> > It is only a partial solution. It covers only one method > > of authorizing roaming users for submitting mail to their > > organization's MSA. It would be much better to have > > a more general solution, trusting MSA to do its job > > (see parallel thread "internal/trusted again, MSA tested > > for SPF?")
> Agreed in the case of a totally separate MSA host. Right. If it is not separate I agree this remains to be a more difficult problem. > Although in that case, I'm not sure about what benefit there is > to scanning the mail at all. Here are some good reasons to spam-scan (and virus-scan) outgoing mail: - an internal host (or a roaming laptop) may become infected, turned into a spam-spewing zombie or a virus-propagating host. It is wise to catch them as soon as possible, better in-house, blocking pollution from spreading and retaining company face. It also facilitates locating such a host. - internal user may intentionaly start sending spam. Letting administrator become aware of it can lead to educating users about company policy. An in-house bounce can make a good-faith user rephrase his mail and avoid risking it to be junked on the recipient's side. - letting Bayes auto-learn on both outgoing and incoming mail leads to a better database, with more high-quality samples of ham. - and a shameless plug: amavisd-new-2.4.2 introduced pen-pals whitelisting scheme (based on a database of all recent mail messages), reducing spam score on replies to previous outgoing mail if sender/recipient address pair exactly matches previous recipient/sender pair. For this to work mail must pass through a content filter in both directions. Btw, it could just as well be made into a SA plugin, it was just easier for me to use existing infrastructure. If someone cares to write a SA plugin implementation of the same mechanism, I have no objections. More on that in 2.4.2 release notes: http://www.ijs.si/software/amavisd/release-notes.txt Mark