On Mon, 2013-12-02 at 07:58 +1000, Nick Edwards wrote:
> On 12/1/13, Karsten Bräckelmann wrote:
> > The general SA method of verifying which domains are queried for, is to
> > have a look at the debug output. In your case, you can also check your
> > local DNSBL's logs.
> >
> > spamassassin -D
Hi Karsten,
On 12/1/13, Karsten Bräckelmann wrote:
> On Fri, 2013-11-29 at 13:30 +1000, Nick Edwards wrote:
>> Hi, have a problem with our internal uribl
>>
>> urirhsblINT_URI uri.int.lan. A
>> bodyINT_URI eval:check_uridnsbl('INT_URI')
>> describeINT_URI Contains a UR
On Fri, 2013-11-29 at 13:30 +1000, Nick Edwards wrote:
> Hi, have a problem with our internal uribl
>
> urirhsblINT_URI uri.int.lan. A
> bodyINT_URI eval:check_uridnsbl('INT_URI')
> describeINT_URI Contains a URI listed in internal URIBL
> tflags INT_URI net
>
Nick Edwards skrev den 2013-11-29 04:30:
urirhsblINT_URI uri.int.lan. A
bodyINT_URI eval:check_uridnsbl('INT_URI')
describeINT_URI Contains a URI listed in internal URIBL
tflags INT_URI net
score INT_URI 3
rule is okay as designed
this rule perf