You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@spamassassin.apache.org by jm...@apache.org on 2006/10/16 19:04:58 UTC
svn commit: r464567 - /spamassassin/rules/trunk/sandbox/jm/VBounce.pm
Author: jm
Date: Mon Oct 16 10:04:57 2006
New Revision: 464567
URL: http://svn.apache.org/viewvc?view=rev&rev=464567
Log:
clarify doc text
Modified:
spamassassin/rules/trunk/sandbox/jm/VBounce.pm
Modified: spamassassin/rules/trunk/sandbox/jm/VBounce.pm
URL: http://svn.apache.org/viewvc/spamassassin/rules/trunk/sandbox/jm/VBounce.pm?view=diff&rev=464567&r1=464566&r2=464567
==============================================================================
--- spamassassin/rules/trunk/sandbox/jm/VBounce.pm (original)
+++ spamassassin/rules/trunk/sandbox/jm/VBounce.pm Mon Oct 16 10:04:57 2006
@@ -64,7 +64,11 @@
=item whitelist_bounce_relays hostname [hostname2 ...]
-The hostnames of relays that we trust to generate "good" bounce messages.
+This is used to 'rescue' legitimate bounce messages that were generated in
+response to mail you really *did* send. List the MTA relays that your outbound
+mail is delivered through. If a bounce message is found, and it contains one
+of these hostnames in a 'Received' header, it will not be marked as a blowback
+virus-bounce.
The hostnames can be file-glob-style patterns, so C<relay*.isp.com> will work.
Specifically, C<*> and C<?> are allowed, but all other metacharacters are not.