On 7/5/19 9:55 AM, Bill Cole wrote:
> On 5 Jul 2019, at 10:30, David Jones wrote:
> 
>> On 7/5/19 9:09 AM, Bill Cole wrote:
>>> On 5 Jul 2019, at 9:37, David Jones wrote:
>>>
>>
>> I believe the only change would be the Relay-Countries value would have
>> country codes in it.
> 
> Yes, which it shouldn't.
> 
> It may sound weird, but it is true that I work with 2 mostly unrelated 
> mail systems where mail comes in via MSAs whose authentication is 
> trustworthy from end-users who live and/or travel in places that send 
> those systems very little legitimate mail via untrusted/unauthenticated 
> sources.
> 

This could be handled pretty easily with a local meta rule if one wanted 
to subtract points for a subset of senders that also hit untrusted 
country codes to offset the additional score from that country hit.

Those are mail servers that you actually manage so are they in the 
internal_networks?  This proposal is only intended to change the way 
trusted_networks are handled.

It seems like the internal_networks and trusted_networks are being used 
for two different purposes that don't completely overlap.

1. Trusted to not forge the Received or X-Originating-IP headers.
2. Both make up the ALL_TRUSTED rule hit and include the authenticated 
ESMTPA which can include spam from a compromised account.

My servers are my problem to detect and handle compromised accounts.  I 
can control these with local SA rules because I have many options at my 
disposal.  For example, using swatch on my own logs to trigger country 
code lookups to detect the same user logging in from two different 
untrusted countries within X minutes which would be unlikely.

Perhaps we need something added like a 3rd option like boundary_networks?

internal_networks = in our admin control and won't forge headers
trusted_networks = trust to not forge headers (no change)
boundary_networks = works just like trusted_networks but 
X-Relay-Countries will fire.

-- 
David Jones

Reply via email to