Hello Chris, Wednesday, March 9, 2005, 7:30:20 AM, you wrote:
>>Summary: A group of volunteers will maintain a collected/distributed >>whitelist, using SpamAssassin's whitelist_from_rcvd capabilities, >>similar to (but in the opposite direction as) William Stearns' >>collected/distributed blacklist at >>http://www.stearns.org/sa-blacklist/sa-blacklist.current.cf CS> This might just be the first time I disagree with you Bob ;) CS> I don't see how this ruleset will not get abused. If I was a CS> spammer I would make sure all my spam hit these rules to let me CS> in. If you was a spammer, I can see you trying to do so. But how are you going to manage it? As I understand whitelist_from_rcvd, SpamAssassin will a) track the received headers to find the oldest header from within the local network. This is the oldest header that was generated by a machine under your control, the oldest header that you can trust. This header contains the name and IP address of the machine which sent the mail into your network. whitelist_from_rcvd compares this information, obtained by your machine during its SMTP interactions, with the From information, and validates whether or not email from that From is known to come in from that machine. If it matches, then we can say that the email from From followed an acceptable path, and since From is known to not spam, we'll accept the email. If From is not whitelisted, the rule doesn't apply. If From is supposedly whitelisted, but the machine that injected the email into your network is not listed in the whitelist_from_rcvd rule, then the rule fails, and the email does not gain any benefit. It could not be used by large hosting farms: good domain A, hosted on farm machine B, sends emails out via machines *.E (the farm's domain). Spam domain C, hosted on farm machine D, also sends emails out via machines *.E -- it's therefore possible for spam domain C to masquerade as good domain A, since you can't tell their SMTP machines apart. However, you won't find United Airlines, or Citibank, or the Washington Post, using those types of services. We can apply these rules to their domains, and whitelist Washington Post emails provided they come from Washington Post SMTP machines. Or do you see a hole in this process? Bob Menschel