OK that makes sense... I thought there might be a reason... problem is
that due to the following router:
spamcheck_director:
driver = manualroute
domains = ${lookup mysql {MYSQL_Q_SPAMC}{$value}}
senders = ! ${lookup mysql {MYSQL_Q_WHITELIST}{$value}}
condition = ${if and { \
{!eq {$received_protocol}{spam-scanned}} \
{!eq {$received_protocol}{local}} \
} {1}{0}}
headers_remove = X-Spam-Flag
route_list = "* localhost byname"
transport = spamcheck
verify = false
Any messages which have a MAIL FROM of <> are not being passed through
spamassasin..
Can anyone help me ensure that spammers can't bypass spamassassin by
avoiding providing a MAIL FROM ?
Jonathan
On 9 Sep 2009, at 14:00, Brett Parker wrote:
> On 09 Sep 11:01, Jonathan Gilpin wrote:
>>
>> On an exim server:
>>
>> Sending:
>>
>> MAIL FROM: <>
>> 250 OK
>>
>> Surely I need to prevent this from being allowed? How can I make Exim
>> reject a message if MAIL FROM: is blank?
>
> No, MAIL FROM being NULL is perfectly within the specification, and is
> how bounces will be sent...
>
> Rejecting them would mean that you never get any bounce messages,
> which
> could be a bonus, but probably isn't.
>
> --
> Brett Parker
>
> --
> ## List details at http://lists.exim.org/mailman/listinfo/exim-users
> ## Exim details at http://www.exim.org/
> ## Please use the Wiki with this list - http://wiki.exim.org/