Re: [Mimedefang] Re: VERY Newbie Question

2004-10-29 Thread Jeff Rife
On 30 Oct 2004 at 0:16, David F. Skoll wrote:

> > ...and the RFC pretty clearly says that an IP address should *never* be
> > used as the argument to HELO, so that rule *should* reject all e-mail.
> 
> Umm... reread his code.

Maybe you should?

This is his test:
  if ($ip ne $helo)

$ip is *always* of the form ###.###.###.###.

$helo can *never* be of that form *if* the connecting machine follows 
the RFC...it must be either foobar.domain.tld or [###.###.###.###].

So, if everybody followed RFC, that test can never be true, thus it 
will reject all mail.

As you said, it will only reject *almost* all e-mail, because a few 
machines don't follow RFC.


--
Jeff Rife|  Sam: What d'ya say to a beer, Normie? 
SPAM bait:   |  
[EMAIL PROTECTED] | Norm: Hi, sailor...new in town? 
[EMAIL PROTECTED] |  


___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


RE: [Mimedefang] VERY Newbie Question

2004-10-29 Thread Alexander Dalloz
Am Sa, den 30.10.2004 schrieb Kevin A. McGrail um 5:29:

> > To speak freely, a 
> > mail server administrator who does not setup his server 
> > properly, means the server hostname / IP fits both the 
> > forward and reverse DNS entries, is responsible himself if 
> > his wrong setup leads to rejected mails. 
> 
> I disagree whole-heartedly with this statement.  Virtual hosters and
> companies with multiple corporate entities using one mail server is just one
> of the very legitimate reasons for this.  I would also put forth that the
> concept of any security methodology based on reverse DNS seems highly
> antiquated.

Sorry, I did not vote for rejecting based on a missing reverse DNS
entry. No RFC states that such an entry is required for an MTA. But I
really see no reason why the forward DNS entry and the hostname of a
constant, legitimate mail server should differ.

> KAM

Back to the HELO check in filter_sender: to be less restrictive you can
check whether the HELO says to be the recipient host's name/IP.

Alexander


-- 
Alexander Dalloz | Enger, Germany | GPG key 1024D/ED695653 1999-07-13
Fedora GNU/Linux Core 2 (Tettnang) kernel 2.6.8-1.521smp 
Serendipity 06:07:29 up 10 days, 2:47, load average: 0.15, 0.31, 0.81 

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] X-Scanned-By: MIMEDefang 2.48 on 127.0.0.1

2004-10-29 Thread David F. Skoll
On Fri, 29 Oct 2004, Mike Atkinson wrote:

> 2 of them are adding an X-Scanned-By header with 127.0.0.1 showing as
> the IP in the header while the other 2 are showing the correct IP that
> the message was received on.

Do the two that think they're 127.0.0.1 have proper host names that resolve
to a real IP address?

The algorithm that adds the IP address works like this:

1) If the Sendmail macro ${if_addr} is not 127.0.0.1, use that.

2) Otherwise, use whatever gethostbyname(gethostname()) returns as the
   machine's IP address.

--
David
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Re: VERY Newbie Question

2004-10-29 Thread David F. Skoll
On Fri, 29 Oct 2004, Jeff Rife wrote:

> On 29 Oct 2004 at 15:01, David F. Skoll wrote:
>
> > > elsif ($ip ne $helo){
> > > return ('REJECT', "You are not who you say you are.")
> > > }
> >
> > That will reject 99.999% of all your e-mail.  Most machines use the
> > machine name in HELO, not an IP address, so...

> ...and the RFC pretty clearly says that an IP address should *never* be
> used as the argument to HELO, so that rule *should* reject all e-mail.

Umm... reread his code.

Regards,

David.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


RE: [Mimedefang] VERY Newbie Question

2004-10-29 Thread Kevin A. McGrail
> To speak freely, a 
> mail server administrator who does not setup his server 
> properly, means the server hostname / IP fits both the 
> forward and reverse DNS entries, is responsible himself if 
> his wrong setup leads to rejected mails. 

