails from Travelodge are important enough to be DKIM signed as
well for http://dkimwl.org which I would eventually like to get added to
the default SA ruleset.
Thank you very much for the fix and for the quick replies.