Re: wordpress whitelist entry

2018-10-09 Thread RW
On Tue, 9 Oct 2018 20:04:53 +
David Jones wrote:

> On 10/9/18 2:21 PM, RW wrote:
> > 
> > I've recently noticed that newsletters from a small wordpress site
> > are hitting USER_IN_DEF_SPF_WL.
> > 
> > The headers are of the form:
> > 
> >Return-Path: 
> >...
> >To: m...@example.com
> >From: Some Amateur Website 
> > 
> > and the use of the bounce handling subdomain  b.wordpress.com is
> > causing a match on:
> > 
> >def_whitelist_auth *@*.wordpress.com
> > 
> > Theses emails are legitimate, and I've not had much wordpress spam,
> > but they are essentially freemail bulk mail.
> >   
> 
> I am not understanding the question or issue.  If they 1) don't send 
> spam, 2) only send opt-in email with a valid opt-out option and 3)
> they quickly handle any abuse reports then they should be considered
> a trusted sender.  Since these are system-generated emails and not
> real human mailboxes that can be compromised to send spam, then that 
> def_whitelist_auth entry is safe.

They aren't system generated, they come from individual end-users. For
all we know, users who run XP boxes and don't know what a firewall is.

It may well be that wordpress has the whole thing nailed down with
enforced opt-ins, CAPTCHAs etc. Without actually knowing that, it
seems a legitimate cause for concern.


Re: wordpress whitelist entry

2018-10-09 Thread David Jones
On 10/9/18 2:21 PM, RW wrote:
> 
> I've recently noticed that newsletters from a small wordpress site are
> hitting USER_IN_DEF_SPF_WL.
> 
> The headers are of the form:
> 
>Return-Path: 
>...
>To: m...@example.com
>From: Some Amateur Website 
> 
> and the use of the bounce handling subdomain  b.wordpress.com is
> causing a match on:
> 
>def_whitelist_auth *@*.wordpress.com
> 
> Theses emails are legitimate, and I've not had much wordpress spam, but
> they are essentially freemail bulk mail.
> 

I am not understanding the question or issue.  If they 1) don't send 
spam, 2) only send opt-in email with a valid opt-out option and 3) they 
quickly handle any abuse reports then they should be considered a 
trusted sender.  Since these are system-generated emails and not real 
human mailboxes that can be compromised to send spam, then that 
def_whitelist_auth entry is safe.

Once we find evidence that any def_whitelist_auth sender fails to follow 
all 3 rules above then post an example here via pastebin.com and we will 
take appropriate action.

-- 
David Jones


wordpress whitelist entry

2018-10-09 Thread RW


I've recently noticed that newsletters from a small wordpress site are
hitting USER_IN_DEF_SPF_WL.

The headers are of the form:

  Return-Path: 
  ...
  To: m...@example.com
  From: Some Amateur Website 

and the use of the bounce handling subdomain  b.wordpress.com is
causing a match on:

  def_whitelist_auth *@*.wordpress.com

Theses emails are legitimate, and I've not had much wordpress spam, but
they are essentially freemail bulk mail.