On Wed, 2009-12-02 at 17:00 +0100, Michael Wyraz wrote:
> Hi Steve,
> 
> both patches are not from me but from distribution maintainers.
> 
> The first (http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510665)
> is about a missing whitespace and a missing closing bracket. The
> result is a "UNPARSEABLE_RELAY" which can lead to high spam score if
> so configured.
> 
> The 2nd is that milter passes the mail to spamassassin before postfix
> write it's "received" header (applies only if spam check is made
> during smtp dialog). So in this phase there's no information about the
> authenticated user. If you have checks for dynamic ip or so, this
> leads to high score because the mails appears to be from an
> non-authenticated user. There's a patch available at
> http://src.linuxhacker.at/products/spamass-milter/spamass-milter-0.3.1/debian/patches/15_spamass-milter-auth-ssf.patch
>  but if relies on "auth_ssf" macro which is not available on postfix (so it's 
> better to use the "auth_authen" macro instead which is a minimal change).
> 
That's fine for those affected, but for me with quite a height volume of
mail it's never been an issue.




_______________________________________________
Spamass-milt-list mailing list
[email protected]
http://lists.nongnu.org/mailman/listinfo/spamass-milt-list

Reply via email to