Now I see that whitelist_from_rcvd is probably the best all around. As
explained here:

*whitelist_from_rcvd a...@lists.sourceforge.net
<mailto:a...@lists.sourceforge.net> sourceforge.net*


    Works similarly to whitelist_from, except that in addition to
    matching a sender address, a relay's rDNS name or its IP address
    must match too for the whitelisting rule to fire. The first
    parameter is a sender's e-mail address to whitelist, and the second
    is a string to match the relay's rDNS, or its IP address. Matching
    is case-insensitive.

    This second parameter is matched against the TCP-info information
    field as provided in a FROM clause of a trace information (i.e. the
    Received header field, see RFC 5321
    <http://www.ietf.org/rfc/rfc5321.txt>). Only the Received header
    fields inserted by trusted hosts are considered. This parameter can
    either be a full hostname, or the domain component of that hostname,
    or an IP address in square brackets. The reverse DNS lookup is done
    by a MTA, not by SpamAssassin.

    In case of an IPv4 address in brackets, it may be truncated on
    classful boundaries to cover whole subnets,
    e.g. |[10.1.2.3]|, |[10.1.2]|, |[10.1]|, |[10]|. CIDR notation is
    currently not supported, nor is IPv6. The matching on IP address is
    mainly provided to cover rare cases where whitelisting of a sending
    MTA is desired which does not have a correct reverse DNS configured.

    In other words, if the host that connected to your MX had an IP
    address 192.0.2.123 that mapped to 'sendinghost.example.org', you
    should specify |sendinghost.example.org|, or |example.org|,
    or |[192.0.2.123]| or |[192.0.2]| here.

    Note that this requires that |internal_networks| be correct. For
    simple cases, it will be, but for a complex network you may get
    better results by setting that parameter.

    It also requires that your mail exchangers be configured to perform
    DNS reverse lookups on the connecting host's IP address, and to
    record the result in the generated Received header field according
    to RFC 5321 <http://www.ietf.org/rfc/rfc5321.txt>.

    e.g.

      whitelist_from_rcvd j...@example.com  example.com
      whitelist_from_rcvd *@axkit.org      sergeant.org
      whitelist_from_rcvd *@axkit.org      [192.0.2.123]



On 01/28/2018 04:52 PM, David Jones wrote:
> On 01/28/2018 02:25 PM, Benny Pedersen wrote:
>> Chip skrev den 2018-01-28 21:01:
>>> I see that makes sense.  Thanks for the clarity.
>>>
>>> However how do you get to 150?
>>>
>>> good DKIM = 100
>>> good SPF = 100
>>>
>>> That totals 200
>>
>> one more reason not to use it
>>
>> use domain based whitelist_auth not just global all that is dkim pass
>> or spf pass
>>
>
> He is not using this SA instance in a typical mail filtering way.  He
> is trying to do some sort of analysis of spoofing based on SPF_PASS
> and DKIM_VALID_AU.  I am still not sure how spoofing can be determined
> without some form of spammyness taken into consideration.
>
> If you whitelist_auth the commonly spoofed brands/companies, then
> spoofing should score well above zero but how do you determine
> spoofing from regular spam without manually checking?
>
>
>> if you want spammers control what is spam or not cuntinue helping
>> them :=)
>>
>> meta DMARC_SPAM (!DKIM_VALID_AU && !SPF_PASS)
>>
>> && means AND so both need to be not pass
>
>

Reply via email to