I've attached the one that just got through. spamassassin -t reports the
following for it:
0.8 EXTRA_MPART_TYPE Header has extraneous Content-type:...type=
entry
2.9 HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname (Split
IP)
1.3 RCVD_NUMERIC_HELO Received: contains an IP address used for HELO
0.0 HTML_MESSAGE BODY: HTML included in message
0.8 SARE_GIF_ATTACH FULL: Email has a inline gif
Well, I get
Content analysis details: (12.2 points, 4.6 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.7 HOST_EQ_D_D_D_D HOST_EQ_D_D_D_D
0.9 HOST_EQ_D_D_D_DB HOST_EQ_D_D_D_DB
0.8 HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname (Split
IP)
1.1 HELO_EQ_IP_ADDR HELO using IP Address (not private)
0.1 RCVD_BY_IP Received by mail server with no name
0.3 IP_NOT_FRIENDLY IP_NOT_FRIENDLY
1.2 RCVD_NUMERIC_HELO Received: contains an IP address used for HELO
0.2 HTML_20_30 BODY: Message is 20% to 30% HTML
0.0 HTML_MESSAGE BODY: HTML included in message
5.0 BAYES_99 BODY: Bayesian spam probability is 99 to 100%
[score: 0.9948]
0.8 SARE_GIF_ATTACH FULL: Email has a inline gif
0.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
[Blocked - see
<http://www.spamcop.net/bl.shtml?67.134.10.152>]
0.9 FM_NO_STYLE FM_NO_STYLE
Now 5 points is from Bayes_99. But even without that it seems to do pretty
well.
Loren