To start with, I am using spamassassin as a part of mimedefang, with network
tests enabled.

And here's my situation:

I have a Hotmail account, through which I'm subscribed to various Microsoft
mailing lists such as security updates, MSDN information, MCP lists, etc.
Microsoft's bulk mailer adds a X-Message-Info header.  I fetch this mail
through gotmail, which then stuffs it through
sendmail/mimedefang/spamassassin.

The matched rule X_MESSAGE_INFO is worth 4.2 points.  With the default
threshold of 5.0, all it usually needs is one other rule to push the mail
over the limit.  One problem is when the piece of mail enters DCC (since
Microsoft lists have a HUGE distribution their mail is pretty much
guaranteed to be listed in DCC, as I understand it) and is scored an
additional 2.2.  As far as I can tell DCC does not distinguish between
potential spam and ham, so while it's useful in most circumstances it's
really easy to false-positive with this rule.

Another problem is the path Microsoft mail usually takes to hit Hotmail.  A
lot of their mailing list servers seem to take an internal path to the
Hotmail servers, thus also triggering FORGED_HOTMAIL_RCVD rules, so even if
the mail does not hit DCC it can also be snagged by this rule.

While I'm happy enough to re-score X_MESSAGE_INFO in my local rules, it
seems to me that this rule has such a large false-positive potential that
the scoring should be reconsidered "upstream".

Thanks for your attention.

Guyang Mao

- attached are two examples of false-positived Microsoft mail
- I have also had Hewlett-Packard mail false-positived by X_MESSAGE_INFO, so
it's by no means exclusive to Microsoft lists

Attachment: hample
Description: Binary data

Reply via email to