Sure. Add them to any .cf file.
On 11/16/2019 10:19 AM, Daryl Rose wrote:
> Can I have external whitelist_from and blacklist_from lists?
> Currently they're in the users_prefs file and are growing. I would
> prefer to have an external list and keep them out of the users_pre
Can I have external whitelist_from and blacklist_from lists? Currently
they're in the users_prefs file and are growing. I would prefer to have an
external list and keep them out of the users_prefs file.
Thanks
Daryl
7D
> =7D =20
>
>
> I added whitelist_auth comixology.com to local.cf and still had issues, so I
> also added whitelist_from comixology.com, but messages are still tagged as
> spam.
>
> From: Comics by comiXology
>
> But the message are actually coming from amazo
On 14 Mar 2019, at 22:03, @lbutlr wrote:
> On 14 Mar 2019, at 17:00, RW wrote:
>>
>> whitelist entries need to be globs that match an email address, not a
>> domain name.
>
> How sophisticated is SA's globbing?
>
> ^(\w+)([\-.'][\w]+)+@domain.tld$
For whitelist entries the match string is a
On 14 Mar 2019, at 17:00, RW wrote:
>
> whitelist entries need to be globs that match an email address, not a
> domain name.
How sophisticated is SA's globbing?
^(\w+)([\-.'][\w]+)+@domain.tld$
?
--
These are the thoughts that kept me out of the really good schools. --
George Carlin
t; issues, so I also added whitelist_from comixology.com, but messages
> are still tagged as spam.
whitelist entries need to be globs that match an email address, not a
domain name.
: 0px; -webkit-text-size-adjus=
t: 100%; -ms-text-size-adjust: 100%
=7D
=7D =20
I added whitelist_auth comixology.com to local.cf and still had issues, so I
also added whitelist_from comixology.com, but messages are still tagged as spam.
From: Comics by comiXology
But the message are actually
the documentation for
whitelist_from in the SA configuration man-page.
Thanks for explanation.
Now it is resolved.
First, my previous sample about postfix.org.
In fact the 'from' did not contain @postfix.org.
..
In fact the header 'Sender' and 'Return-path' contains @postfix.org,
but the 'From
It will if you enable SHORTCIRCUIT'ing of whitelist_from
no it will not, it skips many rules which would not have any effect
because the large negative score but it *will not* bypass
Technically it doesn't bypass SA but it effectively does
the same thing. Depends on what you mean by bypass
Quoting RW rwmailli...@googlemail.com:
On Sat, 13 Jun 2015 21:25:02 +0200
Bruno Costacurta wrote:
Hello,
I setup the following into /etc/spamassassin/local.cf
whitelist_from *@postfix.org
But this seems not working as apparently spamassassin still process
emails from *@postfix.org
Quoting Bowie Bailey bowie_bai...@buc.com:
Did you restart spamd after making the change?
--
Bowie
Yes, spamassassin config was re-loaded
Under Linux Debian :
sudo systemctl reload spamassassin.service
--
LiCo : LinuxCounter Project
Get counted as a Linux user and register your linux
Second, I understand now that whitelist_from just represent a large
score, and does not bypass the email itself.
It will if you enable SHORTCIRCUIT'ing of whitelist_from. However,
it is not recommended to use whitelist_from. Use whitelist_from_rcvd,
or whitelist_auth instead to prevent spoofed
Am 16.06.2015 um 22:11 schrieb David Jones:
Second, I understand now that whitelist_from just represent a large
score, and does not bypass the email itself.
It will if you enable SHORTCIRCUIT'ing of whitelist_from
no it will not, it skips many rules which would not have any effect
because
On Sat, 13 Jun 2015 21:25:02 +0200
Bruno Costacurta wrote:
Hello,
I setup the following into /etc/spamassassin/local.cf
whitelist_from *@postfix.org
But this seems not working as apparently spamassassin still process
emails from *@postfix.org.
