ah, wait, are you saying that BombRe will look at headers that ASSP ads,
like X-ASSP-DKIM-Identity (which would only be added for a valid
signature)?   (!!!!!)  I always assumed that the bomb functionality was
only on the mail's original headers.

On Mon, Nov 8, 2021 at 2:28 PM K Post <nntp.p...@gmail.com> wrote:

> The bombHeaderRe with the DEFINE or list should be sufficient.  I'm still
> worried about fake/invalid DKIM still getting the bonus score, but this
> will have to do.  Thanks.
>
> On Mon, Nov 8, 2021 at 12:01 PM Thomas Eckardt <thomas.ecka...@thockar.com>
> wrote:
>
>> I told you to score such domains elsewhere - just do it and the result is
>> the same like you wanted.
>>
>> for example:
>>
>> bombHeaderRe:
>>
>> \nDKIM-Signature:(?:[ \t]*[^= \;]+=[^= \;]+\;(?:\r\n)?)+?[ \t]*([di]=\@?(
>> The_Wanted_IDENTITY))\;=>the_wanted_negative_score
>>
>> currently the (?(DEFINE).......) is not working with assp (is destroyed
>> if a-d-n-o-r is not set for the file) - but the next version will do it  -
>>   and you can use:
>>
>> (?(DEFINE)(?<IDENTITY10>the_wanted_identity|ident2|ident3|......))\nDKIM-Signature:(?:[
>> \t]*[^= \;]+=[^= \;]+\;(?:\r\n)?)+?[ 
>> \t]*([di]=\@?(?&IDENTITY10))\;=>the_wanted_negative_score
>> - e.g. -10
>> (?(DEFINE)(?<IDENTITY20>the_wanted_identity|ident5|ident6|......))\nDKIM-Signature:(?:[
>> \t]*[^= \;]+=[^= \;]+\;(?:\r\n)?)+?[ 
>> \t]*([di]=\@?(?&IDENTITY20))\;=>the_wanted_negative_score
>> - eg -20
>> ...
>>
>> CLOSED for me
>>
>>
>> Thomas
>>
>>
>>
>> Von:        "K Post" <nntp.p...@gmail.com>
>> An:        "ASSP development mailing list" <
>> assp-test@lists.sourceforge.net>
>> Datum:        05.11.2021 20:03
>> Betreff:        Re: [Assp-test] Another Concept Question:
>> DKIMBousScoreList
>> ------------------------------
>>
>>
>>
>> Having the dkimBonusScoreList would be like applying
>> dkimBonusValancePB but ONLY for those that DKIM validate AND are on the
>> scorelist.  Here's why I think that would be helpful and what you proposed
>> could be problematic.  Essentially: I'm thinking: "look, this organization
>> usually sends good stuff, but not always.  They might also have people
>> sending non-dkim signed messages through a myriad of channels.  Deal with
>> them separately, but if we KNOW it's from them because of their DKIM
>> signature, help that message get through with the idea that it'll be
>> stored in okmail unless whitelisted through something other than dkim."
>>
>> > there is already dkimOkValencePB - increase it
>> But a high percentage of all messages that are received, spam and not,
>> have valid signatures.  I don't think we should use that to give a bonus
>> regardless of who the signer is.  All gmail messages are signed, almost
>> everyting from office365.  Yes, I could do a univieral bonus then reduce
>> gmail and onmicroosft.com, but that doesn't get 365 users with their own
>> signatures and all of the millions of other domains out there.
>>
>> It was one thing when DKIM signing was a new concept and only legit
>> businesses signed messages.  Now that most senders are signing, giving  a
>> bonus would let an awful lot of spam slip through under the rejection
>> scoring threshold.
>>
>> >reduce the score for certain domains by blackListedDomains, SenderBase
>> or anywhere else - if needed
>> Senderbase won't work for those using AWS as an example - too many
>> spammers use them, so adding to senderbase can't be negated using
>> blacklist/bombs, etc because I obviously don't know all of the bad senders
>> using AWS.
>>
>> I could reduce the score based on a BombRe match on squaremktg, but then
>> I'm reducing when I haven't validated the signature.  It would probably
>> work for this specific example, but it would be generally helpful to be
>> able to reduce the score on a message based solely on the signature when
>> I'm sure they're actually the sender   Dare I say that I'm in love with
>> DKIM?
>>
>> Would it be life changing like DoDKIMWLAddresses?  No absolutely not, but
>> if it's not a major task to add the functionality, I think there would be
>> wide appeal.
>>
>> I >>almost<< want to suggest that the dkimBonusValancePB feature be
>> removed altogether.  I can't think of a scenario where you'd want to give a
>> bonus universally just because a message has a valid signature from
>> anyone.  Same thing for the SPF pass bonus and it's default of -10!!!  I'm
>> sure there are people using one or both, I just can't think of a
>> scenario in which it's a good idea.
>>
>>
>>
>>
>> On Fri, Nov 5, 2021 at 10:37 AM Thomas Eckardt <
>> *thomas.ecka...@thockar.com* <thomas.ecka...@thockar.com>> wrote:
>> Another useless post about concepts without reading the manual.
>>
>> >dkimBonusValancePB
>>
>> there is already dkimOkValencePB - increase it
>>
>> and
>>
>> reduce the score for certain domains by blackListedDomains, SenderBase or
>> anywhere else - if needed
>>
>> Thomas
>>
>>
>>
>>
>>
>> Von:        "K Post" <*nntp.p...@gmail.com* <nntp.p...@gmail.com>>
>> An:        "ASSP development mailing list" <
>> *assp-test@lists.sourceforge.net* <assp-test@lists.sourceforge.net>>
>> Datum:        04.11.2021 22:38
>> Betreff:        [Assp-test] Another Concept Question: DKIMBousScoreList
>> ------------------------------
>>
>>
>>
>>
>> SUMMARY: Would there be benefit (that wouldn't be terrible to code) in
>> adding the ability for use to assign a score to emails that match a list of
>> DKIM signature identities?
>>
>>
>> The DKIMWLAddress and DKIMNPAddress functionality has been an absolute
>> game changer here.  Thank you so much for implementing that (it was my
>> idea, but we all know that I could never code such a thing).
>>
>> I've combined that functionality with closely monitored SenderBase lists
