either one of those tests.
So, on the one hand I can add them to whitelist and be
done with it, or I can add
them to missed HAM for re-learning.
Which is the best approach?
so far, both. You may need to relearn multiple their (monthly
Library (monthly) gets marked as spam as shown below.
The BAYES_99 and BAYES_999 values are something I am toying with for
other reasons. Seems odd these should hit either one of those
tests.
So, on the one hand I can add them to whitelist and be done with it,
or I can add
them to missed
BAYES_99 and BAYES_999 values are something I am toying with for
other reasons. Seems odd these should hit either one of those tests.
So, on the one hand I can add them to whitelist and be done with it,
or I can add
them to missed HAM for re-learning.
Which is the best approach?
so far, both. You
I am toying with for
other reasons. Seems odd these should hit either one of those tests.
So, on the one hand I can add them to whitelist and be done with it,
or I can add
them to missed HAM for re-learning.
Which is the best approach?
so far, both. You may need to relearn multiple their
should hit either one of those tests.
So, on the one hand I can add them to whitelist and be done with it, or I can
add
them to missed HAM for re-learning.
Which is the best approach?
so far, both. You may need to relearn multiple their (monthly) mails before
it has effect.
X-Spam-Report
> ---
>If guns kill people, then...
> -- pencils miss spel words.
> -- cars make people drive drunk.
> -- spoons make people fat.
> ---
:) I wa
>
> > So, on the one hand I can add them to whitelist and be done with it, or
> > I can add them to missed HAM for re-learning.
> >
> > Which is the best approach?
>
> Do both.
>
You will be always having work. The one's SPAM is the other users del
On Thu, 26 Sep 2024, joe a wrote:
So, on the one hand I can add them to whitelist and be done with it, or
I can add them to missed HAM for re-learning.
Which is the best approach?
Do both.
--
John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
jhar...@impsec.org
one of those tests.
So, on the one hand I can add them to whitelist and be done with it, or I can
add
them to missed HAM for re-learning.
Which is the best approach?
Both. Feeding it to Bayes helps to correct its behaviour for both
future messages from this sender and similar mail from others
tests.
So, on the one hand I can add them to whitelist and be done with it, or I can
add
them to missed HAM for re-learning.
Which is the best approach?
X-Spam-Checker-Version: SpamAssassin 3.4.5 (2021-03-20) on elmoid
X-Spam-Flag: YES
X-Spam-Level: *
X-Spam-Status: Yes, score=9.9
On 11/05/2024 03:40, Bill Cole wrote:
So what? domain owners state hard fail it SHOULD be hard failed,
irrespective of if YOU think you know better than THEM or not, if we
hardfail we accept the risks that come with it.
In practice, there is a prioritizing of whose wishes I prioritize on
the
On 2024-05-09 at 17:21:07 UTC-0400 (Fri, 10 May 2024 07:21:07 +1000)
Noel Butler
is rumored to have said:
> So what? domain owners state hard fail it SHOULD be hard failed, irrespective
> of if YOU think you know better than THEM or not, if we hardfail we accept
> the risks that come with it.
On 09/05/2024 22:47, Bill Cole wrote:
On 2024-05-09 at 08:37:06 UTC-0400 (Thu, 09 May 2024 14:37:06 +0200)
Benny Pedersen
is rumored to have said:
Bill Cole skrev den 2024-05-09 14:22:
In fact, I can't think of any whitelist test that should pass if SPF
fails.
If you operate on the t
On 2024-05-09 at 08:37:06 UTC-0400 (Thu, 09 May 2024 14:37:06 +0200)
Benny Pedersen
is rumored to have said:
Bill Cole skrev den 2024-05-09 14:22:
In fact, I can't think of any whitelist test that should pass if SPF
fails.
If you operate on the theory that a SPF failure is always a si
Bill Cole skrev den 2024-05-09 14:22:
In fact, I can't think of any whitelist test that should pass if SPF
fails.
If you operate on the theory that a SPF failure is always a sign of
spam, you can make your SpamAssassin always trust SPF failures
absolutely. I would not recommend that.
