On Wed, Jan 15, 2003 at 10:42:07PM -0000, Stephane wrote:
> Hello again,
> 
> Amongst the answers to my previous post ("has a large company implemented SA") there 
>was a very good idea on success stories with SA... It is true that most of the people 
>on the net who would say they were happy with SA and that it worked well for them are 
>using it for their private use, or run a server which does mailboxes storage as well 
>(POP3/IMAP I would imagine). However I couldn't find any description of a successful 
>implementation with a similar setup than ours -- I would guess at least a few other 
>companies must follow the same model.
> 
> Our infrastructure would look like:
> Internet-->[SA]-->[Mailsweeper]-->[SMTP/Lotus Notes gateway]-->Lotus Notes Mail 
>reader on Client PC
> Each bracketed text is a separate server, so SA would be a dedicated relay, with no 
>local mailboxes, just a passthrough.
> 
> The goal for us is to tag emails (X-Spam-Flag) in a first step and let the Notes 
>client put tagged msgs into a separate folder (only saves time, bandwidth and storage 
>are still used).
> In a second step we would like to quarantine all detected spam at the SA server 
>level (thus saving also bandwidth and storage). 
> 

this is almost exactly the setup we use with around 2000 mailboxes,
except substitute worldtalk for mailsweeper, and exchange for lotus
notes.  we've done this as consultants several times now, and we
provide commercial remote support and manage blocking, whitelists, and
graylists for our clients.


> I received many replies to my previous post from people who work in companies having 
>implemented SA, but none of them do the blocking at the gateway level, they give the 
>choice to the users. With our infrastructure, we cannot do that, as the SA server 
>will not know anything about the mailboxes, it would just be a relay, no local 
>/var/spool/mail directory, no local /home/xxx directory for the users !
> 

we block at the gateway level.  the closer to the periphery you block
the more effective it is. (for spammers who don't take their bounces, 
can have the option of not taking their mail in the first place.)

of course, it helps if you can have an /etc/aliases file with an entry
for each user, rather than just relaying everything.  (we build these
several times per day using a script from an export of enterprise
address book.)


> I think most companies are afraid of implementing opensource software as a component 
>for an important service such as email. 

if this is true (and i don't think it is), it's because they're
uninformed about how much open source software they ALREADY depend on.

most of the internet is completely dependent on sendmail and bind,
even on proprietary platforms.  (only relatively recently has
commercial sendmail and support for it been available.)
and google, yahoo, and hotmail run on bsd.  ever seen them down?
and most of the TCP stack in windows was derived from berkeley unix.


>I think that generally even though people know email has not been designed to be a 
>100% reliable protocol they still make business with it.

on the contrary, internet email is designed to be 100% reliable in that the
sender is supposed to be informed of nondelivery by a bounce.  (this is
violated by a number of ISPs who silently dispose of suspected spam.)

the more time and care you spend on whitelists the likelier you won't
interfere with business-related mail.


> 
> First of all, please let me highlight that the following thoughts are not my 
>personal views but difficult barriers to face when you try to get opensource into a 
>large manufacturing company (not an ISP, not a software company) like ours.
> 
> The major fears are:
> - opensource software is often made by hobbyists and these people do not have the 
>structure to provide software support/bugfixes, or quick response to a big problem 
>incurring financial losses (no emails go through for example!)

this is what consultants and companies are for.  providing services
and expertise to stablize open source software and provide you with 
committed service levels, if you don't have inhouse expertise.


> - are upgrades straightfoward and not causing problems to the existing running 
>system, are they well tested.

you're right that pieces of this software is not particularly mature,
so upgrades and version skew among the parts can be problematic.

as consultants, we add hysteresis to the process by installing on our
own machines and using new stuff for our own mail first, before we
install on our client machines, by doing performance testing, and by
installing on more adventurous clients before installing on
risk-averse ones.


