On Fri, 2009-07-10 at 17:59 -0400, Jeff Mincy wrote: > Don't use the un-constrained whitelist_from, unless as a last resort, if > there's no other way and you cannot use the proper constrained ones, > like whitelist_from_rcvd. > > A local root sender should be getting ALL_TRUSTED. whitelist_from_rcvd > won't work on local email - you need at least one external hop to get the > 'rcvd' part. You could write SpamAssassin rules to look for the messages,
Ah, you're right. That option requires handover from the Internet to the *internal* network. Thanks, my bad. > but you probably don't want to AUTOLEARN the messages since any tokens in > the email are probably spam hosts. As pointed out earlier, this type of > email should bypass SpamAssassin in procmail (etc). Agreed, see my notes on that. :) > Anyway, no sample -- no way to point out your issue. Do paste at least > the headers of such a mail. > > Yep. -- char *t="\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4"; main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1: (c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}