I sent a message there. Can you check?

Yep; it retrained.


It's not a simulated environment here, just a pilot project, and I'm not
usually careless, but I have clearly overlooked this problem so maybe I am.

If you have, then send more info:
- What MTA
- What version of DSPAM
- etc...


There's a production mail feed gateway -> crap filter -> exchange


I've done redirects for a pilot group of users

gateway -----------> crap filter ------> exchange
        |                                  ^
        ---> postfix -> dspam -> postfix---|


I'll skip the extra details because it's not up to me to give them out; and 
more importantly, I don't need that level of help, I was just struck that the 
problem which was dismissed by you and Tony as being an edge case is probably 
very common.

Essentially I need to make sure that external people can't send to the training 
addresses, which is easy enough to do.

It's not so easy to stop staff from poisoning each other's spam databases, but 
I really don't think it'll be a problem.


I suppose the neatest solution for my particular problem is to strip any
line with !DSPAM:[0-9]*,.{22,22}! (or whatever...) on the way in or out of
the building, but that doesn't stop users from messing with it internally
(internal mail is all within exchange and I can't touch it).

This would be security through obscurity and this mostly does not work. Better 
would be to make a profound and solid setup.

I take it from this you mean that the signature data is obscured; in which case 
I agree.


Perhaps however it's a storm in a teacup.  The worst case scenario is that
we either restore the db from a backup or just reset the training and
start again.  This doesn't seem too serious really; have I missed the point?


--
Daniel Rose
National Library of Australia

Reply via email to