You
are free to use the priority and shortcircuiting features to assure that
SPF_FAIL causes DNSWL checks to not be run. I would not expect any of
these to have an overall positive effect on your email.
In fact, I can't think of any whitelist test that should pass if SPF
fails.
If you o
think of any whitelist test that should pass
if SPF fails. I could attach a higher score to SPF_FAIL, but that
would unduly affect cases where the sender wasn't white listed.
I need a way to force Spammassassin to negate the effect of one test
on the passing of another.
https://www.dnswl.or
On 09/05/2024 05:57, Jarland Donnell wrote:
That's easy though at least. Set the DNSWL rule to 0. I appreciate
their effort but it's simply not an accurate way to determine the value
of an email in 2024. It's never been the deciding factor between
whether or not an email was spam, in any email
DNSWL_HI In DNS whitelist, good SPF
- Original Message -
I received a (relatively) well crafted Phishing email today. It was clearly
a well planned campaign. The Spamassassin score was as follows:
X-Spam-Status: No, score=-0.4 required=5.0 tests=GOOG_REDIR_NORD
gt;
> DNS white-hole list checks should never ever pass if the SPF checks fail. In
> fact, I can't think of any whitelist test that should pass if SPF fails. I
> could attach a higher score to SPF_FAIL, but that would unduly affect cases
> where the sender wasn't white lis
=0.001,RCVD_IN_DNSWL_HI=-5,RDNS_NONE=1.274,
SPF_FAIL=0.919,SPF_HELO_NONE=0.001,URIBL_BLOCKED=0.001,WIKI_IMG=2.397
autolearn=disabled version=3.4.6
DNS white-hole list checks should never ever pass if the SPF checks
fail. In fact, I can't think of any whitelist test that should pa
gt;> -> , Queue-ID: 4VBDq04Bn7z1Q9qQ, mail_id:
>>> 6LRhEwtUmP7u, Hits: -, size: 10888, queued_as: 4VBDq06n69z1Q9q1,
>>> 358 ms
>>>
>>> I check and I not found any <> in whitelist
> I check and nothging check whitelist in sq
d}, [34.23.17.0]:38582 [34.23.17.0] <>
>>> -> , Queue-ID: 4VBDq04Bn7z1Q9qQ, mail_id:
>>> 6LRhEwtUmP7u, Hits: -, size: 10888, queued_as: 4VBDq06n69z1Q9q1,
>>> 358 ms
>>>
>>> I check and I not found any <> in whitelist
>
024-04-08 12:31:
>
> >>>
> >>> Apr 6 01:15:09 amavis3 amavis[3887068]: (3887068-17) Passed
> >>> BAD-HEADER-7 {RelayedInbound}, [34.23.17.0]:38582 [34.23.17.0] <>
> >>> -> , Queue-ID: 4VBDq04Bn7z1Q9qQ, mail_id:
> >>> 6L
ze: 10888, queued_as: 4VBDq06n69z1Q9q1,
358 ms
I check and I not found any <> in whitelist
I check and nothging check whitelist in sql and nothing abou
whitelisted sender <>
check amavis config.
read books :)
yes read read byt this is not from bounce. Normal bounce not have info
in log l
and I not found any <> in whitelist
I check and nothging check whitelist in sql and nothing abou
whitelisted sender <>
check amavis config.
read books :)
<> is bounce addresse with must not be rejected
hence its whitelisted
0fcd95c5445df29e8a5cc
Apr 6 01:15:08 amavis3 amavis[3887068]: (3887068-17) check_header:
7, Missing required header field: "Date"
Apr 6 01:15:08 amavis3 amavis[3887068]: (3887068-17) wbl:
whitelisted sender <>,
this looks like whitelist at amavis level, not at spamassassin level
vis[3887068]: (3887068-17) check_header: 7,
Missing required header field: "Date"
Apr 6 01:15:08 amavis3 amavis[3887068]: (3887068-17) wbl: whitelisted
sender <>,
this looks like whitelist at amavis level, not at spamassassin level.