> - what if the SA project is abandoned, what if the source is bought by a commercial 
>vendor, in other words, what if SA as it exists today disappears ? With opensource 
>you cannot have a contractual engagement to provide support or updates, nor can you 
>really know the roadmap for a product and what is planned for future development
> 

the benefits of open source are probably off-topic for this list, 
but:

even if you are on your own with open source, the good thing is you
CAN be on your own.  or you can hire someone else to maintain or
improve it.  almost always you have a choice of several possibilities.
in the case of proprietary software, you're stuck with one vendor.

luckily, for email, the protocols are relatively stable, so there is
no forced reason to upgrade unless you need new features.  (in the spam
arms-race, you probably want to upgrade from time to time).

one of the biggest technical problems with spam filtering is how you
can add your own rules.  for example, one of my clients gets email from
a trading partner containing meeting and conference call announcements,
cc:ed to lots of people.  of course i have to write special rules for
them for those things, but i can!  with commercial software, i can't
even change the error messages and warnings to be usable without the
vendor's cooperation.

let me tell you a story: 

10 years ago i installed multiple firewalls based on TIS firewall
toolkit at a UN agency.  amazingly, they are *still* using that
software today, adding to and augmenting some aspects of it, adding
proxies alongside, etc.  they have one competent network engineer
maintaining it, part time.

meanwhile, the commercial versions of the software (gauntlet) have
been through 6 versions, multiple forced platform changes, and two
corporate purchases (first, NAI, now Secure Computing).  the software
has been closed source for half of its life, and as far as i can tell,
almost nobody understands it now, and nobody can debug it. it is 
unclear how long it will live, since Secure Computing has a competing
product.

the situation is COMPLETELY TYPICAL in commercial software.  a good
product succeeds, you buy it as a customer, and then the high quality
engineers vest and leave, the product or the company is sold, and
you're STUCK.

you install a proprietary MRP package which costs MILLIONS of dollars
and MILLIONS of dollars in consulting to install, and what are you
left with at the end?  MILLIONS of dollars in required annual
maintenance payments which provide an annuity for the vendor and NO
SOURCE CODE.  YOU ARE LOCKED IN.

since not only the code is closed but the interfaces are proprietary,
you can't switch databases, platforms or do anything without the
vendor's cooperation.


> Blocking spam-tagged emails at the gateway level as we intend to do requires a good 
>trust in the chosen spam filter product !! And here is my point, this trust comes 
>when you can point at other and say: they use it, they are happy with it, and all 
>problems they encountered, they could fix them with the help of xxxx and if they get 
>any more problems they can rely on xxxx to fix them quickly.
> 

SA and amavisd have a number of features that if used correctly tend to 
increase your users' trust in them as spam solutions.

- you can get a daily report of what sites were blocked and why at the 
MTA level.
- the SA tests and their results are visible to the user in headers
and are logged.
- we log all spam so we can examine it later if necessary.
- anything we turn away is visible to the sender.
- we whitelist administration addresses so incorrectly blocked senders
can complain.
- we generate warnings (instead of errors) for a long time before turning 
on possibly controversial features (such as blocking based on FQDN in
HELO).

and there are a number of ways to administer these that will increase
the enterprise trust in the solutions.  it's hard for a newbie to know
about these ways without getting outside expertise.


> I am desperate to get SA implemented (I just love it!!) but we wouldn't like to 
>reinvent the wheel if someone else did a similar implementation
> 
> I appreciate this is a very long email (apologies), if this post has got nothing to 
>do with this mailing list, I am more than happy to carry the discussion off it with 
>anyone who feels they are in the same position as me, as my company.
> 
> Best Regards,
> Stephane
> 



-------------------------------------------------------
This SF.NET email is sponsored by: A Thawte Code Signing Certificate 
is essential in establishing user confidence by providing assurance of 
authenticity and code integrity. Download our Free Code Signing guide:
http://ads.sourceforge.net/cgi-bin/redirect.pl?thaw0028en
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to