Hi all,

I'm curious about the RCVD_IN_SBL_CSS rule and its 3.5 score. Doesn't
this seem a bit high?

I'm already using postscreen to add 4 points to messages received with
zen/sbl with return code 127.0.0.3, but also seeing quite a few
RCVD_IN_SBL_CSS hits, so I'm assuming this is the result of the 4
postscreen points not being enough for it to be rejected outright,
then subsequently being tagged by spamassassin.

These are "deep header" rules, though. Should users be penalized so
severely for using a dynamic address when it may not have been them
responsible for sending the spam that blacklisted that IP?

Many times it's only the X-Originating-IP header:

X-Originating-IP: [197.211.53.34]

This may be the dynamic IP used by the end-user to connect to their
ISP. I'd appreciate any thoughts on how to handle these cases. The
full headers for this message are here:

http://pastebin.com/6b7MTeYa

Thanks,
Alex

Reply via email to