https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6062
Summary: barracude headers triggers FP on WEIRD_PORT Product: Spamassassin Version: 3.2.5 Platform: Other OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: Rules AssignedTo: dev@spamassassin.apache.org ReportedBy: scheid...@secnap.net the inclusion of an email forwared from a barracuda, with 'headers' included, and this in the email: x-barracuda-url:http://10.10.20.91:8000/cgi-bin/mark.cgi which is possible in every email outbound from a barracuda, rule triggers 'WEIRD_PORT' suggest excluding '^x-barracuda-url:http' from WEIRD_PORT tests. rule has low score (0.001) UNLESS BAYES OR NET NOT ACTIVE score WEIRD_PORT 1.599 1.499 1.089 0.001 (a 1.6 score could block an email from barracuda users, again, only if a full email, with headers is sent) -- Configure bugmail: https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug.