Thanks for your answer Harald. 

Regarding "there is no such configuration option in SpamAssassin":  The conf 
snipplet I posted below comes from the repository, however it's an older 
version, which still is supported by Ubuntu 20.04.06 LTS and can be installed 
from their related archive (at least my rules where last updated in March 23). 
https://github.com/apache/spamassassin/blob/spamassassin_release_3_4_4/trunk-only/rules/20_dnsbl_tests.cf
 (the same is used up to 3.4.6)
I should have written I'm on an older Ubuntu, might have helped to avoid 
confusion. 

Regarding the SpamAssassin 4.x rules - are they backward compatible to 3.4.4?

Thanks a lot
Mark





-----Ursprüngliche Nachricht-----
Von: Reindl Harald (privat) [mailto:ha...@rhsoft.net] 
Gesendet: Donnerstag, 6. Juni 2024 16:29
An: hostmas...@audiogen.ch; users@spamassassin.apache.org
Betreff: Re: RCVD_IN_RP_CERTIFIED always -3

"RCVD_IN_RP_CERTIFIED" don't exist anywhere and the stuff which exsists 
is correctly using response-codes

the nonsense below would also trigger with 127.255.255.255 responses 
which indicates you are using a shared DNS - complain to the individual 
which was writing blacklist/whitelist rules without response codes - 
that don't happen in any official rules because it's plain wrong

header RCVD_IN_VALIDITY_CERTIFIED     eval:check_rbl('ssc-firsttrusted', 
'sa-trusted.bondedsender.org.', '^127\.0\.0\.')
describe RCVD_IN_VALIDITY_CERTIFIED   Sender in Validity Certification - 
Contact certificat...@validity.com
tflags RCVD_IN_VALIDITY_CERTIFIED     net nice publish
reuse RCVD_IN_VALIDITY_CERTIFIED      RCVD_IN_RP_CERTIFIED
header RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 
eval:check_rbl('ssc-firsttrusted', 'sa-trusted.bondedsender.org.', 
'127.255.255.255')
describe RCVD_IN_VALIDITY_CERTIFIED_BLOCKED  ADMINISTRATOR NOTICE: The 
query to Validity was blocked.  See 
https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more 
information.
tflags RCVD_IN_VALIDITY_CERTIFIED_BLOCKED    net publish
reuse RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 
RCVD_IN_VALIDITY_CERTIFIED_BLOCKED

Am 06.06.24 um 14:13 schrieb hostmas...@audiogen.ch:
> Every email postfix receives gets a RCVD_IN_RP_CERTIFIED=-3 score. This 
> leads to SPAM passing the filter.
> 
> My findings so far
> 
>  From what I think I understood, RCVD_IN_RP_CERTIFIED checks against a 
> list of “trusted” servers, which are considered to not send SPAM. The 
> list is maintained by “Return Path” (Validity). I found the related 
> configuration in 20_dnsbl_tests.cf:
> 
> /# 
> ---------------------------------------------------------------------------/
> 
> /# Return Path Certified:/
> 
> /# https://www.returnpath.net/internetserviceprovider/certification//
> 
> /# (replaces RCVD_IN_BSP_TRUSTED, RCVD_IN_BSP_OTHER, 
> RCVD_IN_SSC_TRUSTED_COI)/
> 
> /header RCVD_IN_RP_CERTIFIED     eval:check_rbl_txt('ssc-firsttrusted', 
> 'sa-trusted.bondedsender.org.')/
> 
> /describe RCVD_IN_RP_CERTIFIED   Sender in ReturnPath Certified - 
> Contact cert...@returnpath.net/
> 
> /tflags RCVD_IN_RP_CERTIFIED     net nice/
> 
> /reuse RCVD_IN_RP_CERTIFIED/
> 
> It seems Returnpath/Validity have gone out of service  - is this 
> correct? Neither the URL above is working nor can I resolve 
> sa-trusted.bondedsender.org. Even worse, sa-trusted.bondedsender.org is 
> blacklisted by UCEPROTECTL3.
> 
> If RP is dead, is there an alternative? Or am I missing something here?



Reply via email to