converted to 1.6 markup
|Deletions are marked like this.||Additions are marked like this.|
|Line 14:||Line 14:|
|The default scores for this rule can be found [http://spamassassin.apache.org/tests.html in the online list of tests].||The default scores for this rule can be found [[http://spamassassin.apache.org/tests.html|in the online list of tests]].|
|Line 16:||Line 16:|
|See also [:Rules/HELO_DYNAMIC_IPADDR]||See also [[Rules/HELO_DYNAMIC_IPADDR]]|
SpamAssassin Rule: FH_HELO_EQ_D_D_D_D
Standard description: Helo is d-d-d-d
This rule checks the HELO identifier of the last untrusted relay and matches if the HELO argument contains four numbers (1 to three digits in length) separated by dashes. This is a common method for encoding IPv4 addresses into reverse DNS entries for dynamically allocated address ranges.
Since it is not usually expected that servers are given canonical hostnames that encode their IPv4 addresses, the means that the mailer process is probably using information from reverse DNS for its configuration. This indicates that it is not a normally configured mail server, and may well be a bot running on a hijacked PC.
The default scores for this rule can be found in the online list of tests.
See also Rules/HELO_DYNAMIC_IPADDR