If you don't want SpamAssassin
On 6/14/2015 5:40 AM, Bruno Costacurta wrote:
Quoting Benny Pedersen m...@junc.eu:
Reindl Harald skrev den 2015-06-13 21:29:
Am 13.06.2015 um 21:25 schrieb Bruno Costacurta:
I setup the following into /etc/spamassassin/local.cf
whitelist_from *@postfix.org
why /etc/spamassassin/local.cf
Quoting Benny Pedersen m...@junc.eu:
Reindl Harald skrev den 2015-06-13 21:29:
Am 13.06.2015 um 21:25 schrieb Bruno Costacurta:
I setup the following into /etc/spamassassin/local.cf
whitelist_from *@postfix.org
why /etc/spamassassin/local.cf?
on most setups its /etc/mail/spamassassin
Reindl Harald skrev den 2015-06-14 00:46:
how about reading a whole thread *before* give useless answers as you
are always doing - problem solved - it was just the wrong folder for
local.cf - period
i showed generic help, if you dont like it, dont reply, atleast dont
show all others then you
Quoting Reindl Harald h.rei...@thelounge.net:
Am 13.06.2015 um 21:25 schrieb Bruno Costacurta:
I setup the following into /etc/spamassassin/local.cf
whitelist_from *@postfix.org
why /etc/spamassassin/local.cf?
on most setups its /etc/mail/spamassassin/*.cf
This is in fact /etc/mail
Hello,
I setup the following into /etc/spamassassin/local.cf
whitelist_from *@postfix.org
But this seems not working as apparently spamassassin still process
emails from *@postfix.org.
Hereafter the log of my postfix server with the call to spamassassin
via spamd.
The spamassassin have
Am 13.06.2015 um 21:25 schrieb Bruno Costacurta:
I setup the following into /etc/spamassassin/local.cf
whitelist_from *@postfix.org
why /etc/spamassassin/local.cf?
on most setups its /etc/mail/spamassassin/*.cf
signature.asc
Description: OpenPGP digital signature
Reindl Harald skrev den 2015-06-13 21:29:
Am 13.06.2015 um 21:25 schrieb Bruno Costacurta:
I setup the following into /etc/spamassassin/local.cf
whitelist_from *@postfix.org
why /etc/spamassassin/local.cf?
on most setups its /etc/mail/spamassassin/*.cf
its opensource, so anyone can create
Am 14.06.2015 um 00:26 schrieb Benny Pedersen:
Reindl Harald skrev den 2015-06-13 21:29:
Am 13.06.2015 um 21:25 schrieb Bruno Costacurta:
I setup the following into /etc/spamassassin/local.cf
whitelist_from *@postfix.org
why /etc/spamassassin/local.cf?
on most setups its /etc/mail
That worked, many thanks..
Missing @ makes a difference ;)
-RIckH
-Original Message-
From: RW [mailto:rwmailli...@googlemail.com]
Sent: Thursday, March 12, 2015 11:44 AM
To: users@spamassassin.apache.org
Subject: Re: whitelist_from in user_prefs is not being processed.
On Thu, 12 Mar
On 03/12/2015 07:23 PM, Rick Hantz (TirNanOg) wrote:
whitelist_from alfranken.com
bad syntax
http://spamassassin.apache.org/full/3.4.x/doc/Mail_SpamAssassin_Conf.txt
unwhitelist_from u...@example.com
Used to override a default whitelist_from entry, so for example
On Thu, 12 Mar 2015 11:23:33 -0700
Rick Hantz \(TirNanOg\) wrote:
However, none of the whitelist seems to get processed. Mail that
should have a high negative number doesn't and ends up in the spam
folder.
whitelist_from 23andme.com
...
whitelist_from *.aarp.com
try
Am 12.03.2015 um 19:23 schrieb Rick Hantz (TirNanOg):
My mail is hosted on Lunarpages.com on my own domain.
I train SpamAssassin frequently.
However, I get hundreds of spam messages daily (500-700). This is an old
public account that I need to maintain, otherwise I’d delete it.
After a
1
whitelist_from 23andme.com
whitelist_from aaawa.com
whitelist_from *.aarp.com
whitelist_from *.airportparkingreservations.com
whitelist_from alfranken.com
whitelist_from alternet.org
whitelist_from amazon.com
whitelist_from amcustomercare.att-mail.com
whitelist_from autobytel.com
On March 12, 2015 11:10:13 PM Rick Hantz \(TirNanOg\)
rick...@tirnanog.com wrote:
In my user_prefs file, I have: (see resulting header below)
whitelist_from mailto:*@sailthru.com
read perldoc Mail::SpamAssassin::Conf
note whitelist_from allows forged senders, if possible use whitelist_auth
In my user_prefs file, I have: (see resulting header below)
whitelist_from mailto:*@sailthru.com
whitelist_from mailto:*@e.washingtonpost.com
Do I also need
whitelist_from mailto:*@*.sailthru.com ?