I disagree whole-heartedly with this statement.  Virtual hosters and
companies with multiple corporate entities using one mail server is just one
of the very legitimate reasons for this.  I would also put forth that the
concept of any security methodology based on reverse DNS seems highly
antiquated.

But, I also believe firmly that not penalizing legitimate email should be
significantly more important than SPAM proliferation as much as I hate SPAM.
False Positives are 100x worse then SPAM.

Regards,
KAM

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] VERY Newbie Question

2004-10-29 Thread Alexander Dalloz
Am Fr, den 29.10.2004 schrieb Yang Xiao um 18:10:

> Won't this check generate a lot of false positive if the sending host
> has a hostname that's different from it's public DNS name? I have had
> several mailhost like this in places I've worked before, it's not
> because we are lazy or careless, but because it's very hard to change
> the hostnmae for various reasons.

I see only spam attempts being rejected. To speak freely, a mail server
administrator who does not setup his server properly, means the server
hostname / IP fits both the forward and reverse DNS entries, is
responsible himself if his wrong setup leads to rejected mails. In times
where SPF and other methods to reduce spam delivery I feel it is a
central job to take care a mail server can't be mistreated as a
suspicious machine.

> But as to my problem, I just want to stop anybody from sending to the
> mail gateway as local domain users because it's a incoming spam filter
> mail host. I guess I would just need to check for MAIL FROM header
> somewhere? But where should I implement this check in MIMEdefang? and
> do you see any senario that it will break anything?

From your more recent posting I see you are on the right way. You will
have to think which parameter combinations ($sender, $recipient, $helo,
$ip, ...) do fulfill requirements for a scenario you want to block by
rejecting the mail. filter_recipient in the mimedefang-filter would be a
proper place to do so. See "man 5 mimedefang-filter". It is an example
for a very good man page and has examples. You can find a lot of other
code when going through this list's archive. 

> Yang

Alexander


-- 
Alexander Dalloz | Enger, Germany | GPG key 1024D/ED695653 1999-07-13
Fedora GNU/Linux Core 2 (Tettnang) kernel 2.6.8-1.521smp 
Serendipity 04:31:57 up 10 days, 1:11, load average: 0.38, 0.45, 0.44 


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Re: VERY Newbie Question

2004-10-29 Thread Jeff Rife
On 29 Oct 2004 at 15:01, David F. Skoll wrote:

> > elsif ($ip ne $helo){
> > return ('REJECT', "You are not who you say you are.")
> > }
> 
> That will reject 99.999% of all your e-mail.  Most machines use the
> machine name in HELO, not an IP address, so...

...and the RFC pretty clearly says that an IP address should *never* be 
used as the argument to HELO, so that rule *should* reject all e-mail.




--
Jeff Rife|  
SPAM bait:   | http://www.nabs.net/Cartoons/Dilbert/Evaluation.jpg 
[EMAIL PROTECTED] |  
[EMAIL PROTECTED] |  


___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] filter_relay

2004-10-29 Thread David F. Skoll
On Fri, 29 Oct 2004, David Hiebert wrote:

> I was more concerned with the first problem/question though.  No matter
> how I format the return('REJECT'), the $msg isn't passed to sendmail.

That's odd; it works for me.  Are you going by Sendmail logs, or actually
telnetting in on port 25 to simulate an SMTP session?  (The logs are
unreliable; try modifying your filter for test purposes to refuse mail from
a host you control, and simulate an SMTP session.)

Regards,

David.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] filter_relay

2004-10-29 Thread David Hiebert

On Fri, 29 Oct 2004, David F. Skoll wrote:

> Date: Fri, 29 Oct 2004 21:41:44 -0400 (EDT)
> From: David F. Skoll <[EMAIL PROTECTED]>
> Reply-To: [EMAIL PROTECTED]
> To: [EMAIL PROTECTED]
> Subject: Re: [Mimedefang] filter_relay
>
> On Fri, 29 Oct 2004, David Hiebert wrote:
>
> > My second question/problem is the 3 commented out lines.  The man page for
> > mimedefang-filter indicates that if an IP has no reverse dns, then
> > $hostname is a duplicate of $hostip.  This then should make a real quick
> > and easy check for no reverse, however the if statement (when not
> > commented) never seems to be true.
>
> My mistake, the man page is wrong.  If $hostip is 1.2.3.4 and has no
> reverse DNS lookup, then $hostname is [1.2.3.4].  That is:
>
>   if ($hostname eq "[$hostip]") {
>   # You have no reverse DNS
>   }
>
> However, I question the wisdom of rejecting mail from machines with no
> reverse DNS.  I'm not convinced it will block bad mail more often than
> good.
>
> --
> David.
> ___
> Visit http://www.mimedefang.org and http://www.canit.ca
> MIMEDefang mailing list
> [EMAIL PROTECTED]
> http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
>


David,
I appreciate your response, and agree with your opinion in part.  I
believe that it will block some legitimate mail, however larger ISP's are
already blocking based on this rule, which essentially forces smaller
ISP's with poorly configured DNS to get their act together.

I was more concerned with the first problem/question though.  No matter
how I format the return('REJECT'), the $msg isn't passed to sendmail.
Also, upon further testing, the $smtp_dsn, and $code are not passed
either, however the $delay is being passed.  Any ideas, or any more
information that I can provide to assist?



David Hiebert
Keyway Internet Services
909-933-3699

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] filter_relay

2004-10-29 Thread David F. Skoll
On Fri, 29 Oct 2004, David Hiebert wrote:

> My second question/problem is the 3 commented out lines.  The man page for
> mimedefang-filter indicates that if an IP has no reverse dns, then
> $hostname is a duplicate of $hostip.  This then should make a real quick
> and easy check for no reverse, however the if statement (when not
> commented) never seems to be true.

My mistake, the man page is wrong.  If $hostip is 1.2.3.4 and has no
reverse DNS lookup, then $hostname is [1.2.3.4].  That is:

if ($hostname eq "[$hostip]") {
# You have no reverse DNS
}

However, I question the wisdom of rejecting mail from machines with no
reverse DNS.  I'm not convinced it will block bad mail more often than
good.

--
David.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] filter_relay

2004-10-29 Thread David Hiebert
I am attempting to reject mail for ip's with no reverse DNS (not
mismatched forward/reverse.)  The below filter_relay works, however it is
not passing the $msg for return(REJECT) to sendmail (or maybe sendmail
isn't picking it up?)  The maillog reports: "sm-mta[82794]:
i9U00cCx082794: Milter: connect: host=[216.117.199.248],
addr=216.117.199.248, rejecting commands" for IP's without reverse, and
successfully sends with reverse.

My second question/problem is the 3 commented out lines.  The man page for
mimedefang-filter indicates that if an IP has no reverse dns, then
$hostname is a duplicate of $hostip.  This then should make a real quick
and easy check for no reverse, however the if statement (when not
commented) never seems to be true.


use Net::DNS;
sub filter_relay () {
my ($hostip, $hostname) = @_;
my $res   = Net::DNS::Resolver->new;
my $query = $res->search($hostip);

#if ($hostip eq $hostname) {
#return ('TEMPFAIL',"Please fix your reverse DNS before sending us mail.");
#}

if ($query) {
$query->answer;
}

$response=$res->errorstring;

if ($response eq 'NXDOMAIN') {
return ('REJECT', "Please fix your reverse DNS before sending us mail.", 550, 
5.7.1, 1);
}

return ('CONTINUE', "ok");

}





David Hiebert
Keyway Internet Services
909-933-3699
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] X-Scanned-By: MIMEDefang 2.48 on 127.0.0.1

2004-10-29 Thread Mike Atkinson
I've got 4 FreeBSD boxes running MIMEDefang.  All of them have multiple 
IP's assigned.

2 of them are adding an X-Scanned-By header with 127.0.0.1 showing as 
the IP in the header while the other 2 are showing the correct IP that 
the message was received on.

This is definitely not something to loose sleep over but does anyone 
have some thoughts on what might be causing this or how to find the cause?

