Jari Fredriksson wrote:
> 
> 
> 
> 23.10.2009 20:04, MySQL Student kirjoitti:
>> Hi,
>> 
>>> SpamAssassin DOES NOT bypass scanning, if the internal or trusted
>>> networks contain the server in it.
>> 
>> Hmm.. thanks for correcting me.
>> 
>> How would you, then, go about preventing SA from scanning the
>> localhost or a specific domain without whitelisting that domain or
>> range?
>> 
>> Thanks,
>> Alex
>> 
> 
> Personally, I do call SpamAssassin from maildrop (/etc/maildroprc).
> 
> That takes place as
> 
> ----------------------------------------------------------------------
> 
> if ( $SCAN_SPAM == 1 )
> {
>      xfilter "spamc -H --retry-sleep=10 --connect-retries=100 -d spamd
> -u spam"
> }
> 
> ----------------------------------------------------------------------
> 
> Than can be done from procmailrc etc. with their own ways.
> 
> The SCAN_SPAM variable is a key in this. I can set it to 0 (default
> value for script 1) using various tests.
> 
> I have various tests for that variable, that this is what whitelists the
> message from being passed to SpamAssassin.
> 
> ----------------------------------------------------------------------
> 
> if (( $SCAN_SPAM == 1) &&  /^From:\s*(.*)/ && lookup( $MATCH1,
> "/usr/etc/maildrop_sender_whitelist", "D" ))
> {
>     xfilter "reformail -A'X-Whitelisted: $MATCH1 in
> /usr/etc/maildrop_sender_whitelist'"
>     SCAN_SPAM=0
> }
> 
> ----------------------------------------------------------------------
> 
> In this case, I have a text file /usr/etc/maildrop_sender_whitelist
> which contains email addresses line by line, and if maildrop finds a
> match from there, it sets the SCAN_SPAM to 0, thus bypassing the SA call.
> 
> This test if earlier in the maildroprc script, the spamc call is of
> course in the end.
> 
> This kind of whitelisting is of course dangerous, but it it works for
> me. The whitelisted addresses are mostly of type
> [email protected] which are not abused by spammers (knock knock).
> 
> You can do all kinds of tests with maildrop. I have also this.
> 
> -----------------------------------------------------------------------
> # Check for bounces. If matches, no SpamAssassin call needed, because I
> do not consider bounce as spam.
> if (    /^Subject: Mail Delivery Problem/               || \
>         /^Subject: Mail Delivery \(failure/             || \
>         /^Subject: Undelivered Mail Returned to Sender/ || \
>         /^Subject: virus found in sent message/         || \
>         /^Subject: failure notice /                     || \
>         /^Subject: Mail delivery failed/                || \
>         /^Subject: Undeliverable\:/                     || \
>         /^Subject: Undeliverable [Mm]ail/               || \
>         /^Subject: Undeliverable Mail/                  || \
>         /^Subject: Undeliverable mail/                  || \
>         /^Subject: Returned mail\: /                    || \
>         /^Subject: DELIVERY FAILURE: User /             || \
>         /^Subject: Yahoo! Auto Response/                || \
>         /^X-ME-bounce-domain:/                          || \
>         /^X-Failed-Recipients:/                         || \
>         /^X-Yahoo-Newman-Property: groups-bounce/       || \
>         /^Diagnostic-Code: X-Postfix; host /            || \
>         /^Content-type: multipart\/report;/             || \
>         /^Subject: Delivery failed\:/                   || \
>         /^Subject: DELIVERY FAILURE\:/                  || \
>         /^Subject: MESSAGE NOT DELIVERED\: /            || \
>         /^Subject: Delivery problem/                    || \
>         /^Subject: Email Failure Notification/          || \
>         /^Subject: Email not allowed/                   || \
>         /^Subject: failure delivery/                    || \
>         /^Subject: failure notice/                      || \
>         /^Subject: Mail Not Delivered/                  || \
>         /^Subject: mail failed, returning to sender/    || \
>         /^Subject: Nondeliverable mail/                 || \
>         /^Subject: Warning: could not send message for/ || \
>         /^Subject: MDaemon Warning - Virus Found/       || \
>         /^Subject: Permanent Delivery Failure/          || \
>         /^Subject: Mail System Error - Returned Mail/   || \
>         /^Subject: Mail System Error - Undeliverable Mail/   || \
>         /^Subject: Transient Delivery Failure/          || \
>         /^Subject: Message status - undeliverable/      || \
>         /^Subject: Warning\: message /                  || \
>         /^Subject: Mail could not be delivered/         || \
>         /^Subject: Your email to .* has NOT been delivered/ || \
>         /^Subject: Returned mail: see our site/ || \
>         /^Subject: Delivery failure/ )
> {
>         `logger -p mail.info "** BOUNCE RECEIVED **"`
>         if (hasaddr("[email protected]"))
>         {
>                 exit
>         }
>         xfilter "reformail -A'X-Whitelisted: Apparently a bounce,
> SpamAssassin will not be called.'"
>         xfilter "reformail -A'X-Bounce: Yes '"
>         SCAN_SPAM=0
> }
> 
> -----------------------------------------------------------------------
> 
> It does not scan for Spam Attachments if the mail is a bounce. Bounces
> will be delivered to another folder with a later rule.
> 
> You have your ways, your have your tools.
> 
> -- 
> http://www.iki.fi/jarif/
> 
> 
> 
>  
> 


Hi All,

Thank you for the useful tips. I have tried the following:
1. trusted_networks/internal_networks - I checked the conf file for
spamassassin /etc/mail/spamassassin/local.cf, there is no reference to
trusted_networks or internal_networks. I also clear those two setting just
in case with the following settings:

clear_trusted_networks
clear_internal_networks

trusted_networks
internal_networks

But this does not help. The spam emails still did not get tag.

2. I am using procmailrc to invoke spamassassin.
Here is the /etc/procmailrc:
DROPPRIVS=yes
:0fw
* < 25600
| /usr/bin/spamc

:0
* ^X-Spam-Level: \*\*\*\*\*\*\*\*\*\*
/dev/null
~

As someone suggested, this may be due to size of the email. It looks like
spamassassion will not be invoked if email is larger than 25600 bytes.

I changed the above to the following:

DROPPRIVS=yes
:0fw
* < 102400
| /usr/bin/spamc

:0
* ^X-Spam-Level: \*\*\*\*\*\*\*\*\*\*
/dev/null


That seems to fix the problem.
I also have a question:
Do i really need to check for the size of email? Should I just remove the
size check?

Thanks,

Angus



-- 
View this message in context: 
http://www.nabble.com/Spamassassin-not-tagging-some-emails-tp26019435p26033969.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.

Reply via email to