I've attached the one that just got through. spamassassin -t reports the following for it:

0.8 EXTRA_MPART_TYPE Header has extraneous Content-type:...type= entry
2.9 HELO_DYNAMIC_SPLIT_IP  Relay HELO'd using suspicious hostname (Split
                           IP)
1.3 RCVD_NUMERIC_HELO      Received: contains an IP address used for HELO
0.0 HTML_MESSAGE           BODY: HTML included in message
0.8 SARE_GIF_ATTACH        FULL: Email has a inline gif

Well, I get

Content analysis details:   (12.2 points, 4.6 required)

pts rule name              description
---- ---------------------- --------------------------------------------------
0.7 HOST_EQ_D_D_D_D        HOST_EQ_D_D_D_D
0.9 HOST_EQ_D_D_D_DB       HOST_EQ_D_D_D_DB
0.8 HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname (Split IP)
1.1 HELO_EQ_IP_ADDR        HELO using IP Address (not private)
0.1 RCVD_BY_IP             Received by mail server with no name
0.3 IP_NOT_FRIENDLY        IP_NOT_FRIENDLY
1.2 RCVD_NUMERIC_HELO      Received: contains an IP address used for HELO
0.2 HTML_20_30             BODY: Message is 20% to 30% HTML
0.0 HTML_MESSAGE           BODY: HTML included in message
5.0 BAYES_99               BODY: Bayesian spam probability is 99 to 100%
                           [score: 0.9948]
0.8 SARE_GIF_ATTACH        FULL: Email has a inline gif
0.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
[Blocked - see <http://www.spamcop.net/bl.shtml?67.134.10.152>]
0.9 FM_NO_STYLE            FM_NO_STYLE

Now 5 points is from Bayes_99. But even without that it seems to do pretty well.

       Loren

Reply via email to