On Sun, 17 Feb 2002, Daniel Rogers wrote: > It seems I've been getting a lot of spam lately that has a valid MX, > but the MX is 127.0.0.1 (loopback). Any chance we could add a test for > this?
That will break a large number of legitimate uses of email forwarding, notably mine.[1] I use the Unix fetchmail(1) command to collect email from a number of IMAP and POP3 accounts around the Internet, some directly and some through various secure tunnels. It picks up this email, adds a recieved line for itself, then forwards the email to 127.0.0.1:25 via SMTP. This means that *every* piece of email I read on my laptop would match this test. This is, incidentally, the default behavior of fetchmail; while it will tolerate other delivery methods it's not exactly happy about it. Daniel Footnotes: [1] I seem to run a somewhat odd email setup, given the number of times I have said this about suggested tests recently. Hopefully no one is /too/ annoyed yet. :) -- When you steal from one author, it's plagiarism; if you steal from many, it's research. -- Wilson Mizner _______________________________________________ Spamassassin-talk mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/spamassassin-talk