You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@spamassassin.apache.org by qu...@apache.org on 2004/05/06 07:40:46 UTC
svn commit: rev 10540 - incubator/spamassassin/trunk/rules
Author: quinlan
Date: Wed May 5 22:40:46 2004
New Revision: 10540
Modified:
incubator/spamassassin/trunk/rules/70_testing.cf
Log:
so long, goodbye
Modified: incubator/spamassassin/trunk/rules/70_testing.cf
==============================================================================
--- incubator/spamassassin/trunk/rules/70_testing.cf (original)
+++ incubator/spamassassin/trunk/rules/70_testing.cf Wed May 5 22:40:46 2004
@@ -26,10 +26,6 @@
#
########################################################################
-header T_RCVD_IN_BOGUSMX eval:check_rbl_from_host('rfci-bmx', 'bogusmx.rfc-ignorant.org.')
-describe T_RCVD_IN_BOGUSMX Received via a relay in BogusMX (rfc-ignorant.org)
-tflags T_RCVD_IN_BOGUSMX net
-
# partial messages; currently-theoretical attack
# unsurprisingly this hits 0/0 right now. But should we promote it anyway
# to protect against the possibility?
@@ -731,15 +727,6 @@
tflags T_S41_S9_GT_5_5 net
########################################################################
-
-# HELO hits we're losing due to bug fix in SPF module
-header __HELO_ONE_WORD_1_A X-Spam-Relays-Untrusted =~ / helo=[^.]+(?:\s|$)/
-header __HELO_ONE_WORD_2_A X-Spam-Relays-Trusted =~ / helo=[^.]+(?:\s|$)/
-meta HELO_ONE_WORD_A (__HELO_ONE_WORD_1_A || __HELO_ONE_WORD_2_A)
-
-header __HELO_ONE_WORD_1_B X-Spam-Relays-Untrusted !~ /helo=[^.]+\.[^.]+/ [if-unset: helo=foo.bar]
-header __HELO_ONE_WORD_2_B X-Spam-Relays-Trusted !~ /helo=[^.]+\.[^.]+/ [if-unset: helo=foo.bar]
-meta HELO_ONE_WORD_B (__HELO_ONE_WORD_1_B || __HELO_ONE_WORD_2_B)
# let's see how this works
meta T_SPF_PASS_NO_SBL (SPF_PASS && !RCVD_IN_SBL)