Please keep list posts on list, by either Replying To List or All.

On Tue, 2008-05-13 at 17:43 -0500, Robotech_Master wrote:
> On Tue, May 13, 2008 at 5:05 PM, Karsten Bräckelmann
> <[EMAIL PROTECTED]> wrote:
>  
>         Now, here goes my favorite quote these days:
>         
>         $ grep -A 2 procmail /usr/share/spamassassin/20_vbounce.cf
>         
>         # If you use this, set up procmail or your mail app to spot
>         the
>         # "ANY_BOUNCE_MESSAGE" rule hits in the X-Spam-Status line,
>         and move
>         # messages that match that to a 'vbounce' folder.
> 
> Thanks for your advice. I would like to do that. I'd also like to tell
> it to search the body of the bounce for a
> 
> "Sender: [my gmail address]"
> 
> line, which gmail sticks in when I send as [EMAIL PROTECTED], and
> pass those on, since I don't think I can inclusively list every GMail
> mail server (since I don't know them).

The one you are using as SMTP as configured in your MUA should be
sufficient, I guess. If not, you can simply omit the leading hostname or
use file-glob-style patterns. See the docs [1].

  "The hostnames can be file-glob-style patterns, so relay*.isp.com will
  work. Specifically, * and ? are allowed, but all other metacharacters
  are not. Regular expressions are not used for security reasons."


> The thing is, I'm not real good with coming up with my own recipes. :P
> Can you help me out?

Procmail receipts? Sure.

:0 :
* ^X-Spam-Status: .*ANY_BOUNCE_MESSAGE
spam/bounces

Put that AFTER your SA/spamc filtering receipt, and BEFORE any receipt
to dump classified spam into their own folders. Also, of course, do
adjust the delivery actions target.


Not taking on the body grep for Sender (or are you about a SA rule
here?), since I don't know the exact details. Anyway I'd recommend to
just start with the above, and later re-evaluate if you actually see any
need for that.

However, I am rather positive, that VBounce generally does not result in
FP at all -- you can check by sending a test mail to a known-to-fail
address. Testing for any marker like the above seems to aim at rescuing
FPs. Which is the very purpose of whitelist_bounce_relays. I don't think
any additional body grep would be useful.


> Also, what's the difference between ANY_BOUNCE_MESSAGE and
> BOUNCE_MESSAGE?

BOUNCE_MESSAGE is a general MTA bounce message, not including Challenge-
Response or Virus-Scanner bounces. ANY_BOUNCE_MESSAGE is a meta rule
that aggregates all of these. (Not including legit bounces of course,
which originated at your whitelisted relays.)

See /usr/share/spamassassin/20_vbounce.cf :)

  guenther


[1] 
http://spamassassin.apache.org/full/3.2.x/doc/Mail_SpamAssassin_Plugin_VBounce.html

-- 
char *t="[EMAIL PROTECTED]";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to