On Fri, Mar 1, 2019 at 23:14, Mike Marynowski <mi...@singulink.com> wrote:

>> Does SpamAssassin even have facilities to do that?

> Yes, if spf runs at priority 1, you can define your test at priority 2, so SA 
> executes them in the given order.

>> Don't all rules run all the time?

> They run when relevant, in the given order, and they do whay they say, so if 
> you say that webtest stops if spf test succeeds, then SA does it.

>> SpamAssassin still needs to run all the rules because MTAs might have 
>> different spam mark / spam delete /etc thresholds than the one set in SA.
>
>> The number of cycles you're talking about is the same as an RBL lookup so I 
>> really don't see it as being significant. The DNS service does all the heavy 
>> lifting and I'm planning to make it public.
>
> It is significant of you have many emails to process. It is even more 
> significant if you run the test locally.
>
> On 3/1/2019 5:09 PM, Rupert Gallagher wrote:
>
>> Case study:
>>
>> example.com bans any e-mail sent from its third levels up, and does it by 
>> spf.
>>
>> spf-banned.example.com sent mail, and my SA at server.com adds a big fat 
>> penalty, high enough to bounch it.
>>
>> Suppose I do not bounch it, and use your filter to check for its websites. 
>> It turns out that both example.com and spf-banned.example.com have a 
>> website. Was it worth it to spend cycles on it? I guess not. The spf is an 
>> accepted rfc and it should have priority. So, I recommend the website test 
>> to first read the result of the SPF test, quit when positive, continue 
>> otherwise.
>>
>> --- ruga
>
> On 3/1/2019 5:09 PM, Rupert Gallagher wrote:
>
>> Case study:
>>
>> example.com bans any e-mail sent from its third levels up, and does it by 
>> spf.
>>
>> spf-banned.example.com sent mail, and my SA at server.com adds a big fat 
>> penalty, high enough to bounch it.
>>
>> Suppose I do not bounch it, and use your filter to check for its websites. 
>> It turns out that both example.com and spf-banned.example.com have a 
>> website. Was it worth it to spend cycles on it? I guess not. The spf is an 
>> accepted rfc and it should have priority. So, I recommend the website test 
>> to first read the result of the SPF test, quit when positive, continue 
>> otherwise.
>>
>> --- ruga
>>
>> On Fri, Mar 1, 2019 at 22:31, Grant Taylor <gtay...@tnetconsulting.net> 
>> wrote:
>>
>>> On 02/28/2019 09:39 PM, Mike Marynowski wrote:
>>>> I modified it so it checks the root domain and all subdomains up to the
>>>> email domain.
>>>
>>> :-)
>>>
>>>> As for your question - if afraid.org has a website then you are correct,
>>>> all subdomains of afraid.org will not flag this rule, but if lots of
>>>> afraid.org subdomains are sending spam then I imagine other spam
>>>> detection methods will have a good chance of catching it.
>>>
>>> ACK
>>>
>>> afraid.org is much like DynDNS in that one entity (afaid.org themselves
>>> or DynDNS) provide DNS services for other entities.
>>>
>>> I don't see a good way to differentiate between the sets of entities.
>>>
>>>> I'm not sure what you mean by "working up the tree" - if afraid.org has
>>>> a website and I work my way up the tree then either way eventually I'll
>>>> hit afraid.org and get a valid website, no?
>>>
>>> True.
>>>
>>> I wonder if there is any value in detecting zone boundaries via not
>>> going any higher up the tree past the zone that's containing the email
>>> domain(s).
>>>
>>> Perhaps something like that would enable differentiation between Afraid
>>> & DynDNS and the entities that they are hosting DNS services for.
>>> (Assuming that there are separate zones.
>>>
>>>> My current implementation fires off concurrent HTTP requests to the root
>>>> domain and all subdomains up to the email domain and waits for a valid
>>>> answer from any of them.
>>>
>>> ACK
>>>
>>> s/up to/down to/
>>>
>>> I don't grok the value of doing this as well as you do. But I think
>>> your use case is enough different than mine such that I can't make an
>>> objective value estimate.
>>>
>>> That being said, I do find the idea technically interesting, even if I
>>> think I'll not utilize it.
>>>
>>> --
>>> Grant. . . .
>>> unix || die

Reply via email to