(You got other good advice; I'll try to avoid being redundant.)

This looks like it really came from comcast's servers, but it's hard to
read headers that have been miswrapped.

I tend to tweak up scores of rules that fire on spam that slips through,
and tweak down scores of rules that misfire on ham.

I would recommend running spamassassin -t on this to see what points are
from what rules; the passing score doesn't show this but if you use -t
you'll see it all at the end.

RCVD_IN_DNSWL_HI really seems strange.  Perhaps comcast has separate IP
blocks for mail from them, and mail from customers (verizon for example,
back when they did customer mail, had verizon.com and verizon.net, which
I suspect had separate MTAs).  I really don't understand DNSWL listing
criteria for HI, but to me that should indicated that there is a
vanishly small chance of spam, and that more or less means only
company-originated mail, and definitely not mail sent by random
customers some of whom might have compromised accounts.

So I would look to moderate the negative score from DNSWL_HIGH, as you
have a counterexample to the ham-only theory.

Attachment: signature.asc
Description: PGP signature

Reply via email to