From: micah anderson <mi...@riseup.net>

>I have trusted_networks and internal_networks configured, and have been
>short-circuiting spam processing when messages come from those
>networks. 

>I have:

>shortcircuit ALL_TRUSTED on

I would advise against this since you need to do proper outbound filtering.

>and I have internal_networks or trusted_networks configured, yet these
>messages don't shortcircuit, and I'm puzzling over the spamassassin -D
>output trying to understand why, does someone have some suggestions?

>For example, I have:

>internal_networks 10.0.

internal_networks 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 169.254.0.0/16
fe80::/10 [plus public IP ranges of your network]

trusted_networks [public IP ranges not in you network but you trust based
on some form of arrangement]

If you are using Postfix (which I am familiar with), then the internal_networks
plus trusted_networks will match pretty closely to 'postconf mynetworks'.

>but things are not shortcircuiting, you can see it is finding the relay
>as trusted and internal in this line:

>Apr 24 15:32:38.862 [29876] dbg: received-header: relay 10.0.1.163 trusted? 
>yes internal? yes msa? no

>but I'm not clear how it decides if it should short circuit or not. Can
>anyone clarify?

>Here is an example:

>Return-Path: <foode...@riseup.net>
>X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on towhee.riseup.net
>X-Spam-Level: *
>X-Spam-Pyzor:=20
>X-Spam-Status: No, score=3D1.5 required=3D6.0 tests=3DAM_TRUNCATED,BAYES_60,
>        NEAR_EMPTY,UNPARSEABLE_RELAY shortcircuit=3Dno autolearn=3Ddisabled 
>versio=
>n=3D3.4.1
>Delivered-To: mi...@riseup.net
>Received: from piha.riseup.net (unknown [10.0.1.163])
>        (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
>        (Client CN "*.riseup.net", Issuer "COMODO RSA Domain Validation Secure 
>Ser=
>ver CA" (verified OK))
>        by towhee.riseup.net (Postfix) with ESMTPS id 91445AD
>        for <mi...@riseup.net>; Wed,  5 Apr 2017 12:52:34 +0000 (UTC)
>Received: from [127.0.0.1] (localhost [127.0.0.1])
>        (Authenticated sender: foodefai)
>        with ESMTPSA id 7492F1C05F2
>From: Food Defai <foode...@riseup.net>
>To: micah <mi...@riseup.net>
>Subject: here are a few tests
>Date: Wed, 05 Apr 2017 15:50:10 +0300
>Message-ID: <87fuhnc931....@riseup.net>
>MIME-Version: 1.0
>Content-Type: text/plain

Create a meta rule based on ALL_TRUSTED and something unique about this message
that can not be forged by a spammer with control of a compromised account.  For 
example:

header          __MSGID_TRUST           Message-ID =~ /@riseup\.net/
header         __AUTH_SENDER      Received =~ /Authenticated sender: foodefai/
meta            INT_TRUSTED           ALL_TRUSTED && __MSGID_TRUST && 
__AUTH_SENDER
score           INT_TRUSTED           -0.001
priority       INT_TRUSTED           -900
shortcircuit  INT_TRUSTED        ham
tflags            INT_TRUSTED         noautolearn nice

Make sure you have "loadplugin Mail::SpamAssassin::Plugin::Shortcircuit" 
enabled in
v320.pre.

Of course key to this working is to setup meta rules that spammers don't know 
anything
about and this one was just published to a public mailing list so you may want 
to adjust
it a bit based on something else unique about the message headers.  If they got 
control
of an internal account on a server that sent outbound through this SA instance, 
then they
could forge some headers to match this rule then you will be listed on RBLs in 
no time.

Dave

Reply via email to