[prev in list] [next in list] [prev in thread] [next in thread] 

List:       spamassassin-devel
Subject:    [Bug 6535] Unparseable received header for authenticated mail sent
From:       bugzilla-daemon () issues ! apache ! org
Date:       2011-01-19 22:01:49
Message-ID: 201101192201.p0JM1mT1007587 () thor ! apache ! org
[Download RAW message or body]

https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6535

--- Comment #11 from Steve Freegard <steve.freegard@fsl.com> 2011-01-19 17:01:43 UTC ---
 > It's also one of the reasons that I disagree with Barracuda's recommendation
to
> use "deep header parsing".  It's the same thing as not using last-external
> relay and we know it has FPs especially due to DHCP pools.

Just wanted to make a further point here.

The Barracuda saga was caused by the deep-header parsing using RBLs that stated
they shouldn't be used for that purpose *and* they were doing this at SMTP time
(e.g. as a boolean accept/reject).

Here - we're scoring on it; and that's by design.  The RCVD_IN_BL_SPAMCOP_NET
has gone through the scoring process as a deep-header parsing test and been
scored accordingly because of that.

Which also gives me the idea; why don't you add a -lastexternal variant of the
SpamCop lookup to your sandbox and see how it fares in the mass-checks compared
to the current version.

To continue Mark's point about non-parsing of a Received header as a bug;
consider that the patch I provided doesn't just supply the IP address of that
hop; but also the HELO used by that host (which *is* definitely useful in
rules).

-- 
Configure bugmail: https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic