On Tue, 7 Jun 2016 20:08:59 +0200
Reindl Harald wrote:

> Am 07.06.2016 um 19:59 schrieb RW:
> > On Tue, 7 Jun 2016 13:46:13 -0400
> > Alex wrote:
> >  
> >> Hi all,
> >>
> >> I'm curious about the RCVD_IN_SBL_CSS rule and its 3.5 score.
> >> Doesn't this seem a bit high?
> >>
> >> I'm already using postscreen to add 4 points to messages received
> >> with zen/sbl with return code 127.0.0.3, but also seeing quite a
> >> few RCVD_IN_SBL_CSS hits, so I'm assuming this is the result of
> >> the 4 postscreen points not being enough for it to be rejected
> >> outright, then subsequently being tagged by spamassassin.
> >>
> >> These are "deep header" rules, though. Should users be penalized so
> >> severely for using a dynamic address when it may not have been them
> >> responsible for sending the spam that blacklisted that IP?  
> >
> > They are supposed to be addresses from blocks that are believed
> > to have been allocated to snowshoe spammers  
> 
> the point is "supposed"
> 
> the reality is infected machines are moving around ISP networks and
> you sooner or later end in get one of the bused addresses - did the
> spam originate from you? no it did not!
> 
> it is *plain wrong* doing *any* deep header tests on received headers 
> and you will *never* achieve enough to outweight the fallout of hit 
> innocent victims

they're blocks of static addresses.

Reply via email to