Apr 6 01:15:08 amavis3 amavis[3887068]: (3887068-17)
04Bn7z1Q9qQ, mail_id: 6LRhEwtUmP7u, Hits:
-, size: 10888, queued_as: 4VBDq06n69z1Q9q1, 358 ms
I check and I not found any <> in whitelist
--
Philip Prindeville via users skrev den 2024-03-28 18:55:
My config also has:
trusted_networks 192.168.6.0/24
trusted_networks 192.168.8.0/24
trusted_networks 127.0.0.1/32
So I don't think that's the problem.
rfc 1918 is imho hardcoded into spamassassin
if its this, make a bugzilla about it,
> On Mar 28, 2024, at 12:18 PM, Matus UHLAR - fantomas
> wrote:
>
>>> On 27.03.24 20:56, Philip Prindeville via users wrote:
I have something that looks like:
whitelist_from_rcvd v...@yandex.ru vger.kernel.org
blacklist_from *@yandex.ru
And I only ever se
> On Mar 28, 2024, at 12:18 PM, Matus UHLAR - fantomas
> wrote:
>
>>> On 27.03.24 20:56, Philip Prindeville via users wrote:
I have something that looks like:
whitelist_from_rcvd v...@yandex.ru vger.kernel.org
blacklist_from *@yandex.ru
And I only ever se
On Thu, 28 Mar 2024, Philip Prindeville via users wrote:
On Mar 28, 2024, at 2:39 AM, Matus UHLAR - fantomas wrote:
On 27.03.24 20:56, Philip Prindeville via users wrote:
I have something that looks like:
whitelist_from_rcvd v...@yandex.ru vger.kernel.org
blacklist_from *@yandex.ru
And
On 27.03.24 20:56, Philip Prindeville via users wrote:
I have something that looks like:
whitelist_from_rcvd v...@yandex.ru vger.kernel.org
blacklist_from *@yandex.ru
And I only ever seem to see the 2nd rule being hit, but not the first.
What is the order of evaluation? Mail::SpamAssassin::C
> On Mar 28, 2024, at 2:39 AM, Matus UHLAR - fantomas wrote:
>
> On 27.03.24 20:56, Philip Prindeville via users wrote:
>> I have something that looks like:
>>
>> whitelist_from_rcvd v...@yandex.ru vger.kernel.org
>>
>> blacklist_from *@yandex.ru
>>
>> And I only ever seem to see the 2nd ru
On 27.03.24 20:56, Philip Prindeville via users wrote:
I have something that looks like:
whitelist_from_rcvd v...@yandex.ru vger.kernel.org
blacklist_from *@yandex.ru
And I only ever seem to see the 2nd rule being hit, but not the first.
What is the order of evalu
Hi.
I have something that looks like:
whitelist_from_rcvd v...@yandex.ru vger.kernel.org
blacklist_from *@yandex.ru
And I only ever seem to see the 2nd rule being hit, but not the first.
What is the order of evaluation? Mail::SpamAssassin::Conf doesn't say that I
On 23.12.22 21:24, Joey J wrote:
This is the best I can grab header wise, Names/IP's have changed here to
protect privacy.
Know the following:
The senders real server (1.2.3.4), (1.2.3.4 is the SPF match) sends the
mail to the gateway, and the gateway blocked it as shown.
Yes, legit going to payp
Hello All,
This is the best I can grab header wise, Names/IP's have changed here to
protect privacy.
Know the following:
The senders real server (1.2.3.4), (1.2.3.4 is the SPF match) sends the
mail to the gateway, and the gateway blocked it as shown.
Yes, legit going to paypal.
Based on your resp
*@netflix.com
blacklist_from *@netflix.com
whitelist_auth *@*.netflix.com
blacklist_from *@*.netflix.com
You may need to dial back the blacklist score a bit for it to work
reliably:
score USER_IN_BLACKLIST 85.000 # let whitelist override
On 21.12.22 15:48, Joey J wrote:
Thank you for pointing me in the better direction.
Since not many people are typing these types of email , I could do the one
off rule and it would be manageable.
But in better seeing the welcomelist_from_spf option, I think this will be
my first try.
welcomelis
Kris & Greg,
Thank you for pointing me in the better direction.
Since not many people are typing these types of email , I could do the one
off rule and it would be manageable.
