On Fri, 05 Jun 2009 10:24:31 -0400
Micah Anderson <mi...@riseup.net> wrote:

 If I understand things properly, because I've got these
> setup in my trusted_networks, then these previous hops will be
> checked in RBLs, so the spam is more detectable.

That doesn't really help. If you think about it, tests that run on
untrusted headers will run whether or not you put the list servers into
your trusted network. The tests that run on the trusted boundary are
whitelisting rules (plus a few rules that will soon get moved to the
internal boundary). You might get some benefit from putting the list
servers into the internal network, but the chances are that the list is
already blocking on zen, and maybe DUL lists and SPF.

> What I am unsure of is if I am poisoning my bayes by reporting these
> messages that make it through as spam. Should I be just deleting them?
> The tokens that are legitimate that will end up as collateral damage
> are going to be the list footers, the list administration messages,
> and potentially other pieces.
> 
> I'm hoping I can identify why my bayes database is so bad (it thinks
> everything is BAYES_00 now), and if this is why I will want to change
> my training behavior.

It's really hard for BAYES to work on in-list spams because they
contain so many strong ham tokens. What I would suggest is to use
a separate address and Bayes database for the lists and train it on all
spam, but only learn ham that doesn't hit BAYES_00. I use sieve to
select some in-list candidates for learning (with dspam rather than SA).

You might also configure BAYES to ignore some of the list headers.

Things like challenge-response messages and out-of-office replies are
best handled with simple filtering or custom SA tests.

Reply via email to