https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6062

           Summary: barracude headers triggers FP on WEIRD_PORT
           Product: Spamassassin
           Version: 3.2.5
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: Rules
        AssignedTo: dev@spamassassin.apache.org
        ReportedBy: scheid...@secnap.net


the inclusion of an email forwared from a barracuda, with 'headers' included,
and this in the email:


x-barracuda-url:http://10.10.20.91:8000/cgi-bin/mark.cgi

which is possible in every email outbound from a barracuda, rule triggers
'WEIRD_PORT'

suggest excluding '^x-barracuda-url:http' from WEIRD_PORT tests.


rule has low score (0.001) UNLESS BAYES OR NET NOT ACTIVE

score WEIRD_PORT 1.599 1.499 1.089 0.001

(a 1.6 score could block an email from barracuda users, again, only if a full
email, with headers is sent)


-- 
Configure bugmail: 
https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

Reply via email to