diff --git a/bms.py b/bms.py
index 70bc7d20371f2488bcd5a344dfdc2efebe16c0f4..fee8ffcf154c95151269722320280fa02582727a 100644
--- a/bms.py
+++ b/bms.py
@@ -1,6 +1,9 @@
 #!/usr/bin/env python
 # A simple milter that has grown quite a bit.
 # $Log$
+# Revision 1.125  2008/08/06 00:52:38  customdesigned
+# CBV policy sends no DSN.  DSN policy sends DSN.
+#
 # Revision 1.124  2008/08/05 18:04:06  customdesigned
 # Send quarantine DSN to SPF PASS only.
 #
@@ -1124,7 +1127,7 @@ class bmsMilter(Milter.Milter):
 	      else:
                 if srs_reject_spoofed \
                   and user.lower() not in ('postmaster','abuse'):
-                  return self.forged_bounce()
+                  return self.forged_bounce(to)
                 self.data_allowed = not srs_reject_spoofed
 
         if not self.internal_connection and domain in private_relay:
@@ -1266,9 +1269,9 @@ class bmsMilter(Milter.Milter):
         return Milter.REJECT
     return Milter.CONTINUE
 
-  def forged_bounce(self):
+  def forged_bounce(self,rcpt='-'):
     if self.mailfrom != '<>':
-      self.log("REJECT: bogus DSN")
+      self.log("REJECT: bogus DSN",rcpt)
       self.setreply('550','5.7.1',
         "I do not accept normal mail from %s." % self.mailfrom.split('@')[0],
         "All such mail has turned out to be Delivery Status Notifications",
@@ -1276,7 +1279,7 @@ class bmsMilter(Milter.Milter):
         "you need to.  Use another MAIL FROM if you need to send me mail."
       )
     else:
-      self.log('REJECT: bounce with no SRS encoding')
+      self.log('REJECT: bounce with no SRS encoding',rcpt)
       self.setreply('550','5.7.1',
         "I did not send you that message. Please consider implementing SPF",
         "(http://openspf.org) to avoid bouncing mail to spoofed senders.",