On Fri, 19 Jun 2020, micah anderson wrote:

John Hardin <[email protected]> writes:

On Fri, 19 Jun 2020, micah anderson wrote:

So, what can I do to tweak these rules to score things up more,
specifically the rules that provide a low false positive rate[1]. This
seems something that should be done programmatically, and not
manually. It seems like what 'masscheck' maybe does generically for all
rules for all installations, but can I use that to just adjust our rules
for our particular breed of spam that comes through?

How about: analyze your spamtrap for recent source IP addresses on a
quick schedule (hourly?) and drive a local DNSBL from IPs seen more than
2-3 times in the last 24-48 hours?

Interesting possibility... but if I look at the current batch that made
it through, I see:

1. amazon aws
2. gmail (amusingly saying my amazon prime membership is going to
expire)
3. mailchimp
4. yahoo.com

all of those would not be good to block :(

Amazon AWS if not using a "real" (non-AWS) domain name might be safe to reject - there's been some discussion about that on the list lately.

Its not always like that, but it does happen.

Hm. Perhaps you'd need whitelists too, to avoid some known mixed sources.


--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 [email protected]    FALaholic #11174     pgpk -a [email protected]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  I’ve seen firsthand how an ideological hatred of guns and the
  people who own them is more important to some people than the
  actual goal of saving lives.
                 -- Dan Gross, former president of the Brady Campaign
-----------------------------------------------------------------------
 138 days until the Presidential Election

Reply via email to