-----BEGIN PGP SIGNED MESSAGE-----
>>>>> "rm" == Ryan Moore <[EMAIL PROTECTED]> writes:
>> The mystery is, that spam now has a header from my user, who is
>> forwarding the spam to the spam mail account. How does SA know
>> to train on the contents, and not my legitimate user's header?
rm> The answer is that it doesn't, and it will train tokens based
rm> on your users forward, which is bad. You will want to strip
rm> out the original message (which should be sent as an
rm> attachment) and only learn based on that.
I also got this answer on the sa-exim list, and I have a perl script
that will extract the message assuming it is forwarded as an
attachment of type message/rfc822.
The problem I need to figure out is how to keep spamassassin from
running against the message when delivered to the dummy account. I
don't completely understand when the local_scan gets invoked---is
$local_user_id set so I can test based on that?
I can post the perl script is anyone is interested....
regards,
roland
- --
PGP Key ID: 66 BC 3B CD
Roland B. Roberts, PhD RL Enterprises
[EMAIL PROTECTED] 6818 Madeline Court
[EMAIL PROTECTED] Brooklyn, NY 11220
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
Comment: Processed by Mailcrypt 3.5.4, an Emacs/PGP interface
iQCVAwUBQSGHh+oW38lmvDvNAQH4cwP/WGD3Y5oPeeBwVQ3vrCAJgjWMa4C9I5fW
KJu1pBg3IS1zr4mKRyXQF7+m0IkeX/PrdrqeojWw5esR+RmSYgil60T4WQmw7eTH
6tWS4oIyF0ZnziDIOMVQlNvVK2oAwkvoyW3SvRlx8akBGNPgMSDRzSRuaaVT5tjC
pFZtbdLQcQo=
=hFQs
-----END PGP SIGNATURE-----