Benny,

> Feb 19 10:02:25.354 [19195] dbg: spf: cannot get Envelope-From, cannot
> use SPF
> 
> is this why whitelist_from are the only one that works ?
> 
> first get it to work from local.cf, if this is working move the same
> rule to sql is the right way to test
> 
> if envelope-from is non default, then set it in local.cf, info here
> perldoc Mail::SpamAssassin::Conf
> 
> postfix is using Return-Path, if you are using another mta you may
> change this in the settings so spf does not say it does not find
> envelope-from as above

I'm using qmail, along with qmail-scanner-st, and I just added a patch so that 
qmail adds the envelope-from to the headers

It works; this is what the first header now looks like:

Received: from mail-ve0-f193.google.com (209.85.128.193)
  by myserver.com (envelope-from u...@gmail.com)
         with SMTP; 19 Feb 2013 22:12:37 -0000

If I run spamassassin using these params, I don't see any SPF errors:

spamassassin -D < email.msg 2>debug.log

[...]
Feb 19 17:39:22.803 [10817] dbg: spf: checking to see if the message has a 
Received-SPF header that we can use
Feb 19 17:39:22.848 [10817] dbg: spf: using Mail::SPF for SPF checks
Feb 19 17:39:22.848 [10817] dbg: spf: checking HELO 
(helo=falcon594.startdedicated.com, ip=69.64.33.211)
Feb 19 17:39:22.850 [10817] dbg: dns: providing a callback for id: 
55831/falcon594.startdedicated.com/SPF/IN
Feb 19 17:39:22.857 [10817] dbg: spf: query for 
/69.64.33.211/falcon594.startdedicated.com: result: none, comment: , text: No 
applicable sender policy available
Feb 19 17:39:22.858 [10817] dbg: spf: already checked for Received-SPF headers, 
proceeding with DNS based checks
Feb 19 17:39:22.858 [10817] dbg: spf: found Envelope-From in first external 
Received header
Feb 19 17:39:22.858 [10817] dbg: spf: checking EnvelopeFrom 
(helo=falcon594.startdedicated.com, ip=69.64.33.211, envfrom=nore...@sonico.com)
Feb 19 17:39:22.859 [10817] dbg: dns: providing a callback for id: 
65122/sonico.com/SPF/IN
Feb 19 17:39:22.941 [10817] dbg: spf: query for 
nore...@sonico.com/69.64.33.211/falcon594.startdedicated.com: result: fail, 
comment: Please see 
http://www.openspf.org/Why?s=mfrom&id=noreply%40sonico.com&ip=69.64.33.211&r=myserver.com,
 text: Mechanism '-all' matched
Feb 19 17:39:22.948 [10817] dbg: spf: def_spf_whitelist_from: already checked 
spf and didn't get pass, skipping whitelist check
Feb 19 17:39:22.949 [10817] dbg: rules: ran eval rule SPF_FAIL ======> got hit 
(1)
Feb 19 17:39:22.950 [10817] dbg: spf: whitelist_from_spf: already checked spf 
and didn't get pass, skipping whitelist check
Feb 19 17:39:23.222 [10817] dbg: rules: ran uri rule __LOCAL_PP_NONPPURL 
======> got hit: "http://www.openspf.org";
[...]

However, if I run spamassassin 2>&1 -D --lint | less I still see the error:

Feb 19 17:41:54.196 [11019] dbg: spf: cannot get Envelope-From, cannot use SPF
Feb 19 17:41:54.196 [11019] dbg: spf: def_spf_whitelist_from: could not find 
useable envelope sender

> i noticed you are using openprotect rule set with 99% depricated rule
> sets :(

/var/lib/spamassassin/3.002005/saupdates_openprotect_com.pre
/var/lib/spamassassin/3.002005/saupdates_openprotect_com
/var/lib/spamassassin/3.002005/saupdates_openprotect_com.cf
/var/lib/spamassassin/3.003001/saupdates_openprotect_com.pre
/var/lib/spamassassin/3.003001/saupdates_openprotect_com
/var/lib/spamassassin/3.003001/saupdates_openprotect_com.cf
/var/lib/spamassassin/3.002004/saupdates_openprotect_com.pre
/var/lib/spamassassin/3.002004/saupdates_openprotect_com
/var/lib/spamassassin/3.002004/saupdates_openprotect_com.cf
/var/lib/spamassassin/3.003002/saupdates_openprotect_com.pre
/var/lib/spamassassin/3.003002/saupdates_openprotect_com
/var/lib/spamassassin/3.003002/saupdates_openprotect_com.cf

I can simply delete them, correct? 
 
> why not just use spamassassin rule sets ?

Most likely from previous SA versions
 
Thanks for your help btw!

Reply via email to