On Thu, May 21, 2009 07:10, LuKreme wrote: > On 8-May-2009, at 19:20, Benny Pedersen wrote: >> meta __SPF_NOT_PASS (!SPF_PASS) >> meta __NOT_LOCAL_TRUSTED (!NO_RELAYS || !ALL_TRUSTED) >> meta BLACKLIST_SPF (__SPF_NOT_PASS && __NOT_LOCAL_TRUSTED) >> describe BLACKLIST_SPF Meta: Blacklisted spf senders >> score BLACKLIST_SPF 5.0 >> >> meta WHITELIST_SPF (!BLACKLIST_SPF) >> describe WHITELIST_SPF Meta: whitelist based on not spf fail >> score WHITELIST_SPF -5.0 >> >> not tested but should be it, i will test it on my corpus to verify it >> works, i just writed it from my mind here so might be something i >> missed > > Did you ever test this, and what results?
yes i have now, found it simple to just score on __SPF_NOT_PASS will have to see later how bad my rules works else i just posted here in case some could verify it also, it might be very bad rule, but it might also works i forget to think about the SPF_HELO_PASS might be usefull for forwards -- http://localhost/ 100% uptime and 100% mirrored :)