Appreciate all the help.
-RickH
Return-path: deliv...@mx.sailthru.com
Am 12.03.2015 um 23:06 schrieb Rick Hantz (TirNanOg):
In my user_prefs file, I have: (see resulting header below)
whitelist_from mailto:*@sailthru.com
whitelist_from mailto:*@e.washingtonpost.com
Do I also need
whitelist_from mailto:*@*.sailthru.com ?
Return-path: deliv
Dear sir
is possible to specify a whitelist_from in local.cf limiting it for some
hosts?
Example:
i want to whitelist my postmas...@foo.tld to avoid backscatter or
bouce_message classifications, but want to limit this whitelist only if the
sender is from my server, if the smtp client
nik600 skrev den 2013-10-18 17:24:
Can i do that?
sure:
whitelist_auth postmas...@example.org
whitelist_from allow forges, dont use it, its still candidate to be
removed from spamassassin
On 18.10.13 17:24, nik600 wrote:
is possible to specify a whitelist_from in local.cf limiting it for some
hosts?
yes, use whitelist_from_rcvd for that.
Note that applies to external mail, e.g. mail received from hosts not in
your internal_network.
i want to whitelist my postmas...@foo.tld
nik600 wrote:
is possible to specify a whitelist_from in local.cf http://local.cf
limiting it for some hosts?
Example:
i want to whitelist my postmas...@foo.tld to avoid backscatter or
bouce_message classifications, but want to limit this whitelist only if
the sender is from my server
can't I be sure that it's
checking the right user? Other whitelist_from all work
Thanks
://pastebin.com/xErBy0ej
Feb 19 10:02:25.354 [19195] dbg: spf: cannot get Envelope-From, cannot
use SPF
is this why whitelist_from are the only one that works ?
first get it to work from local.cf, if this is working move the same
rule to sql is the right way to test
if envelope-from is non
Benny,
Feb 19 10:02:25.354 [19195] dbg: spf: cannot get Envelope-From, cannot
use SPF
is this why whitelist_from are the only one that works ?
first get it to work from local.cf, if this is working move the same
rule to sql is the right way to test
if envelope-from is non default
Philippe Ratté skrev den 2013-02-19 23:49:
I'm using qmail, along with qmail-scanner-st, and I just added a
patch so that qmail adds the envelope-from to the headers
?
It works; this is what the first header now looks like:
Received: from mail-ve0-f193.google.com (209.85.128.193)
by
On Tue, 19 Feb 2013, Philippe Ratté wrote:
Benny,
Feb 19 10:02:25.354 [19195] dbg: spf: cannot get Envelope-From, cannot
use SPF
is this why whitelist_from are the only one that works ?
first get it to work from local.cf, if this is working move the same
rule to sql is the right way to test
David B Funk skrev den 2013-02-20 01:18:
On Tue, 19 Feb 2013, Philippe Ratté wrote:
Benny,
Feb 19 10:02:25.354 [19195] dbg: spf: cannot get Envelope-From,
cannot
use SPF
is this why whitelist_from are the only one that works ?
first get it to work from local.cf, if this is working move
Philippe Ratté skrev den 2013-02-14 15:24:
The mail came from 65.54.190.123 and it passes SPF
dont use whitelist_from, with that setting anyone can use that email
as
sender to get whitelisted, this is okay if you do spf testing in mta
only, so spamassassin follow it as an ok, but not if you
Philippe Ratté skrev den 2013-02-13 23:05:
dbg: spf: def_spf_whitelist_from: already checked spf and didn't get
pass, skipping whitelist check
why does it not get pass when spf is okay ?
