-----BEGIN PGP SIGNED MESSAGE-----

>>>>> "rm" == Ryan Moore <[EMAIL PROTECTED]> writes:

    >> The mystery is, that spam now has a header from my user, who is
    >> forwarding the spam to the spam mail account. How does SA know
    >> to train on the contents, and not my legitimate user's header?

    rm> The answer is that it doesn't, and it will train tokens based
    rm> on your users forward, which is bad. You will want to strip
    rm> out the original message (which should be sent as an
    rm> attachment) and only learn based on that.

I also got this answer on the sa-exim list, and I have a perl script
that will extract the message assuming it is forwarded as an
attachment of type message/rfc822.

The problem I need to figure out is how to keep spamassassin from
running against the message when delivered to the dummy account.  I
don't completely understand when the local_scan gets invoked---is
$local_user_id set so I can test based on that?

I can post the perl script is anyone is interested....

regards,

roland
- -- 
                       PGP Key ID: 66 BC 3B CD
Roland B. Roberts, PhD                             RL Enterprises
[EMAIL PROTECTED]                            6818 Madeline Court
[EMAIL PROTECTED]                           Brooklyn, NY 11220

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
Comment: Processed by Mailcrypt 3.5.4, an Emacs/PGP interface

iQCVAwUBQSGHh+oW38lmvDvNAQH4cwP/WGD3Y5oPeeBwVQ3vrCAJgjWMa4C9I5fW
KJu1pBg3IS1zr4mKRyXQF7+m0IkeX/PrdrqeojWw5esR+RmSYgil60T4WQmw7eTH
6tWS4oIyF0ZnziDIOMVQlNvVK2oAwkvoyW3SvRlx8akBGNPgMSDRzSRuaaVT5tjC
pFZtbdLQcQo=
=hFQs
-----END PGP SIGNATURE-----

Reply via email to