But in better seeing the welcomelist_from_spf option, I think this will be
my first try.
I appreciate all of your points
Joey J wrote:
Thanks Everyone.
Within all of the responses, I will try to reply here.
1. The legit sender will talk about big numbers because of the real
things he is involved with so big numbers is still a valid method to
score, just not in this case.
2. The SPF record is set to fail on no mat
The other thing that should be done for j...@company.com is that
company.com should sign their mail with DKIM, and then you can
welcomelist_from_dkim *@company.com
I find that many companies I deal with that produce semi-spammy mail
(most big companies :-) have DKIM signatures and I can welcome
Thanks Everyone.
Within all of the responses, I will try to reply here.
1. The legit sender will talk about big numbers because of the real things
he is involved with so big numbers is still a valid method to score, just
not in this case.
2. The SPF record is set to fail on no match, however this d
On 2022-12-21 at 12:02:27 UTC-0500 (Wed, 21 Dec 2022 18:02:27 +0100)
Matus UHLAR - fantomas
is rumored to have said:
[...]>
> On 21.12.22 11:19, Henrik K wrote:
>> It will pass welcomelist_auth, since there is SPF_PASS, which you missed:
>>
>> SPF_PASS -0.001 SPF: sender matches SPF
3
times, there are more of the buzz words that SA looks at based on rules.
We can't whitelist j...@company.com because of course everyone
pretending to be him will more than likely get whitelisted and you
know the rest.
This is why I thought if user j...@company.com from ip 1.2.3.4
cond
> DKIM_INVALID 0.1 DKIM or DK signature exists, but is not valid
>
> DKIM_SIGNED 0.1 Message has a DKIM or DK signature, not
> necessarily valid
>
> HTML_FONT_LOW_CONTRAST 0.001 HTML font color similar or identical to
> background
>
> HTML_MESSAGE0.001 HTML
On Wed, Dec 21, 2022 at 08:43:18AM +0100, Matus UHLAR - fantomas wrote:
> > DKIM_INVALID 0.1 DKIM or DK signature exists, but is not valid
> >
> > DKIM_SIGNED 0.1 Message has a DKIM or DK signature, not
> > necessarily valid
> >
> > HTML_FONT_LOW_CONTRAST 0.001 HTML fo
looks at based on rules.
We can't whitelist j...@company.com because of course everyone pretending to
be him will more than likely get whitelisted and you know the rest.
You have misunderstood that welcomelist_auth means.
It means that the sender has to pass SPF or DKIM, which means that r
Personally I'd look at why BIGNUM_EMAILS_MANY is hitting and see if there is
something the sender could do to avoid it. I'm pretty sure I've never seen that
rule hit in any of my spam, so it must be something a bit unique.
Loren
words that SA looks at based on rules.
We can't whitelist j...@company.com because of course everyone pretending to
be him will more than likely get whitelisted and you know the rest.
This is why I thought if user j...@company.com from ip 1.2.3.4 condition
would allow me to add some negative sco
On 19.12.22 20:05, Joey J wrote:
I'm trying to see if there is a "best way" to provide negative scoring for
a certain persons email.
As an example if j...@company.com is communicating with paypal or other real
banking institutions, then at times within the email chain, SA will tag it
as spam.
d
hese directives all used 'whitelist' and
'blacklist' so if you are not running 3.4.6 or 4.0.0 those names will be
in the docs.
The scores for the various wl/bl settings are controlled by a set of
rules distributed and described in rules/60_welcomelist.cf. As Greg
indicated,
Actually, what would be the format, in respect to header for that rule?
so
header welcomelist_from_rcvd j...@company.com [1.2.3.4]
On Mon, Dec 19, 2022 at 8:39 PM Greg Troxel wrote:
>
> Joey J writes:
>
> > I'm trying to see if there is a "best way" to provide negative scoring
> for
>
Thanks,
So welcomelist_from_rcvd j...@company.com [1.2.3.4]
Is saying if it's received from j...@company.com and the IP combination?
And then simply score it
welcomelist_from_rcvd score -2
I will try that thank you!
