However, in my previous comment, I didn't express myself precisely enough. I didn't mean "block" or "let through" rather "execute test and set specified score if the test turns true" so that the final decision what to do with the mail could be affected by the other tests. Very often you also want to do something else than the simple block or pass, such as repackage and mark, give the user a hint but let him decide. AFAIK this you cannot do in an SMTP server. You also want to gather together all spam related work in one place.
----- Original Message ----- From: "Matt Kettler" <[EMAIL PROTECTED]>
To: "Mikael Hakman" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; <users@spamassassin.apache.org>
Sent: Thursday, March 10, 2005 5:25 PM
Subject: Re: Whitelist IP Address
At 05:39 AM 3/10/2005, Mikael Hakman wrote:Wouldn't you all agree that blocking or letting through emails sent from or relayed by specified IP addresses and subnets is quite a basic functionality? In a sense it is more basic than doing the same with DNS names and SMTP addresses because all those names ultimately resolve to IP numbers. All communication (routing) on the Internet is done by numbers not by names.
Yes, so basic I would expect it to be implemented in whatever tool you're using to call spamassassin in the first place.
MailScanner does it, Procmail can do it...
Then why can't we have such a generic rule built-in into SA?
I don't see why not. However, IMO all of the whitelisting features built into SA are bordering on being a hack anyway. They have their uses, but there's often better ways.
1) SA doesn't have good reliable access to envelope information, it relies on the MTA inserting clues and hints into the headers. Most tools that call SA have access to the envelope directly.
2) if you whitelist at a higher layer you have the option of not calling SA at all, in which case you save CPU.
__________ NOD32 1.1022 (20050309) Information __________
This message was checked by NOD32 antivirus system. part000.txt - is OK
http://www.nod32.com