Option to allow RANDOM SPAM through!
2009-10-10 by d d
Could you please have an option to allow random SPAM through? Like 10% or every mondays! I feel so lonely now!
8: DELIVERED MAIL
4: RETURNED BACK AFTER TEMPFAIL
108000: SENDER/RECIPIENT SPOOF
174000: MILTER-GREYLIST TEMPFAILED
Commands in order (Numbers Rounded Off above except first 2):
egrep 'to=.+stat=Sent$' /var/log/maillog|wc -l
egrep 'autowhitelisted for' /var/log/maillog|wc -l
egrep 'OFF IMPOSTOR' /var/log/maillog|wc -l
egrep 'milter=.+reject=.+00:01:00' /var/log/maillog|wc -l
In order to estimate tempfailed connections, it is important to scan maillog for '00:30:00' (or whatever your delay is) because some mailers will try every minute until greylist expires. For example, for hotmail mail, it will show as 30 in your maillog while essentially it is 1 tempfailed connection retrying. It is also important to include 'milter' in the line, otherwise you have 1 log entry from sendmail and one from milter.
In my mail server, SENDER/RECIPIENT SPOOF above gets 5xx rejected before milter-greylist. They are 100% SPAM without a doubt. For that to work, we had to enable check_compat and put the following in access.db:
Compat:me@...<@>me@... 550 .... OFF IMPOSTOR
From:me@... OK
From:my.dom 550 .... OFF IMPOSTOR
me@my.dom is the smtp auth sender from the envelope FROM: . So no relaying here if no smtp auth. I just thought I could share these with you folks.
So all these SENDER/RECIPIENT SPOOF would have been tempfailed by milter-greylist... 282000 SPAM versus 8 legit mails :) Well, actually for testing I removed access.db, iptables, tcpwrappers blocks. But you can understand the suffering we had to go through.
NOWWWWWWWWWWWWWWW..... As for milter-greylist...
More than the program, I would like to thank whoever wrote the README. It took me less than 10 mins to get up and going. I did not spend days wondering like a clueless idiot what to expect. Especially the parts "TRYING OUT FOR FEW USERS" and "RUNNING IT FOR THE WHOLE SITE". Very well done Emmanuel and whoever else contributed.
NOTE: 'acl' is obsoleted i believe. It doesnt make much difference, but references could be replaced in README.
I have few questions:
1. DUMPFREQ/DUMPFILE: Why is this necessary? Is this only necessary in case server crashes? I have 1000+ days uptime on the server so a crash is not every day occurance and a moot point on servers. Or is there any other reason for it like memory consumption gets high and entries are dumped to file to release memory? If not, is it safe to disable it with '-1'?
2. Is it possible to put references to files in greylist.conf? For example, I don't want to meddle with the config file and I want it to read a file for manual whitelisting (say /etc/mail/{whitelist,blacklist}).
3. Auto whitelisting email addresses that I sent mail to. Since I am expecting a reply, I would like any address I send email to get whitelisted automatically (wherever their IPS might be from). How to do this?
4. It is not possible for me to greylist mail based on RBLs. I would like to scan them first with SpamAssasin and CLAMAV. If SPAM, tempfail. If virii, tempfail. Keep copies if I wanted to. I tried doing this with amavisd-new and amavisd-milter but they seemed too complicated and I am not sure if it can be done.
Could someone show me a pointer how to do that with milter-greylist? For example, how to use SpamAssasin with milter-greylist?
Thank you many times again.