You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spamassassin.apache.org by bu...@spamassassin.apache.org on 2020/04/06 09:28:16 UTC
[Bug 7805] Mail::SpamAssassin::Plugin::SPF passes the wrong
headers to MAIL::SPF when helo is initially invoked at external
relay.
https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7805
Giovanni Bechis <gi...@paclan.it> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |giovanni@paclan.it
--- Comment #1 from Giovanni Bechis <gi...@paclan.it> ---
I cannot reproduce it, the output of a spamassassin check for the attached
message follows:
------------------------------------------------------------------------------
Content analysis details: (1.4 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.1 TO_MALFORMED To: has a malformed address
0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record
-0.0 SPF_PASS SPF: sender matches SPF record
0.0 HTML_MESSAGE BODY: HTML included in message
1.1 KAM_REALLYHUGEIMGSRC RAW: Spam with image tags with ridiculously
huge http urls
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
0.1 DKIM_INVALID DKIM or DK signature exists, but is not valid
0.0 UNPARSEABLE_RELAY Informational: message has unparseable relay
lines
0.0 KAM_DMARC_STATUS Test Rule for DKIM or SPF Failure with Strict
Alignment
------------------------------------------------------------------------------
Which Mail::SPF version are you using ?
Other than that I think a there could be a dns-related problem in your setup.
Please follow
https://cwiki.apache.org/confluence/display/SPAMASSASSIN/DnsBlocklists#dnsbl-block
to fix at least SURBL_BLOCKED warning.
--
You are receiving this mail because:
You are the assignee for the bug.