On Fri, 2009-07-10 at 17:59 -0400, Jeff Mincy wrote:   
>    Don't use the un-constrained whitelist_from, unless as a last resort, if
>    there's no other way and you cannot use the proper constrained ones,
>    like whitelist_from_rcvd.
>    
> A local root sender should be getting ALL_TRUSTED.  whitelist_from_rcvd
> won't work on local email - you need at least one external hop to get the
> 'rcvd' part.  You could write SpamAssassin rules to look for the messages,

Ah, you're right. That option requires handover from the Internet to the
*internal* network. Thanks, my bad.

> but you probably don't want to AUTOLEARN the messages since any tokens in
> the email are probably spam hosts.  As pointed out earlier, this type of
> email should bypass SpamAssassin in procmail (etc).

Agreed, see my notes on that. :)

>    Anyway, no sample -- no way to point out your issue. Do paste at least
>    the headers of such a mail.
>    
> Yep.

-- 
char *t="\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to