On 23/08/12 04:31, Kevin A. McGrail wrote:
On 8/22/2012 8:33 PM, Ned Slider wrote:
So if I hit all mail claiming to be sent from fedex.com that fails SPF
I can easily weed out all the fakes:

# Fedex
header __LOCAL_FROM_FEDEX Return-Path:addr =~ /\@fedex\.com$/i
meta LOCAL_SPF_FEDEX ((SPF_SOFTFAIL || SPF_FAIL) && __LOCAL_FROM_FEDEX)
describe LOCAL_SPF_FEDEX Fedex SPF Fail

and if I want to make sure all the legit fedex mail gets through I can
further whitelist mail from fedex that passes SPF

whitelist_from_spf *@fedex.com
whitelist_from_spf *@*.fedex.com

and that will virtually guarantee all the spam/viruses claiming to be
from fedex are blocked and all the legitimate mail from fedex gets
through. It's no different with banks.

However, this approach doesn't scale particularly well. It's OK for 10
or 20 domains, but for many more it would be far easier to manage
using a plugin.
So really want you want is a plugin that can take a list of domains that
we've verified support SPF using -all and make that a stronger score?

Regards,
KAM


I guess what we are looking for is a plugin that can take a list of commonly abused domains known to have valid SPF records or valid DKIM signatures, and to be able to apply a (stronger) score to those messages that fail the SPF and/or DKIM test.

If it were a plugin then those using email forwarding that breaks SPF and/or DKIM could easily disable the plugin making the system easy to manage.

IMHO, talking SPF, it doesn't really matter if it's -all or ~all (hard or soft fail), here SA isn't making a policy judgement but rather creating a set of rules that differentiate spam from ham, or in this case attempting to differentiate mail that really is sent from paypal et al versus that which isn't (I'm struggling for the correct terminology here as it really isn't spam vs ham as we really don't care if it's solicited mail or not, just that it's genuinely sent not fraudulently sent). In much the same way as SA currently scores SPF_NEUTRAL > SPF_SOFTFAIL > SPF_FAIL which is the logical reverse of what the policy suggests, but that is what the corpus scoring model says is more effective.

So just as with the above, the plugin rule should look to be a good indicator of spam/abuse/fraud/phish or whatever you care to call it versus mail genuinely sent from these domains.

As an example, paypal.com uses ~all, but I'm going to treat that as a FAIL in SA the same as I would treat -all.

I guess it comes down to looking closely at a list of domains and deciding if there is evidence:

(a) that they are commonly abused

and

(b) that they have an SPF and/or DKIM policy that we can leverage to differentiate legitimate mail from abuse

at which point they would make a suitable candidate for inclusion on the plugins list of domains.

Reply via email to