>our $DKIMpassAction = 7;                 # (0..7) if DKIM pass: bit-0 = 
set rwlok to 1 (medium trust status), bit-1 = skip penaltybox-check, bit-2 
= set IP-score to zero - default is 7 (all bits set) 

This shows all. The mail is nearly full whiteisted  (medium trust status), 
the penaltybox is not checked, the IP-score is cleared.

If such a mail is blocked by assp, the question is - why?

If this question is answered, configure the blocking check to your needs.

>AND it's got a valid DKIM signature tied to the from domain, treat the 
mail as whitelisted.

All DKIM checks made before the complete mail is received (eg. header part 
check)  have a medium  trust - why? The full DKIM signature check requires 
to have the full mail received. So, for most of the mails all other checks 
are done before the DKIM-signature can be checked.

Your logic will not work!

>Do you think this makes sense to consider as a possible future ASSP 
feature?
No.
If you want, you can write your own level-1 plugin (after header checks 
are done) to puzzle out your logic using the available low trust DKIM 
verification results.


>Maybe there's another way?  I'm all ears.

It is possible to use an available '..bombRe' regular expression feature 
(here - e.g. bombHeaderRe) to reduce or to increase the score of an email, 
based on found DKIM signatures for specific domains.

~\n(?:DKIM|DomainKey)-Signature:(?:\s*(?:[a-ce-z])=[\w\-\/]+\;)*\s*d=the\.domainname\.here\;~
 
=> your-(negative)score.or.weight-here

or for more domains

~\n(?:DKIM|DomainKey)-Signature:(?:\s*(?:[a-ce-z])=[\w\-\/]+\;)*\s*d=(?:the\.domainname\.here|nextdomain|nextdomain|....)\;~
 
=> your-(negative)score.or.weight-here


Any of the next versions will possibly be able to accept executable code 
in regular expressions (executed on regex  match).This feature is 
implemented in perl regular expressions. It will make it (for example) 
possible to do the following:

~\n(?:DKIM|DomainKey)-Signature:(?:\s*(?:[a-ce-z])=[\w\-\/]+\;)*\s*d=(?:the\.domainname\.here|nextdomain|nextdomain|....)\;(?{eval('$Con{$fh}->{whitelisted}=1')})~
 
=> your-(negative)score.or.weight-here
or
~\n(?:DKIM|DomainKey)-Signature:(?:\s*(?:[a-ce-z])=[\w\-\/]+\;)*\s*d=(?:the\.domainname\.here|nextdomain|nextdomain|....)\;(?{eval('CorrectASSPcfg::myDKIMCheck($fh)')})~
 
=> your-(negative)score.or.weight-here

If a match is found, the code will be executed. In the first example, the 
'whitelisted' flag is set to the highest trust level and the weight is 
used. The second example calls a custom sub routine in CorrectASSPcfg.pm 
on match.

In the current version, this is forbidden by assp (even perl allows it) 
and per default this will be also the case in future version. But the 
future version will have a switch to allow the usage of  this perl 
feature.

Thomas




Von:    "K Post" <nntp.p...@gmail.com>
An:     "ASSP development mailing list" <assp-test@lists.sourceforge.net>
Datum:  01.03.2018 19:03
Betreff:        Re: [Assp-test] [SPAM] Re: Allow DKIM signed mail through 
for a domain



That's good to know, thanks.  However, I'm looking for something a little 
different.  I don't want to apply the same rules to ALL dkim signed mail, 
only to those from specific domains.  Otherwise any spammer who registers 
a domain and uses DKIM signing will have mail get through.  Worse, that 
would also have all signed mail from providers like gmail.com come through 
regardless of content.

And note, I have RWLwhitelisting set to off (the default) for fear of 
having good IP's lke office365's not do any other filtering.

Instead, I'm thinking about logic like this: f the from address on an 
email  (only the header from address) matches what I have in a config file 
AND it's got a valid DKIM signature tied to the from domain, treat the 
mail as whitelisted.   Don't penalize these domains if it's not signed, 
but if it is, just let it through and put the mail to the notspam corpus.  
This way known outside domains who we know generally dkim sign their mail 
will get through to us and improve bayesian / HMM.  Whitelisting a domain 
like redcross.org isn't an option, as spammers send from there to us all 
of the time.  But if we could always allow DKIM through regarles of which 
user sent to us, that would help.  

Do you think this makes sense to consider as a possible future ASSP 
feature?  Maybe there's another way?  I'm all ears.

Thanks



On Wed, Feb 28, 2018 at 11:51 AM, Thomas Eckardt <
thomas.ecka...@thockar.com> wrote:
If amail apsses the DKIM check it will be processed like it would be 
"RWLOK" (default). 
This can be configured using the hidden variable "$DKIMpassAction". 


our $DKIMpassAction = 7;                 # (0..7) if DKIM pass: bit-0 = 
set rwlok to 1 (medium trust status), bit-1 = skip penaltybox-check, bit-2 
= set IP-score to zero - default is 7 (all bits set) 

Thomas





Von:        "K Post" <nntp.p...@gmail.com> 
An:        "ASSP development mailing list" <
assp-test@lists.sourceforge.net> 
Datum:        28.02.2018 15:54 
Betreff:        [Assp-test] Allow DKIM signed mail through for a domain 




Lots of our external contacts use Office365.  Senderbase is obviously 
useless for them.  If a sender is whitelisted, fine, but there are often 
large numbers of senders in an organization (known organizations where we 
cannot whitelist the domain or else spammers from another server would get 
through). 

So, since many of these companies use DKIM is there a way with ASSP to 
consider an email for a particular sender domain whitelisted if a the DKIM 
matches?  We cannot not strictly require a DKIM or penalize since these 
larger organizations typically also send non-signed email from other 
sources, but if the DKIM does match for a list of domains, just let it 
through, regardless of content. 

Is that doable?  If not, is it worth considering?.   

Respectfully, 
Ken 


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot 
_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test





DISCLAIMER:
*******************************************************
This email and any files transmitted with it may be confidential, legally 
privileged and protected in law and are intended solely for the use of the 

individual to whom it is addressed.
This email was multiple times scanned for viruses. There should be no 
known virus in this email!
*******************************************************


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test





DISCLAIMER:
*******************************************************
This email and any files transmitted with it may be confidential, legally 
privileged and protected in law and are intended solely for the use of the 

individual to whom it is addressed.
This email was multiple times scanned for viruses. There should be no 
known virus in this email!
*******************************************************

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test

Reply via email to