Spamassassin 不会过滤掉所有高分邮件

Spamassassin 不会过滤掉所有高分邮件

即使许多相同的垃圾邮件被正确过滤到服务器的垃圾邮件箱,一些高分邮件仍会传递到用户邮箱。以下是一个例子:邮件被正确过滤为垃圾邮件

Date: Thu, 04 Aug 2016 15:08:33 +0300 From: Erich Gibbs
<[email protected]> To: **** <*****@****.**> Subject: please
sign

[-- Attachment #1 --] [-- Type: multipart/related, Encoding: 7bit,
Size: 16K --]

[-- Attachment #1 --] [-- Type: text/plain, Encoding: 8bit, Size: 0.1K
  --]

Dear ****

Please sign the receipt attached for the arrival of new office
facilities.


Best regards, Erich Gibbs


[-- Attachment #2: fe12f845f8ff.zip --] [-- Type: application/zip,
Encoding: base64, Size: 15K --]

[-- application/zip is unsupported (use 'v' to view this part) --]


[-- Attachment #2: SpamAssassinReport.txt --] [-- Type: text/plain,
Encoding: 7bit, Size: 1.0K --]

Spam detection software, running on the system "****.****.**", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it or label similar future
email.  If you have any questions, see the administrator of that
system for details.

Content preview:  Dear **** Please sign the receipt attached for the
arrival    of new office facilities. Best regards, Erich Gibbs [...]

Content analysis details:   (5.1 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 2.9 HELO_DYNAMIC_SPLIT_IP  Relay HELO'd using suspicious hostname (Split
                            IP)
 0.2 CK_HELO_GENERIC        Relay used name indicative of a Dynamic Pool or
                            Generic rPTR
 0.0 TVD_RCVD_IP            Message was received from an IP address
 0.7 SPF_NEUTRAL            SPF: sender does not match SPF record (neutral)
 1.3 RDNS_NONE              Delivered to internal network by a host with no rDNS

以下是我收到的类似邮件

Return-Path: <[email protected]> Received: from
108.subnet110-136-45.speedy.telkom.net.id (108.subnet110-136-45.speedy.telkom.net.id [110.136.45.108] (may be
forged))    by  (8.14.7/8.14.7) with ESMTP id u74CAuvv038162
    for <****@****.**>; Thu, 4 Aug 2016 14:11:07 +0200 Received: from
root by telkom.net.id with local (Exim 4.80)    (envelope-from
<[email protected]>)     id
kcxAKb-MGbTTg-NC    for ****@****.**; Thu, 04 Aug 2016 19:10:52 +0700
To: "*****" <****@****.**> Subject: please sign Date: Thu, 04 Aug
2016 19:10:52 +0700 From: "Earlene Blankenship"
<[email protected]> Message-ID:
<[email protected]> X-Priority: 3 MIME-Version:
1.0 Content-Type: multipart/related;    type="text/html";   boundary="b1_560b0ac54766d9148a54052f9a46e5ef" X-SPF-Scan-By: smf-spf
v2.0.2 - http://smfs.sf.net/ Received-SPF: None (****.****.**: domain
of [email protected]  does not designate permitted
sender hosts)   receiver=****.****.**; client-ip=110.136.45.108;
    envelope-from=<[email protected]>;
helo=108.subnet110-136-45.speedy.telkom.net.id; X-Virus-Scanned:
clamav-milter 0.99.2 at ****.****.** X-Virus-Status: Clean
X-Scanned-By: MIMEDefang 2.78 on 62.168.116.66

--b1_560b0ac54766d9148a54052f9a46e5ef Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit

Dear ****

Please sign the receipt attached for the arrival of new office
facilities.


Best regards, Earlene Blankenship


 1_560b0ac54766d9148a54052f9a46e5ef Content-Type: application/zip; name="d8bc18159378.zip" Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="d8bc18159378.zip"

当我用 spamc 检查同一封邮件的分数时,分数很高。我不知道为什么在发送之前没有正确标记。

# spamc -R <'1470312683.38275_0.****.****.**:2,Sa'
8.3/5.0 Spam detection software, running on the system "****.****.**", has identified this incoming email as possible spam.  The original
message has been attached to this so you can view it or label similar
future email.  If you have any questions, see the administrator of
that system for details.

Content preview:  Dear servis Please sign the receipt attached for the
arrival    of new office facilities. Best regards, Earlene Blankenship
[...] 

Content analysis details:   (8.3 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 2.9 HELO_DYNAMIC_SPLIT_IP  Relay HELO'd using suspicious hostname (Split
                            IP)
 0.0 CK_HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname
                            (Split IP)
 2.7 RCVD_IN_PSBL           RBL: Received via a relay in PSBL
                            [110.136.45.108 listed in psbl.surriel.com]
 3.6 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL
                            [110.136.45.108 listed in zen.spamhaus.org]
-1.2 RP_MATCHES_RCVD        Envelope sender domain matches handover relay domain
 0.4 RDNS_DYNAMIC           Delivered to internal network by host with
                            dynamic-looking rDNS

#

你知道可能是什么原因吗?谢谢。

答案1

我找到了原因。mimedefang-filter 中规定只有小于 100kB 的邮件才能被 spamassassin 处理。我将限制提高到 300kB,问题就解决了。

if ($Features{"SpamAssassin"}) {
        if (-s "./INPUTMSG" < 300*1024) {
...

我希望这可以帮助别人。

相关内容