>>On 08.06.15 23:03, Michael B Allen wrote:
>>So I have had SA running for about 2 days on a very small site with a
>>handful of users. I've been running the default config just to see how
>>well it would do by itself. Unfortunately quite a lot of spam is
>>getting through. So far 40 of 142 spams have passed.
>>
>>So my question is, what is the best way to improve things? Is there
>>any particular must-have plugins? What is the one thing I can do to a
>>default install that is going to give me the biggest return on
>>invested effort?

>network checks like razor/pyzor/dcc (they all require third-party programs)
>TextCat (if you and your users are able to set up ok_languages)

+1 on the razor/pyzor/dcc but they can be challenging to get working
TextCat is good and easy to enable.

Some of the best and easiest things you can enable to block spam are
outside of SpamAssassin at your MTA (sendmail, postfix, etc.).
- Enable RBLs and DBLs.  zen.spamhaus.org is the best way to block the
  majority of junk before it reaches SA.  Just make sure you are below their
  free threshold limit.  One important way to do this is to make sure your
  SA server isn't pointed to an Internet caching DNS server that would join
  your queries with others.  Install a local caching DNS server that does not
  forward to another caching DNS server and change /etc/resolv.conf to use
  127.0.0.1.
  Look in this list archives for other RBLs and DBLs that have been recently
  recommended.  My most effective RBL is sip.invaluement.com based on my
  logs.  This is a subscription-based RBL that is reasonably priced and worth
  every penny.
  My top hit counts from last week from dnsblcount.pl script (using
  postscreen so the numbers are most likely skewed based on ordering and
  thresholds being met with multiple RBL hits):
    sip.invaluement.com            1323365
    b.barracudacentral.org          464976
    zen.spamhaus.org                243244
    sip24.invaluement.com           238086
    dbl.spamhaus.org                 72507
- Enable DNS checks:
  Make sure the sending mail server's SMTP HELO is a valid domain.
  Make sure the sender address (MAIL FROM) is a valid domain.
  Make sure the sending mail server has a PTR record.  Some can go farther with
  this one and require the PTR match the SMTP HELO for FCrDNS but there are
  many legit mail servers out there that don't have this setup properly so I can
  only check to make sure a PTR record exists.  Later in SA I add points for 
rule
  RDNS_NONE that penalizes for incorrect FCrDNS.
- Enable greylisting.  This is just about the only way you can block zero-hour 
spam
  from compromised accounts that come from legit mail servers before they get
  listed in RBLs.  I use SQLgrey with Postfix and was able to ease it in slowly 
with
  it's feature called discrimination mode.
- Block the newer TLDs until you need to allow them.   Spammers are registering
  the new TLDs like ".link" and ".click" then sending spam from it.  There was a
  recent thread in this mailing list talking about how to get a list of them.
- Block TLDs that often contain nothing but spam.  Not everyone can do this but
  in my environment, I am able to block .br, .hu, .ro, .ru, .tw, .vn, etc.  I 
have a
  small whitelist built over time that I allow trusted IPs to bypass this check 
but
  most of the time this is email from infected PCs that are members in a botnet
  sending from all over the world with these country codes.

Inside SA add the KAM.cf rules (Google for it) and update them a couple of times
each day.  These rules are a must!
I also have added CRM114 and BOGOFILTER plugins which are similar to BAYES
but don't require the manual training.  These are fairly difficult to install 
but
provide a good complement to BAYES scoring and actually help automatically
train my BAYES database.
Setup ClamAV and add the UNOFFICIAL SIGS.

Reply via email to