>From: li...@rhsoft.net <li...@rhsoft.net>

>Sent: Monday, September 12, 2016 8:47 AM
>To: users@spamassassin.apache.org
>Subject: Re: RCVD_IN_SORBS_SPAM and google IPs


>Am 12.09.2016 um 15:37 schrieb David Jones:
>>>Has RCVD_IN_SORBS_WEB been considered for adjustment as well? It's
>>>hitting a lot more ham than spam here, including mail from facebook.
>>
>> You should be safely whitelisting any major senders like Facebook at
>> the MTA level and in SA:
>>
>> whitelist_auth *@amazonses.com
>for sure *not* since that would whitelist anything hosted on the amazon
>cloud instances which is *not* amazon stuff itself

>don't confuse major good senders with hosted crap of endcustomers
>@amazonses.com != @amazon.com

I know the difference between amazonses.com and amazon.com.  I have
only had 1 instance of spam from amazonses.com and Amazon blocked
it quickly.  From my experience, they are trustworthy and police their
outbound spam properly to trust.  Otherwise you will block too much
legit email from their Simple Email Service.

https://aws.amazon.com/ses/faqs/
They have sending and bounce quotas which are going to catch most
bad actors using SES.

>the same for "whitelist_auth *@icloud.com"

Apple is also doing a good job of policing their outbound spam
from icloud.com.  My logs show good reputation of the IPs.
senderscore.org report for 17.164.24.103 has a 98 out of 100
as a very high sender which is excellent.

Everyone doesn't have to whitelist_auth the same senders.  I only
wanted to show that this is a valid way to reduce false positives
for transient things like Google IPs in SORBS RBL.

>[root@mail-gw:~]$ cat maillog | grep
>01000157007004fc-dd484ffc-155c-48dc-8a7d-b9fbc51b7094-000...@email.amazonses.com
>Sep  6 18:58:47 mail-gw postfix/cleanup[5554]: 3sTCVH11mDz9bQ:
>message-id=<01000157007004fc-dd484ffc-155c-48dc-8a7d-b9fbc51b7094-000...@email.amazonses.com>
>Sep  6 18:58:52 mail-gw spamd[1086]: spamd: result: Y 14 -
>BAYES_99,BAYES_999,BOGOFILTER_SPAM,CUST_DNSBL_19_SPAMCANN,CUST_DNSWL_5_ORG_N,CUST_DNSWL_8_TL_N,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_D>OMAINS,HTML_MESSAGE,RAZOR2_CF_RANGE_51_100,RAZOR2_CF_RANGE_E8_51_100,RAZOR2_CHECK,RCVD_IN_MSPIKE_H2,RP_MATCHES_RCVD,SPF_PASS,T_OBFU_ATTACH_MISSP,URIBL_LOC>AL
>scantime=5.0,size=13908,user=sa-milt,uid=189,required_score=5.5,rhost=localhost,raddr=127.0.0.1,rport=/run/spamassassin/spamassassin.sock,mid=<01000157007004fc-dd484ffc-155c->48dc-8a7d-b9fbc51b7094-000...@email.amazonses.com>,bayes=1.000000,autolearn=disabled,shortcircuit=no

Did you check the envelope-from address of that message?  Those are
message IDs which wouldn't necessarily match the envelope-from
used by whitelist_auth.  I don't see an IP address either to check the
source so that email could have been forwarded.  I would need to see
the full headers and the message body since it did hit so many rules
and high Bayes.


Reply via email to