On 25-01-16 16:38, Reindl Harald wrote:
> 
> Am 25.01.2016 um 16:22 schrieb Matus UHLAR - fantomas:
>> On 25.01.16 15:17, Reindl Harald wrote:
>>> not worth an argument when it's simply wrong and hits mostly clear ham
>>> and is broken by definition looking at *random* headers?
>>>
>>> cat maillog | grep FSL_HELO_BARE_IP_2 | grep "result: Y" | wc -l
>>> 21
>>>
>>> cat maillog | grep FSL_HELO_BARE_IP_2 | wc -l
>>> 130
>>>
>>> cat maillog | grep FSL_HELO_BARE_IP_2 | grep BAYES_00 | wc -l
>>> 93
>>
>> excuse me, did you get a FP?
>> Together with BAYES_00?
> 
> excuse but the point of a rule hit is not "did it end in a complete FP"
> but "if the rule bahvior is reasonable and hits more spam than ham"
> 
> yet talked with another sysadmin
> 
> same numbers, all spam-hits between 10-36, so without the rule a sure
> mitler-reject and most hits where clear ham, a few only rescued with
> BAYES_00 and otherwise tagged
> 

The way this rule works, sounds to me like it catches a lot of crappy
mailers that send through a legitimate relay. I've also seen issues with
this and its score is lowered to 0.001 @here too.

However the main cause for FPs seems to me internal mail (reporting
scripts sending mail to sysadmin or BI people) which is semi-whitelisted
anyway. This means it only hurts when the client is not able to
whitelist (maybe even before mail hits SA).

@Reindl: maybe you could check with your client(s) what type of mail it
is? Especially if you see the hits popping at regular (cron-like)
intervals. And then inform them that their phpmailer (or whatever crap
mailer they use) could need an upgrade.

In any way, it would be interesting to see what type of ham mail
triggers such a rule when masscheck allows such a high score, before
starting an argument about it.

Regards,
        Tom

Reply via email to