On Wed, 23 Dec 2020, Grant Taylor wrote:
> I have about 2,000 messages a day that come in to my mail server for all
> recipients with the exception of one specific (set of) recipient(s). That
> (set of) recipient(s) receive 20,000 - 30,000 messages a day. They are very
> specific messages for an automated communications system and they don't need
> any spam filtering, specifically RBL filtering. (It's a matrix of about 20
> different such parties sending between each other across the internet.)
>
> I'm looking at implementing a new RBL from a service provider that offers a
> free tier of about 5,000 queries a day. My personal messages are way under
> that limit. The particular (set of) address(es) that I want to bypass RBL
> tests are way over that limit. So I would like to bypass the RBL tests for
> that specific (set of) address(es).
spamass-milter has a -u flag for a username to pass to SA. If these are
single-recipient messages that may be enough to reliably tie into per-user
config to disable the RBL check.
I am fairly sure that setting a rule score to zero bypasses the rule (vs.
running it and ignoring the result) but you will probably want to test
that to confirm whether the RBL is checked anyways. However, if the RBL
check is written as a subrule then it can't be disabled this way as
subrules don't have scores to set to zero.
You may need to patch spamass-milter to add the ability to bypass specific
recipient addresses to achieve this. This discussion and patch may help as
a starting point:
https://mail-index.netbsd.org/pkgsrc-users/2010/09/10/msg012736.html It looks like that patch might be already implemented in some distros.
There appears to be a sendmail patch that adds the ability to control
milter execution via sendmail rulesets:
https://groups.google.com/g/comp.mail.sendmail/c/kPZtOXIclQ0 milter-rres at
http://www.jmaimon.com/sendmail/#milter-rrres.v16 I don't know whether that patch is in current sendmail, but I don't have
high hopes. The latest version (v16) on the author's site is from 2007 for
sendmail 8.13
It looks like that this milter proxy would allow you to dynamically bypass
spamass-milter based on recipient address without patching either sendmail
or spamass-milter:
https://milter-manager.osdn.jp/reference/introduction.html I don't have any familiarity with it, though. It is fairly current, last
released in September 2019.
That last option sounds to me like the first one you should explore.
--
John Hardin KA7OHZ
http://www.impsec.org/~jhardin/ jhardin@impsec.org pgpk -a jhardin@impsec.org
key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
"Bother," said Pooh as he struggled with /etc/sendmail.cf, "it never
does quite what I want. I wish Christopher Robin was here."
-- Peter da Silva in a.s.r
-----------------------------------------------------------------------
2 days until Christmas