Bug 4657 - FP on FORGED_MUA_EUDORA rule
Summary: FP on FORGED_MUA_EUDORA rule
Status: RESOLVED FIXED
Alias: None
Product: Spamassassin
Classification: Unclassified
Component: Rules (Eval Tests) (show other bugs)
Version: 3.1.0
Hardware: All other
: P3 normal
Target Milestone: Undefined
Assignee: SpamAssassin Developer Mailing List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-11-01 20:28 UTC by Max Paperno
Modified: 2007-01-05 08:53 UTC (History)
1 user (show)



Attachment Type Modified Status Actions Submitter/CLA Status
Full headers of example message hitting this rule text/plain None Max Paperno [NoCLA]

Note You need to log in before you can comment on or make changes to this bug.
Description Max Paperno 2005-11-01 20:28:22 UTC
The FORGED_MUA_EUDORA is triggering on legitimate mail from 

X-Mailer: QUALCOMM Windows Eudora Version 5.1

Triggered rule:

*  2.5 FORGED_MUA_EUDORA Forged mail pretending to be from Eudora

Full headers from message will be attached.
Comment 1 Max Paperno 2005-11-01 20:36:03 UTC
Created attachment 3225 [details]
Full headers of example message hitting this rule
Comment 2 Justin Mason 2007-01-05 08:53:01 UTC
I think this is fixed -- hard to tell due to the over-mangled headers -- but
this is what it hits with svn trunk:

Content analysis details:   (1.7 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 0.0 TO_MALFORMED           To: has a malformed address
 1.0 FH_FROMEML_NOTLD       E-mail address doesn't have TLD (.com, etc.)
 1.0 FH_MSGID_XXX           Message-Id = @xxx
-0.0 SPF_PASS               SPF: sender matches SPF record
 0.0 UNPARSEABLE_RELAY      Informational: message has unparseable relay lines
-0.3 T_NICE_REPLY_B         T_NICE_REPLY_B



no FORGED_MUA_*.