On Sun, 17 Feb 2002, Daniel Rogers wrote:
> It seems I've been getting a lot of spam lately that has a valid MX,
> but the MX is 127.0.0.1 (loopback). Any chance we could add a test for
> this?

That will break a large number of legitimate uses of email forwarding,
notably mine.[1]

I use the Unix fetchmail(1) command to collect email from a number of
IMAP and POP3 accounts around the Internet, some directly and some
through various secure tunnels.

It picks up this email, adds a recieved line for itself, then forwards
the email to 127.0.0.1:25 via SMTP.

This means that *every* piece of email I read on my laptop would match
this test.


This is, incidentally, the default behavior of fetchmail; while it will
tolerate other delivery methods it's not exactly happy about it.

        Daniel

Footnotes: 
[1]  I seem to run a somewhat odd email setup, given the number of times
     I have said this about suggested tests recently. Hopefully no one
     is /too/ annoyed yet. :)

-- 
When you steal from one author, it's plagiarism;
if you steal from many, it's research.
        -- Wilson Mizner

_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to