http://dmarcian.com/spf-survey/hotmail.com
| 3485 | %domain.ca | whitelist_from | u...@hotmail.com
The mail came from 65.54.190.123 and it passes SPF
dont use whitelist_from, with that setting anyone can use that email as
sender to get whitelisted, this is okay if you do spf testing in mta
only, so spamassassin follow it as an ok, but not if you are not testing
spf in mta
What should I
Hi,
We have our blacklist/whitelist stored in MySQL, has always worked fine, but
I've got an issue where an email that is stored in whitelist_from (SQL) is not
applied
Running spamassassin -D message 2output.txt and I noticed this:
dbg: spf: def_spf_whitelist_from: already checked spf
I am planning on exporting a list of our client's email addresses into a file
with 5000 separate lines as such:
whitelist_from cli...@somebody.co
I'm running an Apple XServe with Intel Xeon Quadcores and 6Gb RAM -
processor fairly underutilised at the moment. Is 5000 whitelist entries
expected
Am 25.10.2011 09:51, schrieb SuperDuper:
I am planning on exporting a list of our client's email addresses into a file
with 5000 separate lines as such:
whitelist_from cli...@somebody.co
I'm running an Apple XServe with Intel Xeon Quadcores and 6Gb RAM -
processor fairly underutilised
On Tue, 2011-10-25 at 00:51 -0700, SuperDuper wrote:
I am planning on exporting a list of our client's email addresses into a file
with 5000 separate lines as such:
whitelist_from cli...@somebody.co
I do essentially the same thing with an SA plugin and rule plus a
database.
Background: I
On Tue, 25 Oct 2011, Robert Schetterer wrote:
Am 25.10.2011 09:51, schrieb SuperDuper:
I am planning on exporting a list of our client's email addresses into a file
with 5000 separate lines as such:
whitelist_from cli...@somebody.co
you should choose another way for whitelisting,
i.e bypass
On Tue, 25 Oct 2011 11:21:07 +0200, Robert Schetterer wrote:
you should choose another way for whitelisting,
i.e bypass spamassassin for trusted server ips etc
anyway why not using i.e. whitelist_from *@somebody.co ?
this open forges to numbers of equal senders recipient, never seen in
my
On Tue, 25 Oct 2011 06:28:41 -0700 (PDT)
John Hardin wrote:
Seconded. MTAs typically have efficient facilities for white- or
black-listing specific email addresses. Use the capabilities of your
MTA and glue layer to completely bypass SA for those addresses since
you _know_ you want to
On Tue, 25 Oct 2011, RW wrote:
On Tue, 25 Oct 2011 06:28:41 -0700 (PDT)
John Hardin wrote:
Seconded. MTAs typically have efficient facilities for white- or
black-listing specific email addresses. Use the capabilities of your
MTA and glue layer to completely bypass SA for those addresses since
thank you sir, i think this worked.
On 3/17/2010 3:26 AM, John Hardin wrote:
On Tue, 16 Mar 2010, John Hardin wrote:
header POGO_CUSTOMER Received =~
/\(\...@pinoyonthego\.net\@[\d\.]+\).*by mail\.pinoyonthego\.net/
Watch the line wrap on that...
hi sir,
yes i am using vchkpw to auth users. are you talking about using
whitelist_auth? i have tried using that coz i have spf defined on my
domain, but i am not sure if whitelist_auth is for that.
dig -t TXT pinoyonthego.net
;; QUESTION SECTION:
;pinoyonthego.net. IN TXT
On Tue, 16 Mar 2010, Ron wrote:
On 3/16/2010 12:51 AM, John Hardin wrote:
Are you authenticating your users in any way? There are ways to
whitelist users who have authenticated against your MTA. Please check
the list archives and the Wiki.
yes i am using vchkpw to auth users. are you
thank you sir,
please see attached file. test header set score to 15 just to be able to
send out, i have setup report_safe to but x-spam-report does not show
up on the header, i can't tell what's causing all the points to increase.
regards
Ron
On 3/16/2010 11:16 PM, John Hardin wrote:
On
On Tue, 16 Mar 2010, Ron wrote:
please see attached file.
Is mail.pinoyonthego.net your MTA?
If so, try this:
header POGO_CUSTOMER Received =~ /\(\...@pinoyonthego\.net\@[\d\.]+\).*by
mail\.pinoyonthego\.net/
score POGO_CUSTOMER -1
Run in test for a while, if you only get hits on
On Tue, 16 Mar 2010, John Hardin wrote:
header POGO_CUSTOMER Received =~ /\(\...@pinoyonthego\.net\@[\d\.]+\).*by
mail\.pinoyonthego\.net/
Watch the line wrap on that...