On Mon, Dec 19, 2022 at 8:39 PM Greg Troxel wrote:
>
> Joey J writes:
>
> > I'
Joey J writes:
> I'm trying to see if there is a "best way" to provide negative scoring for
> a certain persons email.
That's easy. There are many ways, but not best way.
> As an example if j...@company.com is communicating with paypal or other real
> banking institutions, then at times withi
Hello All,
I'm trying to see if there is a "best way" to provide negative scoring for
a certain persons email.
As an example if j...@company.com is communicating with paypal or other real
banking institutions, then at times within the email chain, SA will tag it
as spam.
I want to see if there is
ving to add addresses to my whitelist file even for addresses that
> might not ever send another email in future.
>
> Relief...
Probably a good choice, as TxRep is currently quite broken in several
regards, see for example:
https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7943
a
Today I got my life back.
Decided to ditch TXrep and go back to AWL. It might not be as clever,
but at least it works!
The inability to do working manual changes to scores meant wasting a lot of
time having to add addresses to my whitelist file even for addresses that
might not ever send
On Thursday 16 December 2021 at 21:43:04, Peter wrote:
Thanks, I hadn't thought about that.
I am curious though, I normall hit Reply rather than Reply to All, and with
your email Reply just uses your own address,
that's because Anthony doesn't set Reply-To: and neither does this mailing
list (
On Thursday 16 December 2021 at 21:43:04, Peter wrote:
> Thanks, I hadn't thought about that.
>
> I am curious though, I normall hit Reply rather than Reply to All, and with
> your email Reply just uses your own address,
That, I find strange.
For me, selecting my own reply on the list, and then
Thanks, I hadn't thought about that.
I am curious though, I normall hit Reply rather than Reply to All, and with
your email Reply just uses your own address, I need to hit Reply to All to
get it on the list. Is that what has been happening with mine, and why
does it happen with replies to you
On Thursday 16 December 2021 at 21:21:28, Peter wrote:
> I was thinking that replies would show up here.
> Perhaps I should create an account on a mail server without RBL blocking?
Either that, or (preferably) stop your email client from enforcing a Reply-To
address which is different from the
Hi Greg,
Yeah, my blocklists are pretty extreme, normally serves me well, but I
apologize to those trying to help. I was thinking that replies would show
up here.
I have just cleared 71.19.144.0/20 just in case so hopefully those replies
can come in.
Perhaps I should create an account on a mai
Hey Peter: Your mailserver appears to be a bit aggressive and is
blocking mail from people on the list who are replying to you:
: host acemail1.ace.net.au[150.101.236.36] said: 553 5.3.0
Rejected 71.19.148.97 by clients-b.blocked.rbl (in reply to MAIL FROM
command)
multirbl.valli.o
I just want the command to work as advertised. It worked for AWL on my
older system, made life a lot easier.
*** REPLY SEPARATOR ***
On 16/12/2021 at 9:36 AM Greg Troxel wrote:
>"Peter" writes:
>
>> New to TXrep, the manual says the add-addr-to-whiteli
"Peter" writes:
> New to TXrep, the manual says the add-addr-to-whitelist command should add
> -100, but for me it doesn't do anything - nor does add-addr-to-blacklist.
>
> It comes back with SpamAssassin TxRep: 1 with either the white or
> blacklist.
>
> W
Hi,
New to TXrep, the manual says the add-addr-to-whitelist command should add
-100, but for me it doesn't do anything - nor does add-addr-to-blacklist.
It comes back with SpamAssassin TxRep: 1 with either the white or
blacklist.
While the server is new, I want to be able to adjust a se
On 20201017 10:58:13, RW wrote:
On Fri, 16 Oct 2020 23:18:16 -0400
Bill Cole wrote:
On 16 Oct 2020, at 21:06, Noel Butler wrote:
perhaps, the rules above should be defined only for version >=4
and versions <4 should have the original rules.
The rule name change is an artifact of how the rule
On Fri, 16 Oct 2020 23:18:16 -0400
Bill Cole wrote:
> On 16 Oct 2020, at 21:06, Noel Butler wrote:
>
> > perhaps, the rules above should be defined only for version >=4
> > and versions <4 should have the original rules.
