Date: Sat, 01 Dec 2012 11:42:17 -0400
From: "WINSERVER SUPPORT" <
winserver.support@winserver.com>
To: all
Subject: New SMTPFILTER-SPFEVAL script.
Newsgroups: win.server.program
Message-ID: <
1354380113.32.0@winserver.com>
X-Mailer: Wildcat! Interactive Net Server v7.0.454.5
Lines: 126
The attached script is designed to pass SPF whitelisted domains with Received-SPF: PASS results. The comments in the script should
explain how to use it and how it
works.
Let me know if you plan to use this.
--
Hector, Engineering & Technical Support
Santronics Software, Inc.
http://www.santronics.com (sales)
http://www.winserver.com (support)
http://www.winserver.com/AupInfo (Online AUP Help)
Office: 305-248-3204
////////////////////////////////////////////////////////////////////
// file : smtpfilter-spfeval.wcc
// date : 11/29/2012 12:25 pm
// about : check/accept whitelisted SPF domains with PASS results.
// author : HLS/SSI
// usage :
//
// Add script name, smtpfilter-spfeval, to the [hooks] section in
// order you wish, how, the intent of this script it to short-circuit
// or pre-empt the need to run the more "expensive" smtpfilter-checkwords
// script. So this spfeval script should run before checkwords is run.
//
// Add domains you trust in the file data\SpfEval-Sender-whitelist.txt.
// Create the file if missing. These are sender domains (SMTP MAIL FROM:
// command sender return address).
//////////////////////////////////////////////////////////////////