--
John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
jhar...@impsec.orgFALaholic #11174
On Mon, 15 Mar 2010 21:43:03 +0800
Ron nha...@gmail.com wrote:
Hi All,
Newbie here, i have a qmail server, and i installed
qmail-scanner+clav+spamassassin. I'm trying to allow all my users
using whitelist_from but filter spoofed e-mail address using
whitelist_from_rcvd.
Whitelist rules
Hi Sir,
Please see inline. Thank You
On 3/16/2010 12:05 AM, RW wrote:
On Mon, 15 Mar 2010 21:43:03 +0800
Ronnha...@gmail.com wrote:
Hi All,
Newbie here, i have a qmail server, and i installed
qmail-scanner+clav+spamassassin. I'm trying to allow all my users
using whitelist_from but filter
On Mon, 15 Mar 2010, Ron wrote:
whitelist_from *...@imagetransforms.com
Do not do this.
The From: address is trivially easy to spoof. You should not trust it to
this degree.
whitelist_from should only be used in unusual situations, when you know
exactly why one of the other whitelist
On Tue, 16 Mar 2010, Ron wrote:
i think the only way to not scan outgoing mails in qmail is to add the
users IP address to /etc/tcp.smtp, unfortunately my users are on dynamic
IP that i cannot add it one by one.
Are you authenticating your users in any way? There are ways to whitelist
users
Le 26/07/2009 04:00, McDonald, Dan a écrit :
From: Robert [mailto:list...@abbacomm.net]
There are no doubt lots of ways, but how about:
egrep 'whitelist_from[^_]' local.cf | awk '{FS=@; print $2
TXT;}' | xargs dig | grep v=spf1
what is this supposed to do?
select all of your
Hi,
I'm looking an email that appears to be one of the users from the
whitelist, but instead was from:
From probesqt...@segunitb1.freeserve.co.uk Mon Jul 27 19:49:19 2009
Why can't a comparison be made between the From: info and the actual
sender? Is this because of virtual domains and/or
MySQL Student wrote:
Hi,
I'm looking an email that appears to be one of the users from the
whitelist, but instead was from:
From probesqt...@segunitb1.freeserve.co.uk Mon Jul 27 19:49:19 2009
Why can't a comparison be made between the From: info and the actual
sender? Is this because
On 25.07.09 01:25, jida...@jidanni.org wrote:
Actually there should be one or two more whitelists, so one can e.g., score
-100 one's friends
-10 one's schools
-1 one's country
we still have def_whitelist_* with score of -15.
--
Matus UHLAR - fantomas, uh...@fantomas.sk ;
There are no doubt lots of ways, but how about:
egrep 'whitelist_from[^_]' local.cf | awk '{FS=@; print $2
TXT;}' | xargs dig | grep v=spf1
John.
john,
what is this supposed to do?
- rh
From: Robert [mailto:list...@abbacomm.net]
There are no doubt lots of ways, but how about:
egrep 'whitelist_from[^_]' local.cf | awk '{FS=@; print $2
TXT;}' | xargs dig | grep v=spf1
what is this supposed to do?
select all of your whitelist_from entries, parse out the domain part, dig
(for words or
phrases common to your customer's business) might be a far more
effective way of handling the rest.
Is there a way to script that for the 1000 or so entries, to see which
have SPF records?
There are no doubt lots of ways, but how about:
egrep 'whitelist_from[^_]' local.cf
Wilcock wrote:
egrep 'whitelist_from[^_]' local.cf | awk '{FS=@; print $2 TXT;}' |
xargs dig | grep v=spf1
well
- addresses can contain wildcards
- more addresses can be at one line
- SPF records should be checked before TXT
the first issue is hard to avoid by scripting, others can be solved
Actually there should be one or two more whitelists, so one can e.g., score
-100 one's friends
-10 one's schools
-1 one's country
jida...@jidanni.org writes:
Actually there should be one or two more whitelists, so one can e.g., score
-100 one's friends
-10 one's schools
-1 one's country
I have long wanted to be able to
whitelist_from f...@bar -3.0
to have per-entry scores. Obviously though I haven't wanted
On Fri, 24 Jul 2009, Greg Troxel wrote:
I have long wanted to be able to
whitelist_from f...@bar -3.0
to have per-entry scores. Obviously though I haven't wanted it enough
to write the code.