>
> The rule name change is an artifact of how the rules are
> version-c
That sums it up well for now, yes. 4.0 will even let you still use the
same config options so there is a timeline for planning for the removal
of the options with 4.1 whenever that is.
On 10/17/2020 11:10 AM, Victor Sudakov wrote:
> Thanks a lot to all who replied. So, for the uninitiated like me
Bill Cole wrote:
>
> > perhaps, the rules above should be defined only for version >=4
> > and versions <4 should have the original rules.
>
> The rule name change is an artifact of how the rules are version-controlled.
> We have exactly one version of the rules and it resides in the trunk of the
On 16 Oct 2020, at 21:06, Noel Butler wrote:
perhaps, the rules above should be defined only for version >=4
and versions <4 should have the original rules.
The rule name change is an artifact of how the rules are
version-controlled. We have exactly one version of the rules and it
resides in
Oct 16 02:46:12.979 [11288] warn: lint: 1 issues detected, please rerun with
> debug enabled for more information
>
> Am I not supposed to replace whitelist with welcomelist in my configs?
On 16.10.20 09:20, Kevin A. McGrail wrote:
> No, not until 4.0 is released. Good question!
per
On 10/16/2020 10:22 AM, Matus UHLAR - fantomas wrote:
> On 16.10.20 09:20, Kevin A. McGrail wrote:
>> No, not until 4.0 is released. Good question!
>
> perhaps, the rules above should be defined only for version >=4
> and versions <4 should have the original rules.
The rule just happens to have
quot;, SpamAssassin
complains:
$ spamassassin --lint
Oct 16 02:46:11.739 [11288] warn: config: failed to parse line, skipping, in
"/etc/spamassassin/local.cf": welcomelist_from *@
Oct 16 02:46:12.979 [11288] warn: lint: 1 issues detected, please rerun with
debug enabled for more information
/etc/spamassassin/local.cf": welcomelist_from *@
> Oct 16 02:46:12.979 [11288] warn: lint: 1 issues detected, please rerun with
> debug enabled for more information
>
> Am I not supposed to replace whitelist with welcomelist in my configs?
No, not until 4.0 is released. Good
On Fri, 16 Oct 2020 16:48:20 +0700
Victor Sudakov wrote:
> Dear Colleagues,
>
> My SpamAssassin reports that
>
> -0.0 USER_IN_WELCOMELISTuser is listed in 'welcomelist_from'
> -100 USER_IN_WHITELIST DEPRECATED: See USER_IN_WELCOMELIST
>
>
> However when I change "whitelist_from" t
ed, please rerun with
debug enabled for more information
Am I not supposed to replace whitelist with welcomelist in my configs?
--
Victor Sudakov, VAS4-RIPE, VAS47-RIPN
2:5005/49@fidonet http://vas.tomsk.ru/
what the plugin does and I stand by the name. People
should stop using the language.
As you cannot fail to be aware if you read even a fraction of the list
messages on this topic, there is absolutely no consensus that
blacklist/whitelist etc. are racially charged terms. Some perceive them
a
scribes exactly what the plugin does and
I
stand by the name. People should stop using the language.
As you cannot fail to be aware if you read even a fraction of the list
messages on this topic, there is absolutely no consensus that
blacklist/whitelist etc. are racially charged terms. Some
>> You go shut your piehole
Ehhh, who exactly? Having a nice evening with a vodka bottle? ;)
You go shut your piehole
Woke white guys who know best about racism against blacks and who use a
domain name that insults native Americans have spoken!!!
Black people and people of color need to go sit down and shut up while
woke white guys who know best for them do what is best for the
On 20/07/20 19:31, John Hardin wrote:
Apologies for not clarifying that detail; I was aware of it. I did
hedge by saying "(potentially) subject to renaming".
No apologies necessary, it wasn't directed to you :)
I'm just trying to raise awareness that, while changing things is
possible, it
On Mon, 20 Jul 2020, Riccardo Alfieri wrote:
On 20/07/20 19:01, Martin Gregorie wrote:
Repeating previously posted info for completeness: one of my private
rules uses URIBL_BLACK as a subrule. I have no other potential conflicts
with SA rule name changes and no postprocessing that's dependent
On 20/07/20 19:01, Martin Gregorie wrote:
Repeating previously posted info for completeness: one of my private
rules uses URIBL_BLACK as a subrule. I have no other potential conflicts
with SA rule name changes and no postprocessing that's dependent on SA
rule names.
