You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@spamassassin.apache.org by jm...@apache.org on 2006/10/16 19:04:58 UTC

svn commit: r464567 - /spamassassin/rules/trunk/sandbox/jm/VBounce.pm

Author: jm
Date: Mon Oct 16 10:04:57 2006
New Revision: 464567

URL: http://svn.apache.org/viewvc?view=rev&rev=464567
Log:
clarify doc text

Modified:
    spamassassin/rules/trunk/sandbox/jm/VBounce.pm

Modified: spamassassin/rules/trunk/sandbox/jm/VBounce.pm
URL: http://svn.apache.org/viewvc/spamassassin/rules/trunk/sandbox/jm/VBounce.pm?view=diff&rev=464567&r1=464566&r2=464567
==============================================================================
--- spamassassin/rules/trunk/sandbox/jm/VBounce.pm (original)
+++ spamassassin/rules/trunk/sandbox/jm/VBounce.pm Mon Oct 16 10:04:57 2006
@@ -64,7 +64,11 @@
 
 =item whitelist_bounce_relays hostname [hostname2 ...]
 
-The hostnames of relays that we trust to generate "good" bounce messages.
+This is used to 'rescue' legitimate bounce messages that were generated in
+response to mail you really *did* send.  List the MTA relays that your outbound
+mail is delivered through.  If a bounce message is found, and it contains one
+of these hostnames in a 'Received' header, it will not be marked as a blowback
+virus-bounce.
 
 The hostnames can be file-glob-style patterns, so C<relay*.isp.com> will work.
 Specifically, C<*> and C<?> are allowed, but all other metacharacters are not.