What is the optimal configuration (local.cf or other) for an ISP's
MSAs to prevent unauthenticated dynamic-IP customers from triggering
dynamic tests, but still benefiting from general filtering?

I was hoping for a magical 'mua_networks' option, which let me
enumerate the IP space that my users submit from, and automatically
exempt them from DOS_OE_TO_MX, etc., but I haven't been able to find
anything like that.

>From my reading of the .conf manpage, the TrustPath page, and the
archives (see references below), I've tentatively concluded that I
will need to have some local rule overrides on all of my MSAs for any
rule or meta-rule that detects dynamic-looking hostnames ... but that
seems high-maintenance locally as well as a lot of duplicated work for
other SA users.

Note also that my MTAs and MSAs are separate farms, so having separate
local.cfs for each is 100% feasible.

To point out the obvious: because my customers may be trojaned  (or
decided to become spammers), I cannot assume that they aren't forging
headers - but I know that  they are *supposed* to have hostnames that
look dynamic.  Also, for legacy reasons, lots of them are
authenticated only by what IP space they're coming from (not SMTP
AUTH, etc.)

I'm a long-time user, first-time poster; any help would be much
appreciated.  I suspect that this is a well-solved issue, and I just
failed to come up with the right Google search for it.

Royce Williams


References:

http://spamassassin.apache.org/full/3.3.x/doc/Mail_SpamAssassin_Conf.html
http://wiki.apache.org/spamassassin/TrustPath
http://old.nabble.com/ALL_TRUSTED-and-DOS_OE_TO_MX-td15659736.html

Reply via email to