Release Notes: Enhanced documentation, Python 2.6 support, and bugfixes. Support was added for automatic feature negotiation with the MTA using Python decorators.
Release Notes: The rcpt for SRS rejections is logged. Parsing of MAIL FROM into email and fullname was improved. No-DSN CBV was implemented. A check is done cfor porn words in MAIL FROM fullname. IPs are now banned for too many bad MAIL FROMs or RCPT TOs. Temperror policy is supported in sendmail access. Gossip TTL was configured. AddrCache, parse_addr, and iniplist were added to the Milter package. parse_header was added to Milter.utils. A sample spfmilter.py milter was added. The pymilter and pymilter-spf packages were split out. Milter apps were moved to /usr/lib/pymilter.
Release Notes: The spf module was moved to pyspf. Code to prevent PTR cache poisoning was added. More lame bounce heuristics were added. A fallback to plain CBV when template is missing was added.
Release Notes: This release fixes "out of thread resources" errors caused by spammers who use tarpits.
Release Notes: A simple trusted_forwarder implementation was added. The access_file neutral policy was fixed. The Received-SPF header was moved to the beginning of the headers. Keyword info was supplied for all results in the Received-SPF header. The guessed SPF result was moved to a separate header. The build was fixed to activate smfi_insheader only when SMFIR_INSHEADER is defined. A NULL MX in spf.py is now handled. In-process GOSSiP server support was added (to be extended later). The CBV cache is expired and auto-whitelist entries are renewed.
Release Notes: Recipients of outgoing email from selected senders are auto-whitelisted. SPF policy via the sendmail access map (with case insensitive keys) was fixed. The screener is trained on whitelisted messages. The optional idx parameter was added to addheader to invoke smfi_insheader. The progress API is activated when SMFIR_PROGRESS defined.
Release Notes: This release will keep screened honeypot mail, but optionally discard honeypot-only mail. An spf_accept_fail option has been added for brain-dead SPF senders (treats fail like softfail). An option to set SPF policy via sendmail access map has been added. An option to supply a Sender header from MAIL FROM when missing has been added . SMTP AUTH connections are considered internal. DSN is sent for SPF errors corrected by extended processing. DSN is sent before SCREENED mail is quarantined. A logging package is used to keep log lines atomic.
Release Notes: This release implements strict processing limits per the (now official) SPF RFC. Several parsing bugs under the RFC has been fixed. Official IANA SPF records (type99) are supported. Honeypot support has been added (requires pydspam-1.1.9). Supports extended SPF processing results beyond strict RFC limits. Supports original SES for bounce protection (requires pysrs-0.30.10). A callback exception processing option has been added to the milter module. Corrupt zip attachments are handled.
Release Notes: A zip in zip loop in mime.py was fixed. A HeaderParseError in the bms.py header callback was fixed. internal_domains is checked for outgoing mail. Inconsistent results from send_dsn were fixed.
Release Notes: Supports Python 2.4. The Milter module has been moved to a subpackage. A DSN option is provided for the three strikes rule and SPF SOFTFAIL. dynip has been moved to the Milter subpackage. SPF unknown mechanism list not cleared has been fixed. Banned extensions are configurable. There is an option to scan zip files for bad extensions. This release will properly log pydspam exceptions.