On 5/27/19 5:13 PM, hg user wrote:
> The server was installed and configured by a "zimbra man", a person I 
> fully trust. Since I manage a commercial antivirus/antispam solution 
> that is not properly working for the italian language, I was tasked to 
> join the project in order to understand if we could switch from the 
> proprietary solution to spamassassin.
> 
> I'm now in the process of double-checking the configuration of 
> spamassassin and feeding the bayes engine...
> 
> Testing the system I noticed that spamassassin logged the internal MTAs 
> (including the antivirus server) as external and I asked *the zimbra 
> man* to correct the configuration. He replied it was not necessary. 
> Sorry I didn't specify I asked the person in charge of the system.
> 
> In the end, I need to think about the answer of RW: spamassassin is run 
> by amavis but with no internal servers defined, it uses my internal one 
> as the external. Received header needs some more care, and probably also 
> the list of stop words should be expanded. Probably there is a ratio 
> behind some decisions taken by the developers, but I can't fully 
> understand how the destination address can help on whether a message is 
> spam or not, at least not 6 times.

The internal_networks and trusted_networks are _very important_ to be 
set correctly for a number of reasons, not just Bayes.  This gives SA 
the proper "view" to the outside/Internet.  Keep in mind 
internal_networks is not literally your RFC 1918 internal_networks and 
the trusted_networks are not only ones that you managed/control.

Internal_networks is any public or private IP space that you trust to 
not forge the Received or synthetic received headers like X-Originating-IP.

Trusted_networks can be external/public networks that you know won't 
change or forge the Received or synthetic received headers.

I have recently added all Google and Office 365 IP blocks to my 
trusted_networks to better detect last-external client IPs.  This allows 
for deep Received header inspection since I know that Google and 
Microsoft aren't going to forge those headers.  Very interesting 
information comes out into the open as a result of this.

P.S. To implement/try this extended trusted_networks, set the score for 
ALL_TRUSTED to -0.001 and disable it from shortcircuit'ing.

score   ALL_TRUSTED     -0.001
shortcircuit ALL_TRUSTED off

-- 
David Jones

Reply via email to