Hi,

On Tue, Aug 29, 2017 at 2:24 PM, David Jones <djo...@ena.com> wrote:
> On 08/29/2017 11:27 AM, Alex wrote:
>>
>> Hi, it appears SANS is using amazon to relay some of their mail, but
>> does not sign their messages with DKIM. The mail is sent as part of
>> some corporate training program they're doing, using the domain of the
>> company contracting with them for the training.
>>
>> So the mail is signed with DKIM_VALID and SPF, but not DKIM_VALID_AU,
>> making it difficult to whitelist. It shouldn't need to be whitelisted
>> in the first place, but my users are demanding it be done.
>>
>> More generally, how can I whitelist mail that originates from
>> something like
>> 0101015e15fd907e-7806-4437-936b-47b4bf2a606b-000...@us-west-2.amazonses.com
>> and has no DKIM_VALID_AU, making it impossible to whitelist by From
>> address?
>>
>> My concern is using whitelist_from_rcvd with a generic sender like
>> amazonses doesn't really provide much additional security when it's
>> effectively a freemail relay.
>>
>> Maybe create a unique rule that subtracts points?
>>
>
> From my experience, Amazon's Simple Email Service already has a good
> reputation -- not on major RBLs.  I have never had problems with spam from
> Amazon SES and they seem to do a very good job of handling abuse:
>
> https://aws.amazon.com/blogs/ses/tag/abuse-complaint/
>
> This is my definition of a trusted sender that could be safely whitelisted
> with:
>
> whitelist_auth *@amazonses.com
> whitelist_auth *@*.amazonses.com
>
> The SPF_PASS will be enough with the SANS domain to work with the
> whitelist_auth entries above without DKIM_VALID_AU hits.

Okay, awesome. I think I misunderstood the purpose of amazonses, and
thought it was more accessible to freemailers and spammers than it
actually appears to be.

In other words, I thought if someone had an amazonses account, they
could spoof a sender, and although as unlikely as it is for someone to
know it's whitelisted, the possibility exists.

Reply via email to