El día Wednesday, November 25, 2015 a las 12:07:12PM +0100, Edda escribió:
> >> 'check_rbl_envfrom', > >> + 'check_dsn_rdns', > > ^^^^^^^^^^^^^^ > >> 'check_dns_sender', > >> ]; > >> > >> @@ -373,6 +374,25 @@ > >> } > >> } > >> > >> +sub check_dns_rdns { > > ^^^^^^^^^^^^^^ > > > > > Ouch, sorry, i tested it on 3.3.1 and "re-typed" that line in 3.4.1.... Note: for 3.4.0 one must change as well: + } elsif ($question->qtype =~ /^(PTR)$/ && + $packet->header->rcode =~ /^(?:NXDOMAIN|SERVFAIL)$/) to: + } elsif ($question->qtype =~ /^(PTR)$/ && + $pkt->header->rcode =~ /^(?:NXDOMAIN|SERVFAIL)$/) > Does the patch work for you? Seems so. I invalidated the IP addr in the Received: line in question to: Received: from [12.82.97.1] (helo=nm33-vm3.bullet.mail.ir2.yahoo.com) by ms-10.1blu.de with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.76) This gives: Content analysis details: (-2.2 points, 3.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 1.0 NO_RDNS_FOR_LAST_EXTERNAL DNS: Last External really has no rdns -4.0 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] 0.8 RDNS_NONE Delivered to internal network by a host with no rDNS I think we can close this thread now :-) matthias -- Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/ ☎ +49-176-38902045