LuKreme a écrit :
> On 10-Dec-2008, at 12:10, Kelson wrote:
>> Successful sender verification ALONE doesn't tell you much, because it
>> doesn't distinguish between a legit sender who uses DKIM and a spammer
>> who uses DKIM (or a spammer abusing a large sender).  This is why the
>> default scores on DKIM_VERIFIED and DKIM_SIGNED are just enough to
>> track the rule, and not enough to significantly affect the score
> 
> Thank you (and you too, mouss) for the explanation, this does make a lot
> of sense now.  I guess I need to go through all my mail and find the
> DKIM info for the good sites.
> 
> Given that I get mail from company.tld and they used DKIM and I trust it
> if it passes, and given that company.tld is a company where I am getting
> mail from their employees and not from their clients (like not an ISP),
> does this look about right:
> 
> whitelist_from_dkim [EMAIL PROTECTED]
> whitelist_from_dkim [EMAIL PROTECTED]
> header __L_FROM_CTLD From:addr =~ /[EMAIL PROTECTED]/mi
> meta     L_NOTVALID_CTLD !DKIM_VERIFIED && __L_FROM_CTLD
> score    L_NOTVALID_CTLD 5
> 
> Which would, I think, score them a full 5 points up for failing DKIM,
> but give them a negative score from USER_IN_DKIM_WHITELIST?

while the whitelisting part is ok, the "blacklisting" part is risky:
- they could mess up with their dns config during an update.... or they
could add a new MTA, or reconfigure their MTA and "forget" to pass
throgh the dkim signing application...

- they may want to allow some of their users to post via their ISP, hotel,

- ...

so 5 is a little too high.

I see yahoo mail failing verification (and yes, it is legit mail sent by
a yahoo user via yahoo. no forgery or anything). That should tell you
something ;-p


> 
> And I assume that the dkim.cf that was in /etc/mail/spamassassin/ should
> be in /var/db/spamassassin/3.002.005/ instead?
> 

no. it's your file, so leave it in your "site rules directory"
(/etc/.... apparently). /var/{db|lib}/spamassassin/.... is for automatic
updates.

Reply via email to