On 12/15/2015 12:00 PM, John Hardin wrote:
On Tue, 15 Dec 2015, Kevin A. McGrail wrote:

I don't know enough about real-world usage to comment intelligently. But I will say that a negative score just because something is encrypted will likely have a pretty negative impact. It assumes no ham ever hits that rule.

That's exactly backwards. I'm assuming a spammer will never encrypt their email because that makes it less likely their content will be seen by the target, so *only* (or at least overwhelmingly) ham will hit that rule.

I don't think it should have a score less than -1, though. This is intended as an offset, not a whitelist.

However, signed UNencrypted email might also use that MIME type, and the MUA might fail-useable and display the body of an improperly-formatted (e.g. no signature block at all) message of that MIME type, or one that has a signature block but fails verification, so that assumption might very well be flawed - there might be no downside to the spammer to sending out fake-signed mails.

Perhaps a meta?

So far there's only been a complaint about FPs on encrypted emails from Facebook. I've already added __CT_ENCRYPTED as a FP exclusion to some rules (e.g. the one that scores for no textual MIME parts at all) based on that. I was hoping we could avoid (or at least reduce the instances of) a large class of FPs by doing a broad ENCRYPTED_MESSAGE nice rule rather than playing reactive whack-a-mole if we get more reports of specific FPs on encrypted content.
Agreed. I will defer to you as the person in the weeds because clearly I had a 180 degree view of the purpose.

Reply via email to