>> to dramatically improve ASSP's accuracy.
>>
>> One place where Senderbase shines is it's scoring ability for bulk
>> senders.  For example, I can give anything that Senderbase says is coming
>> from constant contact's network a -10 score, by adding it into
>> whiteSenderBase like
>> ^constantcontact\.com$=>-10
>> I don't want to blindly let through constant contact signed messages, but
>> if it's coming from their network, make it a little easier for messages to
>> pass through. That's worked well for a long long time.
>>
>>
>> Recently, I'm seeing several bulk senders having legitimate messages DKIM
>> signed by the bulk sender them, but being sent through Amazon AWS (
>> *amazonses.com* <http://amazonses.com/>) and is classified by senderbase
>> as being Amazon / *amazonses.com* <http://amazonses.com/>.  There's a
>> lot of volume coming in from *amazonses.com* <http://amazonses.com/>,
>> but unfortunately, it's a mix of perfectly legitimate messages and others
>> that are pure garbage.  So that takes Senderbase off the table.  Coming
>> from amazonses shouldn't impact the score either way.  And I can't
>> DKIMWLAddress the signature, then bad stuff would absolutely get through.
>>
>> An example is Square, the credit card processor and software company.
>> They send mail, DKIM signed @*squaremktg.com* <http://squaremktg.com/>
>> on behalf of clients.  Most mail from square is good, but sometimes it gets
>> spammy, just like we see with mail from other bulk senders.  Real world, I
>> paid for a car wash using their mobile payment platform, I received the
>> receipt and later got an email with a promotion from the car wash.  All
>> good.  The provider's signature was in DKIMWLAddresses.  Today, I received
>> an advertisement from them for what is apparently a "gentleman's club" next
>> door, offering a complimentary car wash (I took that literally) for
>> visiting the establishment.  The language in that email would have
>> absolutely had it rejected if it hadn't been on DKIMWLAddresses.  Worse, it
>> wound up in the not-spam corpus.
>>
>>
>> So, I'd like for certain DKIM signatures to be able to SCORE.  DKIM
>> scoring would help it get through (or make it harder depending on the
>> score) without automatically passing it and adding it to the corpus like
>> DKIMWLAddresses does.   That would let me give the message a negative score
>> based on the DKIM but still let Bayesian/HMM and other features stay in
>> play to score the message further.
>>
>> Conceptually, I could see this working similarly to senderbase.  There
>> would be a default valance like
>> dkimBonusValancePB
>> set to a default of -25
>>
>> Then we'd have a list, maybe called DKIMBousScoreList.  Like
>> DKIMWLAddresses, it would match the end of the validated DKIM identity, but
>> also accepts a score override:
>> (@|.)*squaremktg.com* <http://squaremktg.com/>    <--- gets the default
>> of -25
>> (@|.)someUsuallyOKsigner.com=>-12    <-- gets -12 for a score
>> (@|.)*prettygood.com* <http://prettygood.com/>=>5
>> <--- gets 1/5 of the default -25   -25/5 = -5
>> (@|.)UsuallyBad.com=>-5                      <-- this isn't a bonus, a
>> negative default divided by a negative is a positive.  it will be -25/-5 or
>> adding 5 to the score
>>
>>
>> From a management standpoint, it would certainly be easier to "just" be
>> able to assign an optional 2nd parameter to DKIMWLAddresses that would
>> score instead of whitelisting, but I feel like that could be too big of a
>> coding project.
>>
>> I tried to come up with a way to accomplish the same thing based on DKIM
>> signature, but came up very short.  I know I could ignore DKIM and just
>> score based on the from line, but I really appreciate the certainty that
>> DKIM gives that the message is really from that organization.
>>
>> What do you think?  Would a  DKIMBousScoreList feature have universal
>> appeal?
>>
>> _______________________________________________
>> Assp-test mailing list
>> *Assp-test@lists.sourceforge.net* <Assp-test@lists.sourceforge.net>
>> *https://lists.sourceforge.net/lists/listinfo/assp-test*
>> <https://lists.sourceforge.net/lists/listinfo/assp-test>
>>
>>
>>
>>
>> DISCLAIMER:
>> *******************************************************
>> This email and any files transmitted with it may be confidential, legally
>> privileged and protected in law and are intended solely for the use of the
>> individual to whom it is addressed.
>> This email was multiple times scanned for viruses. There should be no
>> known virus in this email!
>> *******************************************************
>>
>> _______________________________________________
>> Assp-test mailing list
>> *Assp-test@lists.sourceforge.net* <Assp-test@lists.sourceforge.net>
>> *https://lists.sourceforge.net/lists/listinfo/assp-test*
>> <https://lists.sourceforge.net/lists/listinfo/assp-test>
>> _______________________________________________
>> Assp-test mailing list
>> Assp-test@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/assp-test
>>
>>
>>
>>
>> DISCLAIMER:
>> *******************************************************
>> This email and any files transmitted with it may be confidential, legally
>> privileged and protected in law and are intended solely for the use of the
>> individual to whom it is addressed.
>> This email was multiple times scanned for viruses. There should be no
>> known virus in this email!
>> *******************************************************
>>
>> _______________________________________________
>> Assp-test mailing list
>> Assp-test@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/assp-test
>>
>
_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test

Reply via email to