p5-Mail-SpamAssassin-3.2.3 - manual whitelist_from broken
John Marshall
John.Marshall at riverwillow.com.au
Thu Aug 30 03:28:43 PDT 2007
Stefan Lambrev wrote:
> Hello,
>
> I noticed that after upgrading spamassassin to the latest (in ports)
> version, manual whitelist is somehow broken.
> In previous version spamassassin detects without a problem forged "From"
> headers and even with "whitelist_from *@domain.com"
> mails that are spam got caught.
>
> With the latest version of spamassassins the following example will not
> be detected as spam:
>
> >telnet mailserver-spamprotected.com 25
> >helo somedomain.com
> >mail from: spoof at somedomain.com
> >rcpt to: validuser at mailserver-spamprotected.com
> >data
> From: validuser at mailserver-spamprotected.com
> some spam xxx.
> .
> >quit
>
> In this case whitelist_from *@mailserver-spamprotected.com is triggered,
> and I'm pretty sure that wasn't a case in older versions of spamassassin.
>
> Any ideas what is changed, and how I can restored the old behavior.
>
As far as I know, nothing has changed. What you are seeing is expected
behaviour.
"whitelist_from" should only be used as a last resort because it blindly
trusts the (alleged) envelope sender address. The documentation warns
about this:
<http://spamassassin.apache.org/full/3.2.x/doc/Mail_SpamAssassin_Conf.html#whitelist_and_blacklist_options>
Personally, I include the SPF plugin and use "whitelist_from_spf"
entries wherever possible. Failing that (if sending domain doesn't
publish SPF details) I use "whitelist_from_rcvd".
--
John Marshall
More information about the freebsd-ports
mailing list