I guess I am an anomaly because of my attitude toward weighted scoring. I view it as inadequate, because it leaves unresolved uncertainty.
I figure that a negative score is a warning that the message may be malicious, with a probability that is roughly proportional to the score. So higher scores deserve quicker review to investigate the ambiguity. But without review, I have not done my job.
If message review confirms that a message is malicious, then the entity responsible for the message is malicious, and the malicious source can be expected to use different attack strategies over time. So if a message is confirmed malicious, my job is to determine the identifiers that represent the responsible entity, and then create block rules on those identifiers. This ensures that all future attacks from the malicious source will be blocked, not just attacks of the same type as the first message.
Similarly, if message review confirms that the message is harmless and from a wanted sender, then a whitelist rule is needed to ensure that future messages from that source will be allowed. That rule must ensure that an impersonator cannot benefit from the whitelist entry, so it must include at least one identifier that can be verified. Most of my frustration with available products is the inability to create a whitelist rule with multiple factors, to accomplish this requirement.
For example, if "Example,Com" produces SPF NONE or SPR PERMERROR, and I verify that legitimate messages are coming from "appriver,com", then I need to create an allow rule like this:
- If the HELO name ends with "appriver.com",
- and the HELO name is verified using forward-confirmed DNS,
- and the Mail From address is "example.com"
- Then treat the message as equivalent to SPF PASS