• New SMTPFILTER-SPFEVAL script.

    From winserver.support@winserver.com@1:124/5013 to All on Thu Jan 31 19:12:12 2019
    Date: Sat, 01 Dec 2012 11:42:17 -0400
    From: "WINSERVER SUPPORT" <winserver.support@winserver.com>
    To: all
    Subject: New SMTPFILTER-SPFEVAL script.
    Newsgroups: win.server.program
    Message-ID: <1354380113.32.0@winserver.com>
    X-Mailer: Wildcat! Interactive Net Server v7.0.454.5
    Lines: 126

    The attached script is designed to pass SPF whitelisted domains with Received-SPF: PASS results. The comments in the script should
    explain how to use it and how it
    works.

    Let me know if you plan to use this.

    --
    Hector, Engineering & Technical Support
    Santronics Software, Inc.
    http://www.santronics.com (sales)
    http://www.winserver.com (support)
    http://www.winserver.com/AupInfo (Online AUP Help)
    Office: 305-248-3204

    ////////////////////////////////////////////////////////////////////
    // file : smtpfilter-spfeval.wcc
    // date : 11/29/2012 12:25 pm
    // about : check/accept whitelisted SPF domains with PASS results.
    // author : HLS/SSI
    // usage :
    //
    // Add script name, smtpfilter-spfeval, to the [hooks] section in
    // order you wish, how, the intent of this script it to short-circuit
    // or pre-empt the need to run the more "expensive" smtpfilter-checkwords
    // script. So this spfeval script should run before checkwords is run.
    //
    // Add domains you trust in the file data\SpfEval-Sender-whitelist.txt.
    // Create the file if missing. These are sender domains (SMTP MAIL FROM:
    // command sender return address).

    //////////////////////////////////////////////////////////////////