Re: Undelivered Mail Returned to Sender

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



[cc linux-xfs so that I don't get accused of sending private replies to
patch submissions]

On Thu, Jan 14, 2021 at 01:20:46PM -0800, John 'Warthog9' Hawley wrote:
> So I'm not sure how this isn't self explanatory: the message tripped the
> bayesian spam filter used on vger.

Yes, the fact that a bayesian spam filter was tripped is obvious, but
the question is, what sort of training data was put into the bayesian
filter such that it tripped?  And what has that model internalized?

> The ascii armoured gpg key is likely what tripped it up as that just
> looks like a big blob of data to the filter, likely similar to a base64
> encoded block and it decided that it was likely spam as a result.

There we go ^^^, that's the kind of insight I was looking for.  I'm a bit
surprised that it triggered on my *reply*, seeing as it let the original
through:

https://lore.kernel.org/linux-xfs/20210114183747.2507-2-bastiangermann@xxxxxxxxxxx/T/#u

> Just because it was sent through kernel.org doesn't bypass the spam
> filter.
> 
> As the bounce suggests, if you save the message and send it to us as an
> attachment we can use it to help train the filter so it doesn't trigger
> on that in the future.

OK, I'll resend the message as an attachment....

--D

> - John 'Warthog9' Hawley
> 
> On 1/14/21 1:02 PM, Darrick J. Wong wrote:
> > Um, hi.  I sent this message through kernel.org; why does that get
> > bounced by vger?  "Bayes statistical bogofilter" doesn't help diagnose
> > this...
> > 
> > --D
> > 
> > On Thu, Jan 14, 2021 at 08:42:33PM +0000, Mail Delivery System wrote:
> >> This is the mail system at host mail.kernel.org.
> >>
> >> I'm sorry to have to inform you that your message could not
> >> be delivered to one or more recipients. It's attached below.
> >>
> >> For further assistance, please send mail to postmaster.
> >>
> >> If you do so, please include this problem report. You can
> >> delete your own text from the attached returned message.
> >>
> >>                    The mail system
> >>
> >> <linux-xfs@xxxxxxxxxxxxxxx>: host vger.kernel.org[23.128.96.18] said: 550 5.7.1
> >>     Content-Policy accept-into-freezer-1 msg: Bayes Statistical Bogofilter
> >>     considers this message SPAM.  BF:<S 1>  In case you disagree, send the
> >>     ENTIRE message plus this error message to <postmaster@xxxxxxxxxxxxxxx> ;
> >>     S1726461AbhANUmc (in reply to end of DATA command)
> > 
> >> Reporting-MTA: dns; mail.kernel.org
> >> X-Postfix-Queue-ID: BCE3A23A9D
> >> X-Postfix-Sender: rfc822; djwong@xxxxxxxxxx
> >> Arrival-Date: Thu, 14 Jan 2021 20:41:51 +0000 (UTC)
> >>
> >> Final-Recipient: rfc822; linux-xfs@xxxxxxxxxxxxxxx
> >> Original-Recipient: rfc822;linux-xfs@xxxxxxxxxxxxxxx
> >> Action: failed
> >> Status: 5.7.1
> >> Remote-MTA: dns; vger.kernel.org
> >> Diagnostic-Code: smtp; 550 5.7.1 Content-Policy accept-into-freezer-1 msg:
> >>     Bayes Statistical Bogofilter considers this message SPAM.  BF:<S 1>  In
> >>     case you disagree, send the ENTIRE message plus this error message to
> >>     <postmaster@xxxxxxxxxxxxxxx> ; S1726461AbhANUmc
> > 
> >> Date: Thu, 14 Jan 2021 12:41:51 -0800
> >> From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
> >> To: Bastian Germann <bastiangermann@xxxxxxxxxxx>
> >> Cc: linux-xfs@xxxxxxxxxxxxxxx
> >> Subject: Re: [PATCH 1/6] debian: cryptographically verify upstream tarball
> >>
> >> On Thu, Jan 14, 2021 at 07:37:42PM +0100, Bastian Germann wrote:
> >>> Debian's uscan utility can verify a downloaded tarball. As the
> >>> uncompressed tarball is signed, the decompress rule has to be applied.
> >>
> >> Er.... whose key is below?  Eric Sandeen's, I guess?
> >>
> >> (Please state where this keyblock came from in the commit message...)
> >>
> >> --D

<the rest of the message is snipped>



[Index of Archives]     [XFS Filesystem Development (older mail)]     [Linux Filesystem Development]     [Linux Audio Users]     [Yosemite Trails]     [Linux Kernel]     [Linux RAID]     [Linux SCSI]


  Powered by Linux