Hello, one of our users at a remote location is having her mail trashed by spamassassin.
Sep 28 12:48:43 nsmail spamd[199]: prefork: child states: II\n Sep 28 12:49:28 nsmail spamd[268]: spamd: connection from localhost [127.0.0.1] at port 50226\n Sep 28 12:49:28 nsmail spamd[268]: spamd: checking message <001101cb5f2d$1c3937b0$6629a...@traci> for (unknown):500\n Sep 28 12:49:29 nsmail spamd[268]: spamd: identified spam (288.2/5.0) for (unknown):500 in 1.2 seconds, 2345 bytes.\n Sep 28 12:49:29 nsmail spamd[268]: spamd: result: Y 288 - AWL,BAYES_40,DOS_OE_TO_MX,FAKE_REPLY_C scantime=1.2,size=2345,user=(unknown),uid=500,required_score=5.0,rhost=localhost,raddr=127.0.0.1,rport=50226,mid=<001101cb5f2d$1c3937b0$6629a...@traci>,bayes=0.297864,autolearn=no\n I'm trying to track down why this message is getting such a high score. I have been trying to find were the DOS_OE_TO_MX rule is and what it's score is set to, but can't find it anywhere. -- View this message in context: http://old.nabble.com/DOS_OE_TO_MX-tp29839497p29839497.html Sent from the SpamAssassin - Users mailing list archive at Nabble.com.