Am 05.06.2014 21:48, schrieb Franck Martin:
If the policy=reject and the dmarc is fail, then spamassassin should not see the email because opendmarc would have already rejected it (if not it is due to local policy override, so spamassassin should not change that)
In the default configuration OpenDMARC doesn't reject on policy failures, it only adds an Authentication-Results header, which I already use in SpamAssassin. But I don't think it's a good idea to reject mail because of DMARC policy failure, there are too man mailing-list and mail forwardings that are not compatible with DMARC requirements.
In the last case p=none (monitoring) it means the sender does not have all its mail stream under control, so adding some marginal points to the dmarc=fail condition, could be fine, but adding a lot of points, means you are going to block/flag emails from the streams the sender does not have under control (like a third party). The sender may also not want all its mail stream under control...
You are right, DMARC policy pass should be given some negative spam points. But for policy failures your are more flexible using META rules. If DMARC policy fails and the mail comes from a mailing list, I wouldn't give it any spam points, but when it comes directly, it's probably forged and should be given some spam points.
In short if you have installed openDMARC, then you don’t need spamassassin, the work has been done. If you don’t have openDMARC then spamassassin may help you.
That's the point, I have a solution when I use OpenDMARC, I can check the Authentication-Results header. But I want a solution to be independent of OpenDMARC milter.
As for SENDERDOMAIN this is, in most case. the domain in the From: header… However, there is this concept of alignment against the organizational domain, which requires the heuristic of the public suffix list rules.
I know. AskDNS can handle multiple entries in the _SENDERDOMAIN_ tag, e.g. sub.example.com,example.com. The only problem would be to give sub.example.com a higher priority if both match.
So my problem still is how to get the _SENDERDOMAIN_ tag set without writing a plugin. If it's imposible, maybe I'll write a plugin, but I want to keep the check as simple as posible.
I would be more interested to know, how you could inject the result of DMARC into the bayesian filtering, and how to meaningfully affect its results.
I don't know why you would inject the results into Bayes, DKIM and SPF are not used in Bayes either afaik.
The results from using the OpenDMARC Authentication-Results header are: %SPAM %HAM DMARC_FAIL 21.21 0.85 DMARC_PASS 0.00 39.18 -- Christian Laußat https://kvm.laussat.info/