On Wed, 25 Jul 2018, David Jones wrote:
On 07/24/2018 11:10 PM, chuckee wrote:
I'm from a reasonably large ESP and we handle all types of emails being
sent
via our servers. We've noticed a change with SpamAssassin in the last few
days/weeks which is causing problems.
The following 2 rules are causing these problems:
3.5 HDR_ORDER_FTSDMCXX_DIRECT Header order similar to spam
and
2.0 MIMEOLE_DIRECT_TO_MX MIMEOLE + direct-to-MX
Feel free to set these scores to zero or 0.01 for a quick fix to your
solution while this gets sorted out.
The high scoring first rule, especially, is causing problems, and is
triggered if a sender is sending emails from Windows Live Mail (it seems to
be just this email client), and their email only has 1 'Received from'
header.
So there are no headers for the internal-to-Windows-Live handoffs? Windows
Live Mail is acting as a MUA w/r/t your MTA?
Or are you stripping Received headers *before* your SA scan?
As an ESP we can confirm that it is extremely common for ESP's to strip out
'Received from' headers - if we didn't, then many recipient mail servers
reject emails because they look at the (often bad) reputation of the IP
address of the sender and judge an email on that. For example, if a sender
is sending an email from a hotel, their email would be judged based on the
reputation of the hotel's IP address (which is a ridiculous scenario). We
can confirm that Barracuda is one such email filter that does this.
You shouldn't have to strip out Received headers to prevent legit emails from
getting rejected. Either this is from using too aggressive RBLs or you need
to add to your trusted_networks to look past some Received headers. Another
option I use is to make meta rules for certain OK Received headers to
subtract a few points.
As such, both of the above rules (in our opinion) should not be in place.
ESP's must strip out received headers to prevent legitimate emails from
getting rejected. If we leave them in to cater for those SpamAssassin rules
then many emails will get rejected based on reputation checks of the
sender's own IP address (which is against proper email protocol, but has
been happening ever since email was invented and will continue to happen).
What can be done to influence whoever made these recent rule changes to
revert things back to how they were?
I guess someone needs to look back through the SVN commits to see when this
was introduced.
Both were me, based on the S/O in the masscheck corpus.
MIMEOLE_DIRECT_TO_MX has been around for a couple of years now,
HDR_ORDER_FTSDMCXX_DIRECT is recent.
SPAM% HAM% S/O RANK SCORE NAME
12.5652 0.0008 1.000 1.00 0.00 HDR_ORDER_FTSDMCXX_DIRECT
14.3808 0.0229 0.998 0.94 1.00 MIMEOLE_DIRECT_TO_MX
I'm a bit surprised that HDR_ORDER_FTSDMCXX_DIRECT is problematic
because it's partially based on suspicious header ordering. I can see
MIMEOLE_DIRECT_TO_MX being problematic because that's essentially "MSFT
MUA sending direct to my MTA".
I'll set a lower score limit on HDR_ORDER_FTSDMCXX_DIRECT.
I'd be willing to investigate an exclusion for Windows Live Mail, based on
the assumption that MSFT Got It Wrong Again.
If you can provide the headers from such a FP message (zipped, in private
mail) I will see what I can do to tune it.
--
John Hardin KA7OHZ http://www.impsec.org/~jhardin/
jhar...@impsec.org FALaholic #11174 pgpk -a jhar...@impsec.org
key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
The promise of nuclear power: electricity too cheap to meter
The reality of nuclear power: FUD too cheap to meter
-----------------------------------------------------------------------
10 days until the 283rd anniversary of John Peter Zenger's acquittal