>From: Paul Stead <paul.st...@zeninternet.co.uk>
>Sent: Wednesday, January 25, 2017 3:34 PM

>On 25/01/2017, 17:49, "David Jones" <djo...@ena.com> wrote:

>>    Here is an example I just received:
>>    http://pastebin.com/fwbgMKF4

>Received: from mta165a.pmx1.epsl1.com (mta165a.pmx1.epsl1.com 
>[142.54.245.165]) - Pastebin.com
>pastebin.com

>>    This message is very spammy looking and hit a high BAYES_ rule but
>>    was sent from a trustworthy sender with good SPF, DKIM and opt-out.
>>    The IP was not listed on any major RBLs at the time it was received.
>>    Everything looks good and should have been passed through to
>>    the recipient but my SA blocked it primarily due to BAYES_95.
>>    If I train my Bayes DB with this email as ham, then other similar
>>    spam could start scoring lower and get through.  In this case,
>>    I want to trust the reputation of the sender more than the
>>    content so I have added it to my whitelist_auth list.

>>    whitelist_auth *@info.spectrum.com

>A similar method I use is to have the DKIM signing domains I like in a rbl 
>server and query them with askdns

>askdns  LOCAL_TRUSTED_DKIM _DKIMDOMAIN_.lookup.example.com A 127.0.0.2
>tflags  LOCAL_TRUSTED_DKIM nice net
>describe        LOCAL_TRUSTED_DKIM DKIM trusted sender
>score   LOCAL_TRUSTED_DKIM -7.5

Nice.  I bet there are a number of ways to do the same thing.  I was
going for something easy to implement in all SA environments that
didn't require setting up extra things like a local RBL server so the
entire SA community would benefit.  All SA servers should be running
sa-update periodically so extending existing whitelist_auth lists would
be the way to go.  We would need a way to submit ham much like
the masscheck processing so when a minimum number of ham
submissions were received, it would be added to something like a
60_whitelist_auth.cf file that is updated via sa-update.

Thoughts?

Reply via email to