Return-Path: Delivered-To: apmail-spamassassin-users-archive@www.apache.org Received: (qmail 75011 invoked from network); 14 May 2008 19:03:57 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 14 May 2008 19:03:57 -0000 Received: (qmail 43427 invoked by uid 500); 14 May 2008 19:03:47 -0000 Delivered-To: apmail-spamassassin-users-archive@spamassassin.apache.org Received: (qmail 43404 invoked by uid 500); 14 May 2008 19:03:47 -0000 Mailing-List: contact users-help@spamassassin.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@spamassassin.apache.org Received: (qmail 43393 invoked by uid 99); 14 May 2008 19:03:47 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 14 May 2008 12:03:47 -0700 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: local policy) Received: from [140.232.1.173] (HELO george.clarku.edu) (140.232.1.173) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 14 May 2008 19:02:52 +0000 Received: from paul.ad.clarku.edu (140.232.1.172) by george.clarku.edu (140.232.1.173) with Microsoft SMTP Server (TLS) id 8.1.240.5; Wed, 14 May 2008 15:03:12 -0400 Received: from [140.232.0.76] (140.232.0.76) by exchange.clarku.edu (140.232.1.172) with Microsoft SMTP Server (TLS) id 8.1.240.5; Wed, 14 May 2008 15:03:11 -0400 Message-ID: <482B3769.8070904@clarku.edu> Date: Wed, 14 May 2008 15:03:05 -0400 From: Aaron Bennett User-Agent: Thunderbird 2.0.0.14 (X11/20080505) MIME-Version: 1.0 To: "users@spamassassin.apache.org" Subject: Re: VBounce ruleset References: <482AFAFF.8080102@clarku.edu> <1210780218.25095.6.camel@monkey> In-Reply-To: <1210780218.25095.6.camel@monkey> Content-Type: text/plain; charset="ISO-8859-1"; format=flowed Content-Transfer-Encoding: 8bit X-Virus-Checked: Checked by ClamAV on apache.org Karsten Br�ckelmann wrote: > > Please check the recent archives for threads > about the VBounce plugin or backscatter. > > I apologize for not doing that... however, had I, I would have still asked the question because the advice given is not suitable for an enterprise deployment: > # If you use this, set up procmail or your mail app to spot the > # "ANY_BOUNCE_MESSAGE" rule hits in the X-Spam-Status line, and move > # messages that match that to a 'vbounce' folder. > > If you read further you'll see that you didn't answer my original question.... > >> My question is to people who've been using the rules in a real >> production environment -- do you see them working with the default >> scores, or have you tweaked them at all? >> > > Using procmail or a client side filter to file spam based on an X-Spam-Status line is not appropriate for a large, or even moderately large, end-user focused deployment -- that's why I asked if others are altering the default scores. Again, a thousand apologies for making you repeat yourself. That all being said... Is anyone using these rules for spam detection? If so, how have you been scoring them? I'm glad to have a confirmation that 0.1 is obviously not enough but I'm curious how others are scoring these rules; given a general spam target of 5. I'm thinking of scoring in the range of 1.5 - 2... Best, Aaron Bennett