On 16-10-19 12:19, Simon Wilson wrote:
Hi, I have a Horde system submitting to a
postfix/amavisd-new/spamassassin server for spam detection (different
servers, same subnet). I *do* consciously run SA over internally
submitted emails to catch compromised accounts (it happened once to me
when a family member's email password was compromised and a bunch of
spam got sent out).
I'm having occasional issues with mail sent by some users from their
home ISP connections (i.e. Chrome client on ISP dynamic IP -> Horde
server/postfix etc). Email validly sent through the trusted host Horde
server gets a bonus (ALL_TRUSTED = -2) which SA is triggering fine when
appropriate, but some emails are still triggering thresholds, so I was
wondering what others do for configuring for traffic that is *mostly*
trusted but should still be checked for obvious spam?
This is not a new system, it's well trained with thousands of ham and
spam over several years. This email was genuine ham, and was discarded
(Amavis threshold 6.0 -> discard).
Content analysis details: (6.0 points, 6.2 required)
pts rule name description
---- ----------------------
--------------------------------------------------
-2.0 ALL_TRUSTED Passed through trusted hosts only via SMTP
0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60%
[score: 0.5000]
0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record
0.0 HTML_MESSAGE BODY: HTML included in message
3.6 HELO_DYNAMIC_IPADDR2 Relay HELO'd using suspicious hostname (IP
addr
2)
1.0 RDNS_DYNAMIC Delivered to internal network by host with
dynamic-looking rDNS
2.1 TO_NO_BRKTS_DYNIP To: lacks brackets and dynamic rDNS
0.5 NO_FM_NAME_IP_HOSTN No From name + hostname using IP address
It feels like the dynamic IP rules are killing it here - what do others
do for valid dynamic IP emails inbound from a web client email through
trusted hosts? Just give ALL_TRUSTED more of a boost? Or anything more
scientific??
The default rule scores obviously don't apply for your use case here:
dynamic RDNS is to be expected for the relayed emails you are scanning.
Also it is not an indicator that the sender is abusing a (hacked)
end-user host. So you should adjust the scores of the rules that are not
applicable for your use case:
score RDNS_DYNAMIC 0.001
score HELO_DYNAMIC_IPADDR2 0.001
Something to note: RDNS_DYNAMIC tries to exclude authenticated email.
Are you accepting email from senders without authentication? Or maybe
your trusted_networks/internal_networks are misconfigured, so the
authentication is not properly detected?
Kind regards,
Tom