On 5/27/19 5:13 PM, hg user wrote: > The server was installed and configured by a "zimbra man", a person I > fully trust. Since I manage a commercial antivirus/antispam solution > that is not properly working for the italian language, I was tasked to > join the project in order to understand if we could switch from the > proprietary solution to spamassassin. > > I'm now in the process of double-checking the configuration of > spamassassin and feeding the bayes engine... > > Testing the system I noticed that spamassassin logged the internal MTAs > (including the antivirus server) as external and I asked *the zimbra > man* to correct the configuration. He replied it was not necessary. > Sorry I didn't specify I asked the person in charge of the system. > > In the end, I need to think about the answer of RW: spamassassin is run > by amavis but with no internal servers defined, it uses my internal one > as the external. Received header needs some more care, and probably also > the list of stop words should be expanded. Probably there is a ratio > behind some decisions taken by the developers, but I can't fully > understand how the destination address can help on whether a message is > spam or not, at least not 6 times.
The internal_networks and trusted_networks are _very important_ to be set correctly for a number of reasons, not just Bayes. This gives SA the proper "view" to the outside/Internet. Keep in mind internal_networks is not literally your RFC 1918 internal_networks and the trusted_networks are not only ones that you managed/control. Internal_networks is any public or private IP space that you trust to not forge the Received or synthetic received headers like X-Originating-IP. Trusted_networks can be external/public networks that you know won't change or forge the Received or synthetic received headers. I have recently added all Google and Office 365 IP blocks to my trusted_networks to better detect last-external client IPs. This allows for deep Received header inspection since I know that Google and Microsoft aren't going to forge those headers. Very interesting information comes out into the open as a result of this. P.S. To implement/try this extended trusted_networks, set the score for ALL_TRUSTED to -0.001 and disable it from shortcircuit'ing. score ALL_TRUSTED -0.001 shortcircuit ALL_TRUSTED off -- David Jones