How does this not work?
header WL_FROM_FOO From =~ /\bf...@bar/i
score WL_FROM_FOO -3.00
John Hardin jhar...@impsec.org writes:
On Fri, 24 Jul 2009, Greg Troxel wrote:
I have long wanted to be able to
whitelist_from f...@bar -3.0
to have per-entry scores. Obviously though I haven't wanted it
enough to write the code.
How does this not work?
header WL_FROM_FOO From
On Fri, 24 Jul 2009, Greg Troxel wrote:
John Hardin jhar...@impsec.org writes:
On Fri, 24 Jul 2009, Greg Troxel wrote:
I have long wanted to be able to
whitelist_from f...@bar -3.0
to have per-entry scores. Obviously though I haven't wanted it
enough to write the code.
How does
On Fri, 2009-07-24 at 11:57 -0700, John Hardin wrote:
On Fri, 24 Jul 2009, Greg Troxel wrote:
I have long wanted to be able to
whitelist_from f...@bar -3.0
to have per-entry scores. Obviously though I haven't wanted it
enough to write the code.
First of all -- I don't
On Fri, July 24, 2009 20:10, John Hardin wrote:
On Fri, 24 Jul 2009, Greg Troxel wrote:
I have long wanted to be able to
whitelist_from f...@bar -3.0
to have per-entry scores. Obviously though I haven't wanted it enough
to write the code.
How does this not work?
header WL_FROM_FOO
Le 22/07/2009 17:48, MySQL Student a écrit :
So, forever I have been using whitelist_from and have probably a
thousand entries.
Firstly, before you convert all these to whitelist_from_rcvd, perhaps
you ought to ask yourself whether you really need 1000 entries on your
whitelist. Does mail
Hi,
Firstly, before you convert all these to whitelist_from_rcvd, perhaps you
ought to ask yourself whether you really need 1000 entries on your
whitelist.
I'm surprised you were the first to make that very comment, so thanks.
Does mail from these addresses actually get miscategorised as
Hi all,
Some time ago someone had mentioned to never use whitelist_from but
instead use whitelist_from_rcvd. Where is whitelist_from_rcvd
documented? It doesn't appear in the SA docs in the same place that
whitelist_from is listed.
So, forever I have been using whitelist_from and have probably
MySQL Student wrote:
Hi all,
Some time ago someone had mentioned to never use whitelist_from but
instead use whitelist_from_rcvd. Where is whitelist_from_rcvd
documented? It doesn't appear in the SA docs in the same place that
whitelist_from is listed.
So, forever I have been using
It is documented on the Mail::SpamAssassin::Conf man page just like
whitelist_from.
Ugh, thanks.
whitelist_from_rcvd a...@lists.sourceforge.net sourceforge.net
Use this to supplement the whitelist_from addresses with a check against the
Received headers. The first parameter is the
address
It is documented on the Mail::SpamAssassin::Conf man
page just like whitelist_from.
Ugh, thanks.
whitelist_from_rcvd a...@lists.sourceforge.net
sourceforge.net
Use this to supplement the whitelist_from addresses with
a check against the Received headers. The first
parameter
We're using spamassassin 3.1.7 on a slack-10 box, invoked via cron.
I'm having problems getting a domain whitelisted. Previously, adding
domains to be whitelisted simply meant adding a whitelist_from *...@domain.com
to my /opt/MailScanner/etc/spam.assassin.prefs.conf file.
Now, however, my
/var/log/maillog output:
May 13 10:53:46 cerberus MailScanner[3309]: Message n4DFrTip004779 from
63.93.193.30 (a...@easymatch.com) to saintjoe.edu http://saintjoe.edu/ is
spam, SpamAssassin (not cached, score=68.739, required 4, AWL -33.17,
BAYES_50 0.00, FORGED_RCVD_HELO 0.14, HTML_30_40
on a slack-10 box, invoked via cron.
I'm having problems getting a domain whitelisted. Previously, adding
domains to be whitelisted simply meant adding a whitelist_from
*...@domain.com
to my /opt/MailScanner/etc/spam.assassin.prefs.conf file.
Now, however, my maillog shows the messages as being marked
a whitelist_from
*...@domain.com to my /opt/MailScanner/etc/spam.
assassin.prefs.conf file.
