Interesting! Thanks Greg.
My results (about 1800 inbound emails across 6 days) show:
 * combination of postscreen and other upstream tests are catching true baddies 
enough that the VALIDITY_RPBL does not catch any for me * VALIDITY_SAFE and 
VALIDITY_CERTIFIED hit on about 5% of total emails (96)
I've now disabled the SA lookups for RPBL (thanks @ pgnd for the link with an 
easy way to do that), so that should drop my lookups by a third, taking me to 
about 15k per 30 days I think on average. As you mention, a combined answer 
would safe a huge amount of lookups.
My mail server is running RHEL8 with spamassassin 3.4.6 - so the BLOCKED tests 
are not there - but I'm not being blocked from what I can see, so that's not an 
issue for now.
Simon.


On Saturday, April 05, 2025 11:57 AEST, Greg Troxel <g...@lexort.com> wrote:

 
"Simon Wilson via users" <users@spamassassin.apache.org> writes:

> OK, back to the purpose of this list - spamassassin! :)
> Validity are planning to enforce limits (although how they will
> enforce remains unknown - timeouts? false -ves? false +ves?). Given
> that these DNS BLs are in the standard config, and I'm apparently
> exceeding the free threshold of 10,000 queries in 30 days I need to
> explore ways to reduce consumption.
> From looking in 20_dnsbl_tests.cf, the Validity tests seem to be
> generating queries to sa-trusted.bondedsender.org,
> sa-accredit.habeas.com and bl.score.senderscore.com.

I have no recollection of signing up in any form, and have not gotten an
email asking me to pay. I actually had no idea these were pay/limited
until your mail, as I figured free access to SAFE/CERTIFIED for relying
parties was part of the business model of charnging "high volume email
senders" to be certified as not spammers. (To be fair, my analysis of
30 days of logs did not find any CERTIFIED or SAFE senders as spam.)


Reading 20_dnsbl_tests.cf, I notice:

Indeed there are 3 tests, for 3 rules. (Interesting that it isn't a
combined answer.)

There are _BLOCKED rules, checking for 127.255.255.255, and code to
stop querying (I think) if that rule fires.

Looking in my logs, there are enough emails that I should be seeing a
somehwhat higher query volume than you, although if TTLs are reasonably
long a fair bit of mailinglist traffic may avoid lookups. Still, I'm
almost certainly over 10000/month.

I didn't react to 10000/month when you said it but having done the math,
finding my usage (definitely personal) over, and that it's only just
over 100 messages/day, it seems clear that 10K is way too low a limit
for a service to be included in the default ruleset. But maybe with an
overlimit response and SA configured to just stop after getting that
once, it's ok. I don't remember doctrine accomodating that but I
suspect I would have missed discussion depending on when.

Are you using SA 4, that should handle *_BLOCKED? If not, upgrading
seems in order. Or is that rule firing?


Looking at scores:

33 messages had both RCVD_IN_VALIDITY_CERTIFIED and RCVD_IN_VALIDITY_SAFE
seems like all ham

27 messages hit RCVD_IN_VALIDITY_RPBL
3 are ham, same host
24 were very high scoring and I can comfortably say all spam

I'm not sure how much it would have hurt my classification to skip these rules.

For your amusement, my custom scores, adjusted ad hoc over time. I
don't remember clearly, but I think I was getting spam that was hiting
SAFE (and you can see by the comments that SAFE seems to include "single
opt in").

score RCVD_IN_VALIDITY_SAFE 2 # was -2
score RCVD_IN_VALIDITY_CERTIFIED -2 # was -3
# VALIDITY's blocklist appears good.
score RCVD_IN_VALIDITY_RPBL (2) # was 1.3

Based on recent log analysis, I changed to:

score RCVD_IN_VALIDITY_SAFE -1 # was -2
#score RCVD_IN_VALIDITY_CERTIFIED -3 # was -3
 

-- 
 Simon Wilson
M: 0400 121 116

Reply via email to