It's worth checking this; that rule should fire only if the
mail really *did* come from Vonage.  I suspect a bug in how your
mailserver's Received headers are parsed.

Could you post:

  - a sample of a spam that passed this, with all headers
  - output of "spamassassin -D -L -t < spam", the lines with
    'received-header' and 'metadata' at least

--j.

Paul Boven writes:
> Hi everyone,
> 
> Paul Boven wrote:
> 
> > One of my users just spotted a FN that had managed to slip trough. 
> > They're abusing 70_sare_whitelist.cf, specifically:
> > 
> > whitelist_from_rcvd   [EMAIL PROTECTED]                 vonage.com
> >       # Vonage voice mail notification
> 
> I'm now catching these on several mailservers that we run, so I'm 
> assuming this is getting abused quite a bit. And it's very effective 
> because the default score for whitelist_from_rcvd is -100. What worries 
> me is that whitelist_from_rcvd gets triggered, even though the mail 
> obviously is forged, unless vonage sends their mails from China.
> 
> So my question is, still, why does the email (see my previous posting 
> for headers) hit the whiltelist_from_rcvd? Is my trusted networks 
> confused? Does it get hit because the mail was processed by the 
> (trusted) backup-MX first?
> 
> Regards, Paul Boven.

Reply via email to