...
To manually blacklist, use blacklist_from
to add an address to your blacklist.
If the sender is at all well known (such as a mailing list), you should use {{ Wiki Markup whitelist_from_rcvd
}} instead so that a spammer can't forge their mail to look like it's from the whitelisted address. More info on {{whitelist_from
}}, {{whitelist_from_rcvd
}}, and {{blacklist_from
}} is on the \[http://www.spamassassin.org/doc/Mail_SpamAssassin_Conf.html web\] or can be accessed from your local man pages by typing {{perldoc
Mail::SpamAssassin::Conf
}}.
Some good, free web-based tools are available to put a friendly user interface on whitelists (and blacklists) and allow users to edit their own. See WebUserInterfaces.
With the AutoWhitelist and TxRep plugins, besides their automated function, you can whitelist and blacklist email addresses, or (in the case of TxRep) also domain names, IP addresses, or NetBIOS/HELO names, with the command line options --add-addr-to-whitelist
and --add-addr-to-blacklist
of the main spamassassin
script. The whitelisting and blacklisting with TxRep is documented in details on its Wiki and POD pages.
What is AutoWhitelist?
Another feature of spamassassin SpamAssassin is "auto-whitelist". But the name is a misnomer. The AutoWhitelist is designed as an automatic score averaging system, and is just as likely to penalize or blacklist an address as it is to benefit or whitelist it. If you want to whitelist, you should use the directions above.
Alternatively, there is also the AutoWhiteList successor - the TxRep Sender Reputation plugin. It whitelists and blacklists automatically and manually not only email addresses, but also senders' domain names, IP addresses, and NetBIOS/HELO names in the combination with IP blocks, DKIM signatures, and SPF passes. TxRep also allows the whitelisting and blacklisting of senders through the sa-learn
tool. It happens automatically when training spam/ham to Bayes - depending on your configuration, it can be done by feeding the sa-learn
tool individual messages, or entire mailboxes and folders manually on the command line, by user input in webmail software, through a cronjob from IMAP folders, or in other similar ways.
Additionally, TxRep, in similar way to the Bayes plugin, can boost the automated whitelisting/blacklisting at the scan time, when the score of the message triggers the auto-learn process. To activate this feature, you need to enable the option txrep_autolearn. Do not activate the auto-learn option before SpamAssassin is well tuned, and before it sorts spam and ham correctly. With poorly trained SpamAssassin, the auto-learn function of TxRep would boost also all false results. Add the autolearn
value to the email headers (i.e. "add_header all Status ... autolearn=AUTOLEARN"
in local.cf
), and activate the txrep_autolearn
option only after you verified that SA triggers the autolearn process only in the cases when you clearly want to boost the sender's reputation (in one or the other way).
Automatically whitelisting people you've emailed
When parsing outbound email by SpamAssassin, you can automatically whitelist all recipients of the outgoing messages with the help of the TxRep plugin. To activate this feature, install the plugin, and enable the option txrep_whitelist_out.
When not using TxRep, or not parsing outgoing email by SpamAssassin, you could use the following method to extract a unique list of e-mail addresses from your 'Sent' folder (in mbox format), you could use something like this. You can also use both methods simultaneously.
In your ~/.spamassassin/user_prefs
file, put this in:
No Format |
---|
include sent_whitelist
|
The following script creates the sent_whitelist file with 100 addresses per line:
No Format |
---|
#!/bin/sh SADIR=~/.spamassassin SENTMAIL=~/mail/Sent rmcat -f $SADIR/sent_whitelist for x in `grep "^To:" $SENTMAIL$SENTMAIL | grep -Ei '^(To|cc|bcc):' | grep -ooEi "[[:alnum:]\.\+\-\_]*@[[:alnum:]\.\-]*"'[a-z0-9_.=/#+-]+@([a-z0-9-]+\.)+[a-z]{2,}' | tr "A-Z" "a-z" | sort -u`u ; do| xargs -n 100 echo "whitelist_from $x" >> $SADIR/sent_whitelist done cat $SADIR/user_prefs.base> $SADIR/sent_whitelist > $SADIR/user_prefs |
This can be adapted as necessary, and executed as a cron job. Note, this requires you to store/rename your user_prefs
file to user_prefs.base
! Make sure you do this before running the script or you'll lose your preferences. Of course if there is some way I'm not aware of to include files from within a user_prefs
file, please someone make the necessary changes.
_(There is a way: include filename
- Include configuration lines from "filename". Relative paths are considered relative to the current configuration file or user preferences file.)
The script is simple and fast, but not very accurate. It extracts strings looking like e-mail addresses from the lines starting with To: CC: and BCC. However it does not take into account the continuation lines (addresses on continuation lines are not added to the white list), but extracts addresses from message body (if a line in the body starts with To:/CC:/BCC:, which often happens when formwarding e-mails).
To make the script more accurate but much more slow replace the line "grep -Ei '^(To|cc|bcc):'|" with a call to formail (part of procmail package):
No Format |
---|
formail -s formail -czx 'To:' -x 'CC:' -x 'BCC:' |
|
Formail extracts lines only from RFC-822 header and concatenates continued fields providing an accurate list of all addresses.See below._
Building an auto-whitelist from LDAP
...
- DavidCary
- Marcus Dressler
- Xavier
- DanKohn
- GadiCohen
- JasonLingohr
- Ivo Truxa