I recently got a spam that appears to be certified by returnpath (again,
but that's not the point of this mail).  The results, from running
spamassassin -t, are appended.  The DNSWL_NONE hit has the IP address
that hit, but the RP_ rules do not.   I think it should be policy that
any dnsbl hit, positive or negative, but especially negative, should
specify the matching data (IP, domain name, etc.).

Content analysis details:   (-3.5 points, 1.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
-0.0 RCVD_IN_DNSWL_NONE     RBL: Sender listed at http://www.dnswl.org/, no
                            trust
                            [167.216.129.184 listed in list.dnswl.org]
-3.0 RCVD_IN_RP_CERTIFIED   RBL: Sender is in Return Path Certified (trusted
                             relay)
                            [Return Path SenderScore Certified {formerly]
                      [Bonded Sender} - <http://www.senderscorecertified.com>]
-2.0 RCVD_IN_RP_SAFE        RBL: Sender is in Return Path Safe (trusted relay)
                            [Return Path SenderScore Safe List (formerly]
                    [Habeas Safelist) - <http://www.senderscorecertified.com>]
 0.0 HTML_MESSAGE           BODY: HTML included in message
 1.1 BAYES_50               BODY: Bayes spam probability is 40 to 60%
                            [score: 0.5000]
 0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily 
valid
 0.0 RCVD_NOT_IN_IPREPDNS   Sender not listed at
                            http://www.chaosreigns.com/iprep/
 0.2 DKIM_FORGED            DKIM_FORGED
 0.0 T_DKIM_INVALID         DKIM-Signature header exists but is not valid
 0.1 KHOP_RCVD_UNTRUST      DNS-whitelisted sender is not verified

Attachment: pgp2fKeawZPta.pgp
Description: PGP signature

Reply via email to