El día Wednesday, November 25, 2015 a las 12:07:12PM +0100, Edda escribió:

> >>        'check_rbl_envfrom',
> >> +    'check_dsn_rdns',
> >          ^^^^^^^^^^^^^^
> >>        'check_dns_sender',
> >>      ];
> >>
> >> @@ -373,6 +374,25 @@
> >>      }
> >>    }
> >>
> >> +sub check_dns_rdns {
> >         ^^^^^^^^^^^^^^
> >
> >
> Ouch, sorry, i tested it on 3.3.1 and "re-typed" that line in 3.4.1....

Note: for 3.4.0 one must change as well:

+  } elsif ($question->qtype =~ /^(PTR)$/ &&
+      $packet->header->rcode =~ /^(?:NXDOMAIN|SERVFAIL)$/)

to:

+   } elsif ($question->qtype =~ /^(PTR)$/ &&
+       $pkt->header->rcode =~ /^(?:NXDOMAIN|SERVFAIL)$/)


> Does the patch work for you?

Seems so. I invalidated the IP addr in the Received: line in question
to:

  Received: from [12.82.97.1] (helo=nm33-vm3.bullet.mail.ir2.yahoo.com)
        by ms-10.1blu.de with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16)
        (Exim 4.76)

This gives:

Content analysis details:   (-2.2 points, 3.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 1.0 NO_RDNS_FOR_LAST_EXTERNAL DNS: Last External really has no rdns
-4.0 BAYES_00               BODY: Bayes spam probability is 0 to 1%
                            [score: 0.0000]
 0.8 RDNS_NONE              Delivered to internal network by a host with no rDNS

I think we can close this thread now :-)

        matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045

Reply via email to