You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spamassassin.apache.org by bu...@bugzilla.spamassassin.org on 2004/01/09 00:51:55 UTC

[Bug 2906] Courier Received header format not detected - causing false positive on RCVD_IN_DYNABLOCK

http://bugzilla.spamassassin.org/show_bug.cgi?id=2906





------- Additional Comments From mitch@webcob.com  2004-01-08 14:56 -------
This is a workaround for the third case below - local AUTHENTICATED mail 
between users on the system being scanned and reported as being spam due to 
remote users being in DNS black hole lists due to RCVD_IN_DYNABLOCK

First thanks Gord for the idea, and the starting point and feedback.

Now that the kinks are out I'll publish it here for any it might help and 
explain the reasoning.

SpamAssassin has a variety of black hole tests which it applies to the Received 
headers. Recent versions are supposed to ignore all but the FIRST header, and 
only test others...

I think even this first test should be ignored if the first Received header 
indicates the sender was authenticated.

As an interrum fix, I wanted a way to bypass spamassassin if a locally 
authenticated user is sending the message to a local user on my system. To do 
this, I have to test the FIRST Received header and see if it is an AUTH'd user -
 if so, I bypass spamc:

        i=1
        foreach /Received: .*/
        {
#echo ASDF4
#echo $MATCH
#note echo sends to syslog - good for debugging!
                if ( $i == 1 && ( ! ($MATCH =~ /Received: .*\(AUTH: [^)]*\) 
*by /)))
                {
                        xfilter "/usr/bin/spamc -U /var/run/spamassassin.sock -
u $UI_Email"
                }
                i=$i+1
        }

This is a "maildrop" script - which comes with courier-mta.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.