summaryrefslogtreecommitdiff
path: root/mail/spamassassin/patches/patch-ai
blob: d4ba682367a30efb84eb2b89b1aa5057a7586501 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
$NetBSD: patch-ai,v 1.3 2003/09/03 13:08:06 atatat Exp $

--- rules/20_head_tests.cf.orig	2003-05-12 15:15:34.000000000 -0400
+++ rules/20_head_tests.cf
@@ -230,36 +230,6 @@ describe FAKED_IP_IN_RCVD	Received: cont
 header SMTPD_IN_RCVD		Received =~ /\(SMTPD32-\d+\..+\)/
 describe SMTPD_IN_RCVD		Received via SMTPD32 server (SMTPD32-n.n)
 
-# Multizone / Multi meaning BLs first
-
-# Osirusoft, like MAPS RBL+ is a multi-meaning BL, so it is treated separately
-header RCVD_IN_OSIRUSOFT_COM	rbleval:check_rbl('osirusoft', 'relays.osirusoft.com.')
-describe RCVD_IN_OSIRUSOFT_COM	Received via a relay in relays.osirusoft.com
-tflags RCVD_IN_OSIRUSOFT_COM    net
-
-# X prefix was used to insure that it was run at the end, but it's not needed
-# anymore since we run the rule with rblreseval -- Marc
-header X_OSIRU_OPEN_RELAY	rbleval:check_rbl_results_for('osirusoft', '127.0.0.2')
-describe X_OSIRU_OPEN_RELAY	DNSBL: sender is Confirmed Open Relay
-tflags X_OSIRU_OPEN_RELAY	net
-
-header X_OSIRU_DUL		rbleval:check_rbl_results_for('osirusoft', '127.0.0.3')
-describe X_OSIRU_DUL		DNSBL: sender ip address in in a dialup block
-tflags X_OSIRU_DUL		net
-
-header X_OSIRU_SPAM_SRC		rbleval:check_rbl_results_for('osirusoft', '127.0.0.4')
-describe X_OSIRU_SPAM_SRC	DNSBL: sender is Confirmed Spam Source
-tflags X_OSIRU_SPAM_SRC         net
-
-header X_OSIRU_SPAMWARE_SITE	rbleval:check_rbl_results_for('osirusoft', '127.0.0.6')
-describe X_OSIRU_SPAMWARE_SITE	DNSBL: sender is a Spamware site or vendor
-tflags X_OSIRU_SPAMWARE_SITE    net
-
-header X_OSIRU_DUL_FH		rbleval:check_rbl('osirusoft-dul-firsthop', 'relays.osirusoft.com.')
-describe X_OSIRU_DUL_FH		Received from first hop dialup listed in relays.osirusoft.com
-tflags X_OSIRU_DUL_FH           net nice
-
-
 # Now, single zone BLs follow:
 # the new first arg for check_rbl() indicates what type of check it is;
 # each type of check is stored in a separate set, and if an IP has already