Sidney Markowitz wrote:
> Matthias Leisi wrote, On 1/02/10 9:46 AM:
>> Does it come from a unique IP range?
> 
> In my one example it looks like the vendor sent it themselves to an
> address that they were provided ***[email protected] and
> from there it went through Google's processing. I guess I could
> test for a To address of *...@checkout.*.google.com as long as I could
> be sure that it really went through the google.com MX server rather
> than have a bogus To address and Bcc'd to me. I could make use of
> X-Spam-Relays-Trusted in a header rule, but I'm not sure how to
> distinguish between mail sent to the *...@checkout.*.google.com and
> mail that is Bcc'd to my gmail address with a bogus checkout To
> address.

You spoke of the To: address.  What about the sender?  Would this do?

    def_whitelist_auth *[email protected]

Google is very good about using DKIM.  That will prevent forgeries.  I
already have this in my local.cf without any worries of spam:

    whitelist_auth *[email protected] *[email protected] *[email protected]

None of these FQDNs have users addresses, and all of them are very
sensitive to what messages they'll send you (especially if on behalf
of a user, like for ebay -- however I may not be able to vouch for msn
as strongly).  MSN customers are [email protected] and Google's are
[email protected] (or [email protected]).

Since these use authentication, forging is almost impossible and I
feel no concern on that front, though perhaps if I were to push for
its inclusion in SA distributions, I'd use def_whitelist_auth.


Thanks to pastebin under-utilization, I've also had to add this  :-)

    whitelist_auth *[email protected]

Reply via email to