Package: spamassassin
Version: 4.0.2-4
Severity: important

Last year, I had reported

  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106669

There is now a low limit on the Validity requests. This yields

  RCVD_IN_VALIDITY_CERTIFIED_BLOCKED
  RCVD_IN_VALIDITY_RPBL_BLOCKED
  RCVD_IN_VALIDITY_SAFE_BLOCKED

even on personal servers. To solve this issue, upstream has changed
the Validity rules to have zero scores:

  https://lists.apache.org/thread/75rhgh5cmx5bcv0thsqwq1pkw80f90cn

----

I had not checked the fix since in the mean time I had added

dns_query_restriction deny sa-trusted.bondedsender.org
dns_query_restriction deny bl.score.senderscore.com
dns_query_restriction deny sa-accredit.habeas.com

to /etc/spamassassin/local.cf (and anyway, the fix was not available
in Debian/stable).

But in a test with "spamc -R" on a Debian/unstable machine, I can
still see the issue:

 1.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                            query to Validity was blocked.  See
                            
https://knowledge.validity.com/hc/en-us/articles/20961730681243
                             for more information.
                         [217.70.182.74 listed in sa-trusted.bondedsender.org]
 1.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
                             Validity was blocked.  See
                            
https://knowledge.validity.com/hc/en-us/articles/20961730681243
                             for more information.
                            [217.70.182.74 listed in sa-accredit.habeas.com]
 1.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
                             Validity was blocked.  See
                            
https://knowledge.validity.com/hc/en-us/articles/20961730681243
                             for more information.
                            [217.70.182.74 listed in bl.score.senderscore.com]

This adds 3 points to the spam score!

I think that it would actually be better to disable the checks
by default.

-- System Information:
Debian Release: forky/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'stable-updates'), (500, 
'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates-debug'), 
(500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.7.12-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages spamassassin depends on:
ii  adduser                     3.154
ii  curl                        8.19.0-3
ii  libhtml-parser-perl         3.83-1+b2
ii  libhttp-date-perl           6.06-1
ii  libio-string-perl           1.08-4
ii  libmail-dkim-perl           1.20240923-1
ii  libnet-dns-perl             1.54-1
ii  libnetaddr-ip-perl          4.079+dfsg-2+b5
ii  libsocket6-perl             0.29-3+b4
ii  libsys-hostname-long-perl   1.5-3
ii  libwww-perl                 6.81-1
ii  perl [libarchive-tar-perl]  5.40.1-7
ii  w3m                         0.5.3+git20230121-2.3

Versions of packages spamassassin recommends:
ii  gnupg                      2.4.9-4
ii  libbsd-resource-perl       1.2911-2+b4
ii  libmail-dmarc-perl         1.20260301-1
ii  libmail-spf-perl           3.20250505-1
ii  perl [libsys-syslog-perl]  5.40.1-7
ii  sa-compile                 4.0.2-4
ii  spamc                      4.0.2-4

Versions of packages spamassassin suggests:
pn  libdbi-perl                   <none>
pn  libencode-detect-perl         <none>
pn  libgeoip2-perl                <none>
ii  libio-socket-ssl-perl         2.098-1
pn  libnet-patricia-perl          <none>
ii  perl [libcompress-zlib-perl]  5.40.1-7
pn  pyzor                         <none>
pn  razor                         <none>

-- no debconf information

-- 
Vincent Lefèvre <[email protected]> - Web: <https://www.vinc17.net/>
100% accessible validated (X)HTML - Blog: <https://www.vinc17.net/blog/>
Work: CR INRIA - computer arithmetic / Pascaline project (LIP, ENS-Lyon)

Reply via email to