Stevan, as always, thank you for your quick response.  You are a boon for us
dspam newbies.

While I understand your example, I was hoping for a pointer to some package
that others have used that I could slap in to place.  I'm a developer, so
with your example as guidance, I could probably hack something together to
support this, but it's not really my focus right now.  I'd rather not
re-invent the wheel if someone all ready has a script to do this.

Sounds like the right answer is for me to read up a bit on postfix email
processing rules, and just yank the email out of the stream at that point.
 Training dspam after the fact is optional.  I just want to remove obvious,
easy-to-identify-by-rule messages from the batch clients have to deal with.

Thanks,

Jesse


> On Tue, 10 Aug 2010 13:54:02 -0700
> Jesse Mundis <jesse.mun...@gmail.com> wrote:
>
> > Greetings dspam-ers.
> >
> > This has probably been asked before, but I couldn't find the discussion
> if
> > so.
> >
> > I know that dspam is all about the baysian filtering of tokens, but is
> there
> > any way to implement the equivalent of blanket "droplist" rules in
> addition,
> > at the dspam level of processing?  That is, I trust the baysian analysis
> to
> > learn tokens over time, but I want to *always* treat as spam (as an
> example)
> > _any_ email with the string "viagra" in the from and/or subject line.
> >
> > I can do this easily client-side, but I'd love to have a way to filter
> these
> > out at the dspam level.  I'm currently getting a few flavors of spam that
> > consistently get through dspam's filtering, even after training, and yet
> > strangely a subset of them always have this string in the "name" portion
> of
> > the from address.  This makes them easy to spot in the client.
> >
> > Does dspam provide any mechanism besides post-hoc training where I can
> > define a simple list of tokens that, upon recognition in parsing,
> > automatically classifies the email as spam, trains and quarantines
> > appropriately, and be done with it?
> >
> Out of the box? No. DSPAM is all about statistics and not about rules.
> If you want something like that then you could implement it in your MTA.
> For example with Postfix doing header checks and if the header matches then
> reroute the mail to a custom made script that does nothing more than:
> 1) loop learning until DSPAM is saying that the message is SPAM
> 2) process the message
>
> Just out of my mind something like this:
> while true; do
>  dsrc=$(dspam --user ${username} --classify --deliver=summary < ${message})
>  if (echo ${dsrc}|grep -q "result=\"\(Whitelisted\|Innocent\)"); then
>    dspam --user ${username} --class=spam --source=inoculation
> --deliver=summary < ${message}
>  else
>    break
>  fi
> done
> dspam --user ${username} --process < ${message}
>
>
> Off course that is over simplified. I personally would add a maximum number
> of training loops and other things to prevent the script to tear down the
> system. Anyway... I think you get the picture.
>
>
>
> > Thanks,
> >
> > Jesse
> --
> Kind Regards from Switzerland,
>
> Stevan Baji?
>
>
------------------------------------------------------------------------------
This SF.net email is sponsored by 

Make an app they can't live without
Enter the BlackBerry Developer Challenge
http://p.sf.net/sfu/RIM-dev2dev 
_______________________________________________
Dspam-user mailing list
Dspam-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dspam-user

Reply via email to