Am 29.08.2014 um 04:26 schrieb Karsten Bräckelmann:
> On Fri, 2014-08-29 at 02:15 +0200, Reindl Harald wrote:
>> look at the attached zp-archive [...]
> 
> Since I already had a closer look at the contents including your local
> cf, and I am here to offer help and didn't mean no harm, some comments
> regarding the SA config.

thanks

>> # resolves a bug with milter always triggering a wrong informational header
>> score UNPARSEABLE_RELAY 0
> 
> See the RH bug you filed and its upstream report. Do you still need
> that? This would be the first instance of continued triggering of that
> test I ever encountered.

well, since there was no software update in the
meantime i fear yes, however it don't harm

>> # disable most builtin DNSBL/DNSWL to not collide with webinterface settings
>> score __RCVD_IN_SORBS 0
>> score __RCVD_IN_ZEN 0
>> score __RCVD_IN_DNSWL 0
> 
> Rules starting with double-underline are non-scoring sub-rules.
> Assigning a zero score doesn't disable them like it does with regular
> rules. In the case of RBL sub-rules like the above, it does not prevent
> DNS queries. It is better to
> 
>   meta __FOO 0
> 
> overwrite the sub-rule, rather than set a score that doesn't exist.

thanks for the information, i will change that

i verfified that it does *really* skip all of them because as
i had only all sub-rules listed it still fired the request

>> # unconditional sender whitelists
>> whitelist_from *@apache.org
>> whitelist_from *@bipa.co.at
>> whitelist_from *@centos.org
>> whitelist_from *@dovecot.org
>   [...]

uhm i am not terrible happy to not have stripped
that block from the config :-(

> Unconditional whitelisting generally is a bad idea and might 
> appear in forged addresses.

i know - i would love the same logic for senders as for MORE_SPAM_TO
and ALL_SPAM_TO to and at the end even combine it From/To

for mailing-lists you need a big hammer to be present if URIs are
blacklisted or in case of security discussions refer to exploits
which is not possible on the device i am about to replace which
leads anytime something is on the zero-hour-intent-list appears
in a message to override whitelists - like the name of the SA
config file if some client wraps it in link headers

something like that would be me final goal

"from s...@a.tld to s...@b.tld -100"
"from @a.tld to s...@b.tld -20"
"from @a.tld to s...@b.tld -2"

which would give a way to implement dropdowns in the admin backend for
different trust levels without need to know the underlying scores which
could be adjusted transparent since it may make sense to do so in the
context of tag-score/block-score

in general after going online and analyze things my intention will be
"no whitelists at all active" but only after some time where i can make
sure from logs there are no false positives which are more bad than
slipped spam but have known working options if needed

> If possible, it is strongly suggested to use whitelist_from_auth, or at
> least whitelist_from_rcvd (which requires *_networks be set correctly)

oh - fine, that pretty easy, the config is generated from
a webUI based script - the networks are correct now, that
was only a temporary thing in the other thread to study
behavior with hand-written craft before write backends
and find out that i can't implement it later as expected

"whitelist_from_rcvd" i already had in mind, but since
only my personal domain is live i rely at forging by
myself for testing things out

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to