Hi,

>>> header  __RCVD_OFFICE365        Received =~
>>> /\.outbound\.protection\.outlook\.com \[/
>>> header          __RCVD_OFFICE365_PROXY  X-ClientProxiedBy =~
>>> /\.outlook\.com
>>> \(/
>>>
>>> header  __OFFICE365_TRUST_ORG   X-OriginatorOrg =~
>>> /^(ena\.com|example\.com)/
>>
>>
>> You've set this to be your local system, but what if the mail relay
>> does not process outbound email? What are legitimate values for this
>> header?
>>
>
> I don't have "ena.com" in my own rule.  Rather I have dozens of others
> listed.  Sorry if this is confusing to imply this is for outbound mail.
>
>> In other words, is this helpful if your mail relay doesn't process
>> your outbound mail?
>>
>
> Yes.  It's not meant for outbound but inbound.  I shouldn't have put
> "ena.com" in there for me but you could put it in there for your local rules
> if you think our email is trustworthy.  :)

I think I'm still a little confused. I did a quick search on existing
email received with that header, and it's a hugely varied list with an
equal amount trustworthy as untrustworthy. I don't think it's feasible
to maintain a list of trustworthy domains for this header, unless I'm
missing something?

Also, the youngliving.com domain that was listed in my spample still
isn't blacklisted on any legitimate list. This looks to be a
legitimate domain with a compromised account. You had mentioned your
rules don't really work on compromised accounts from legitimate
domains, but also that it cuts down on invoice spam.

Is this one of those cases where your rules don't really help?





>
> --
> David Jones

Reply via email to