On Thu, May 21, 2009 07:10, LuKreme wrote:
> On 8-May-2009, at 19:20, Benny Pedersen wrote:
>> meta __SPF_NOT_PASS (!SPF_PASS)
>> meta __NOT_LOCAL_TRUSTED (!NO_RELAYS || !ALL_TRUSTED)
>> meta BLACKLIST_SPF (__SPF_NOT_PASS && __NOT_LOCAL_TRUSTED)
>> describe BLACKLIST_SPF Meta: Blacklisted spf senders
>> score BLACKLIST_SPF 5.0
>>
>> meta WHITELIST_SPF (!BLACKLIST_SPF)
>> describe WHITELIST_SPF Meta: whitelist based on not spf fail
>> score WHITELIST_SPF -5.0
>>
>> not tested but should be it, i will test it on my corpus to verify it
>> works, i just writed it from my mind here so might be something i
>> missed
>
> Did you ever test this, and what results?

yes i have now, found it simple to just score on __SPF_NOT_PASS

will have to see later how bad my rules works else

i just posted here in case some could verify it also, it might be very bad
rule, but it might also works

i forget to think about the SPF_HELO_PASS might be usefull for forwards

-- 
http://localhost/ 100% uptime and 100% mirrored :)

Reply via email to