Henrik K wrote:
On Wed, Mar 19, 2008 at 05:35:32PM +0100, mouss wrote:
Henrik K wrote:
On Wed, Mar 19, 2008 at 02:48:34PM +0100, mouss wrote:
Luis Hernán Otegui wrote:
[snip]

how about something like

 header    NONFQHELO_DYN1  X-Spam-Relays-Untrusted =~ /^[^\]]+
 rdns=\S*[^a-z]{9}\S+ helo=[^\.\s]+ /i
 score      NONFQHELO_DYN1  3.0
 describe NONFQHELO_DYN1  non fqdn helo from dynamic client

 ?
I'll go with this, and tomorrow we'll see. Thanks a LOT to everybody
for their suggestions. They've gone right into my documentation folder
;-)
beware. that was a question, not a suggestion! I only ran it on very few messages, so it's completely untested.
It should use X-Spam-Relays-External. Still a common minconception that
untrusted == external.

can you explain why it should use *-external instead of *-untrusted?

Inspired by this thread I submitted this, which should explain it:

https://issues.apache.org/SpamAssassin/show_bug.cgi?id=5856


it's because you are trusting the ISP MSA. I am not. I only trust my ISP and my registrar MX. no MUA should talk to them.

*-external wouldn't bring me anything, because I am already doing checks at the MTA level, so the zombie won't get to SA if it matches such rules. In particular, I reject non fqdn helo on the MX unconditionally (I know this may catch misconfigured sites, but I currently don't care).





Reply via email to