Now, however, my maillog shows the messages as being marked as spam.
Yesterday, I added a spam.whitelist.rules, which takes -100 down from
the score, but the message is still marked as spam and not delivered
Please always keep threads on-list by replying to list. I am not the
only one, who can help you.
On Wed, 2009-05-13 at 11:57 -0500, Michael Lyon wrote:
But...how do I remove an autowhitelist entry for just one user? I
have a rule that was duplicated and causing me problems (It was to
prevent
Lately, we've been getting a bunch of spam with negative scores because it
has triggered USER_IN_WHITELIST but we don't use whitelist_from*. About 2
weeks ago I removed whitelist_from_rcvd. Could it still be triggering it.
Maybe the spam was sent a few weeks ago and just now being deliver
Nevermind. Someone has whitelisted our url in user-prefs.
robanna wrote:
Lately, we've been getting a bunch of spam with negative scores because it
has triggered USER_IN_WHITELIST but we don't use whitelist_from*. About 2
weeks ago I removed whitelist_from_rcvd. Could it still
I'm using spamassassin 3.2.5. Now, I must a whitelist_from containing *@
foo.com in my local.cf.
However, there are still 1 email that has been tagged as spam. In my
understanding, if a domain was in whitelist_from, even if it was tagged as
spam, it will delivered to the recipient. I restart
On 29.10.08 17:18, Nelson Serafica wrote:
I'm using spamassassin 3.2.5. Now, I must a whitelist_from containing *@
foo.com in my local.cf.
However, there are still 1 email that has been tagged as spam.
Only one? show the headers or upload it somewhere..
In my understanding, if a domain
On Wed, October 29, 2008 10:18, Nelson Serafica wrote:
Is this the right way to whitelist? As I check, when using 3.2.5, this is
the right way of whitelisting a domain.
the more i hear about whitelist_from the more i want to make a bug on it,
whitelist_from should imho newer have being
Nelson Serafica wrote:
I'm using spamassassin 3.2.5. http://3.2.5. Now, I must a
whitelist_from containing [EMAIL PROTECTED] http://foo.com in my local.cf
http://local.cf.
However, there are still 1 email that has been tagged as spam. In my
understanding, if a domain was in whitelist_from
Benny Pedersen wrote:
On Wed, October 29, 2008 10:18, Nelson Serafica wrote:
Is this the right way to whitelist? As I check, when using 3.2.5, this is
the right way of whitelisting a domain.
the more i hear about whitelist_from the more i want to make a bug on it,
whitelist_from
On Wed, Oct 29, 2008 at 08:24:25AM -0400, Matt Kettler wrote:
There are some messages you can't whitelist in SA using any other method.
(ie: when the sender's server doesn't have reverse DNS).
You can use trusted_networks + ALL_TRUSTED to whitelist. Given of course
that there aren't any
a domain.
the more i hear about whitelist_from the more i want to make a bug on it,
whitelist_from should imho newer have being implemented
Agreed. whitelist_from sucks. However, it's there as a method of
last-resort. There are some messages you can't whitelist in SA
Jeff Mincy [EMAIL PROTECTED] writes:
Agreed. whitelist_from sucks. However, it's there as a method of
last-resort. There are some messages you can't whitelist in SA using any
other method. (ie: when the sender's server doesn't have reverse DNS).
Since whitelist_from
On Wed, 29 Oct 2008, Matt Kettler wrote:
Benny Pedersen wrote:
the more i hear about whitelist_from the more i want to make a bug on it,
whitelist_from should imho newer have being implemented
Agreed. whitelist_from sucks. However, it's there as a method of
last-resort. There are some
On Wed, 2008-10-29 at 07:52 -0700, John Hardin wrote:
I'm going to suggest again that, given how much pain it causes noobs,
perhaps the use of whitelist_from should generate a lint _warning_ that it
should only be used if no other whitelist method will work...
The thing with noobs
On Wed, 29 Oct 2008, Karsten Br?ckelmann wrote:
On Wed, 2008-10-29 at 07:52 -0700, John Hardin wrote:
I'm going to suggest again that, given how much pain it causes noobs,
perhaps the use of whitelist_from should generate a lint _warning_ that it
should only be used if no other whitelist
1 - 100 of 211 matches
Mail list logo