On Sep 28, 2015, at 1:53 PM, John Hardin <jhar...@impsec.org> wrote:

> Is greylisting an acceptable option in your environment?

Probably not.  I've got some users who would not accept it.  I'm thinking of 
implementing it anyway, but right now, not a viable option.

> Also: both of those samples have URIs and From addresses using unusual new 
> TLDs. You might want to add something like this:

I've adjusted the score of blacklist_uri_host down to only 3 points when Bayes 
is enabled, so blacklisting would effectively do the same as what you're 
suggesting, I think... maybe not handling the "From" part.  But, as mentioned, 
I was hoping to find something that did not enable wholesale TLD trashing, 
although I do acknowledge that this is sometimes the best option.

> IME "may be forged" in a Received header refers to the fact that an untrusted 
> user was running sendmail to submit the message. I don't know how good a spam 
> sign it is by itself, but in concert with BAYES_999 and/or URI_RARE_TLD it 
> would probably be worthwhile.

AFAIK the "may be forged" indicates that rDNS lookup on the sending IP did not 
match the HELO information provided by the client, and wasn't specific to 
trusted or untrusted users.  Is that not the case?

Using it alone definitely would be a recipe for FP, because I've seen plenty of 
ham with this. However, I was thinking maybe scoring it 0.1 or 0.2 points, 
which would then be sufficient when added to BAYES_99 + BAYES_999 to knock an 
otherwise-non-scoring spam over the threshold.  I guess it could be meta-ruled 
for additional protection.

Would something like this be sufficient, or should I make the RE more stringent?

# Add spamminess to "may be forged" warning in Received header
header RCVD_MAY_BE_FORGED       Received =~ /\(may be forged\)/
describe RCVD_MAY_BE_FORGED     Fake HELO info in Received header
score RCVD_MAY_BE_FORGED        0.2

Thanks.

--- Amir

Reply via email to