Hi,
> I have the server's IP address (y.y.y.y) in my lists of trusted and internal
> as so:
> trusted_networks xx.xx.xx.xx
> trusted_networks y.y.y.y
> trusted_networks z.z.z.z
>
> internal_networks xx.xx.xx.xx
> internal_networks y.y.y.y
> internal_networks z.z.z.z
>
> I don't see that that made
Hi all, does anyone know what happened to spamcannibal? Until early
last week I was using them with rbldnsd and their malware/IP zone
files, but they dropped off the Internet.
It would be interesting/helpful to know what happened and if they're
ever coming back...
Perhaps you know of another such
On 8/6/2017 1:37 PM, Scott wrote:
I have a logwatch output that gets mailed to me daily. Spamassassin is
scoring it high enough as exceed my threshold for whacking it as spam.
Please subscribe to the list for future posts.
However, I would argue that this is expected behavior because your
log
Centos7
Posftfix 3.2.2
Amavisd 2.11.0
spamassassin-3.4.0
I have a logwatch output that gets mailed to me daily. Spamassassin is
scoring it high enough as exceed my threshold for whacking it as spam.
While this is not good, I'm concerned I have something fundamental
misconfigured where it would
> I currently add bayes token information and relay information as headers to
> each msg processed. Especially relay information can be helpful ex if you
> have a script that parses received headers. With such headers thats much more
> easy, just look for the first untrusted hop
Tobi: Thank y
I currently add bayes token information and relay information as headers to
each msg processed. Especially relay information can be helpful ex if you have
a script that parses received headers. With such headers thats much more easy,
just look for the first untrusted hop
I think I found th elist. "TEMPLATE TAGS"
http://spamassassin.apache.org/full/3.4.x/doc/Mail_SpamAssassin_Conf.html#template_tags
--
View this message in context:
http://spamassassin.1065346.n5.nabble.com/Header-tests-shown-tp137911p137912.html
Sent from the SpamAssassin - Users mailing lis