On Wed, 2009-12-02 at 17:00 +0100, Michael Wyraz wrote: > Hi Steve, > > both patches are not from me but from distribution maintainers. > > The first (http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510665) > is about a missing whitespace and a missing closing bracket. The > result is a "UNPARSEABLE_RELAY" which can lead to high spam score if > so configured. > > The 2nd is that milter passes the mail to spamassassin before postfix > write it's "received" header (applies only if spam check is made > during smtp dialog). So in this phase there's no information about the > authenticated user. If you have checks for dynamic ip or so, this > leads to high score because the mails appears to be from an > non-authenticated user. There's a patch available at > http://src.linuxhacker.at/products/spamass-milter/spamass-milter-0.3.1/debian/patches/15_spamass-milter-auth-ssf.patch > but if relies on "auth_ssf" macro which is not available on postfix (so it's > better to use the "auth_authen" macro instead which is a minimal change). > That's fine for those affected, but for me with quite a height volume of mail it's never been an issue.
_______________________________________________ Spamass-milt-list mailing list [email protected] http://lists.nongnu.org/mailman/listinfo/spamass-milt-list
