Split FORGED_RELAY_MUA_TO_MX to subrule for metas and scored rule; if only scored rule behaves too poorly to publish, the metas break

git-svn-id: https://svn.apache.org/repos/asf/spamassassin/trunk@1891797 13f79535-47bb-0310-9956-ffa450edef68
diff --git a/rulesrc/sandbox/gbechis/20_misc.cf b/rulesrc/sandbox/gbechis/20_misc.cf
index 2dabd59..134efd2 100644
--- a/rulesrc/sandbox/gbechis/20_misc.cf
+++ b/rulesrc/sandbox/gbechis/20_misc.cf
@@ -54,7 +54,7 @@
 score      SENDINBLUE_REDIR              2.000    # limit
 # tflags     SENDINBLUE_REDIR            publish
 
-meta       __SENDINBLUE_REDIR_PHISH      __SENDINBLUE_REDIR && ( __PDS_FROM_NAME_TO_DOMAIN || FORGED_RELAY_MUA_TO_MX || __TO_IN_SUBJ )
+meta       __SENDINBLUE_REDIR_PHISH      __SENDINBLUE_REDIR && ( __PDS_FROM_NAME_TO_DOMAIN || __FORGED_RELAY_MUA_TO_MX || __TO_IN_SUBJ )
 meta       SENDINBLUE_REDIR_PHISH        __SENDINBLUE_REDIR_PHISH
 describe   SENDINBLUE_REDIR_PHISH        Redirect URI via Sendinblue + phishing signs
 score      SENDINBLUE_REDIR_PHISH        3.500    # limit
diff --git a/rulesrc/sandbox/kb/20_header.cf b/rulesrc/sandbox/kb/20_header.cf
index 67904c6..1910106 100644
--- a/rulesrc/sandbox/kb/20_header.cf
+++ b/rulesrc/sandbox/kb/20_header.cf
@@ -10,7 +10,8 @@
 
 # bug 5817 -- Forged Relay, direct MUA to MX
 
-header FORGED_RELAY_MUA_TO_MX         X-Spam-Relays-External =~ /^\[ ip=(?!127)([\d.]+) [^\[]*\[ ip=\1 [^\[]+ helo=(!(?!(?:10|127|169\.254|172\.(?:1[6-9]|2[0-9]|3[01])|192\.168)\.)| )[^\[]+$/
+header __FORGED_RELAY_MUA_TO_MX       X-Spam-Relays-External =~ /^\[ ip=(?!127)([\d.]+) [^\[]*\[ ip=\1 [^\[]+ helo=(!(?!(?:10|127|169\.254|172\.(?:1[6-9]|2[0-9]|3[01])|192\.168)\.)| )[^\[]+$/
+meta   FORGED_RELAY_MUA_TO_MX         __FORGED_RELAY_MUA_TO_MX
 
 # Plus quite a few devel variants and accompanying tests.  This mess needs
 # cleaning up, probably after re-investigation.  See dos/70_bugs.cf for history.