Here just to say that URIBL
On Mon, 2020-07-20 at 09:30 -0700, John Hardin wrote:
> It would be helpful if we could be informed whether anyone has post-
> SA processing that looks for these rulenames in the SA hit results,
> e.g. for making message delivery decisions.
>
Repeating previously posted info for completeness: one
On Mon, 20 Jul 2020, Thom van der Boon wrote:
One example is that our IRS ("Belastingdienst") is whitelisted by the following
rule:
whitelist_from_spf *@belastingdienst.nl
That configuration syntax will continue to be supported for at least one
year after the release of SA 4.0 (i.e. it will
On Sun, 19 Jul 2020, Kevin A. McGrail wrote:
Additionally, the rule USER_IN_WHITELIST_TO has been renamed to
USER_IN_WELCOMELIST_TO to assist those running older versions of
SpamAssassin get stock rulesets.
If you have custom scoring or any custom rules building on
USER_IN_WHITELIST_TO, please
ah sorry i wrote that totally wrong...
i mean we have "whitelist_from" setting.
should i change that to "welcomelist_from" or to "welcome_from", because when changing from "whitelist" to
"welcomelist" should "welcomelist_from"
What is being used for mail that is not welcome, but still needs to be
allowed thru?
-Original Message-
To: users@spamassassin.apache.org
Subject: Re: IMPORTANT NOTICE: Rules referencing WHITELIST or BLACKLIST
in process of being Renamed
can we use something like that or is there
can we use something like that or is there any special edit necessary?
sed -i 's/whitelist/welcomelist/g' $CONFIG
my setting "whitelist_from" to "welcomelist_from" || "welcome_from"?
Thanks
Am 19.07.20 um 18:09 schrieb Kevin A. McGrail:
All
groet, Best regards,
Thom van der Boon
E-Mail: t...@vdb.nl
Van: "Kevin A. McGrail"
Aan: "Thom van der Boon"
Cc: "SA Mailing list" , "SpamAssassin Devel
List"
Verzonden: Zondag 19 juli 2020 19:56:34
Onderwerp: Re: IMPORTANT NOTICE: Rules referenc
On 19 Jul 2020, at 21:23, Olivier wrote:
> Please consider adding an easy way to turn the backward compatibility on
> and off.
I would suggest to settings, one that warns the definition has changed and one
that errors on the old term rather than just a "turn on compatibility" which
will mean th
On 20200719 18:02:18, John Hardin wrote:
On Sun, 19 Jul 2020, Loren Wilton wrote:
In other words, support both "black" and "block", and "white" and "welcome",
for at least 3 months, I suggest.
The bug report that introduced this change claimed 100% backward compatability
for at least one
Noel Butler skrev den 2020-07-20 05:35:
Just think of those 10's thousands of running spamassassin who are not
on these lists, all in for a shock when custom scripts start breaking.
lets hope rspamd being marked stable on gentoo before this shock happend
:=)
The bug report that introduced this change claimed 100% backward
compatability for at least one year, later changed to until 4.0 came out,
whenever that will be.
You're misreading that. Backwards compatibility in the code will be
maintained for at least one year after the 4.0 release,
Sorry
On 20/07/2020 13:23, Olivier wrote:
> "Kevin A. McGrail" writes:
>
>> All:
>>
>> As of today, the configuration option WHITELIST_TO has been renamed
>> WELCOMELIST_TO with an alias for backwards compatibility.
>
> Kevin,
>
> Please consider adding an easy way to turn the backward compatibilit
ulesets.
>
> If you have custom scoring or any custom rules building on
> USER_IN_WHITELIST_TO, please accept our apologies and change the
> references to USER_IN_WELCOMELIST_TO.
>
> In order to remove racially charged configuration options, whitelist
> will become welcomelist and blac
1 - 100 of 1641 matches
Mail list logo