--
 Mike Atkinson - [EMAIL PROTECTED]
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Easy way to scan for List-Id's

2004-10-29 Thread Ben Kamen
Thanks to all for the help.. I've had my head buried in:
RF schematics/Pcb's
HighSpeed Digital schematics/pcb's
Analog op-amp stuff...
Ugh.
My brain is fried.
What's my name again?
;)
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Easy way to scan for List-Id's

2004-10-29 Thread Kenneth Porter
--On Friday, October 29, 2004 2:48 PM -0500 Aleksandar Milivojevic 
<[EMAIL PROTECTED]> wrote:

Funny thing is, I'd wish none of the lists put [list] in Subject.  I'm
sorting lists in separate IMAP folders on the server, so it is kind of
reduntant and just wastes the space on the Subject line  ;-)
Same here, but one of my list users wants it because he reads mail from a 
dumb web client. And, alas, mailman lacks the option to make the 
"subject_prefix" a per-subscriber customization.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Easy way to scan for List-Id's

2004-10-29 Thread Kenneth Porter
--On Friday, October 29, 2004 2:15 PM -0500 Ben Kamen 
<[EMAIL PROTECTED]> wrote:

Since I'm on a couple of lists and wish they'd put [list] in the subject
line (and don't) is there an easy way to do this via MimeDefang? (this
way, every place I look at my mail doesn't have to have duplicate mail
filter setups.. it would just be done on the server..)
Most of the lists use the header "List-Id:"
Seems like that would be a job for procmail. Moreover, you can use procmail 
to centralize your filtering.

I didn't want to have to reload filters every time I changed mail clients 
or every time I looked at mail from a new location. So I set up IMAP 
(Dovecot on Fedora, originally UW-IMAP on Red Hat), and set up procmail 
filters to do all the filtering that I used to run on all my mail clients.

Here's a typical procmail "recipe":
:0 :
* ^List-Id:.*MIMEDefang
mail/Lists/Mail/MIMEDefang
The first line is a rule-start marker and a set of rule flags, in this case 
meaning lock the destination mailbox. The second line is the filter 
expression. The third is the destination for messages matching the 
expression, relative to the home directory.

Whenever I join a new list I just copy this sequence and edit to match the 
new list.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Easy way to scan for List-Id's

2004-10-29 Thread David F. Skoll
On Fri, 29 Oct 2004, Aleksandar Milivojevic wrote:

> > Most of the lists use the header "List-Id:"

> Funny thing is, I'd wish none of the lists put [list] in Subject.  I'm
> sorting lists in separate IMAP folders on the server, so it is kind of
> reduntant and just wastes the space on the Subject line  ;-)

Well, MIMEDefang can fix that! :-)

my $new_subj = $Subject;
$new_subj =~ s/^\[.*\]\s+//;
action_change_header("Subject", $new_subj) if $new_subj ne $Subject;

For Ben's case, you want to pull out the List-ID: header and call
action_change_header("Subject", "[$listname] $Subject");

--
David.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Easy way to scan for List-Id's

2004-10-29 Thread Aleksandar Milivojevic
Ben Kamen wrote:
Since I'm on a couple of lists and wish they'd put [list] in the subject 
line (and don't) is there an easy way to do this via MimeDefang? (this 
way, every place I look at my mail doesn't have to have duplicate mail 
filter setups.. it would just be done on the server..)

Most of the lists use the header "List-Id:"
Funny thing is, I'd wish none of the lists put [list] in Subject.  I'm 
sorting lists in separate IMAP folders on the server, so it is kind of 
reduntant and just wastes the space on the Subject line  ;-)

Anyhow, if you are using IMAP, it might be easier to just use procmail 
or sieve (depending on IMAP server you use) to sort mailing lists into 
separate folders.  That way, from wherever you look your mail, you get 
same view of it, and you manage filtering at single spot (the mail 
server itself).

If you still want to add tags to Subject, you can do it in MIMEDefang. 
You can change Subject line in filter_end.  Use 
$entity->head->get("List-Id") to check for headers, and if found rewrite 
Subject line to contain appropriate tag.  You might want to remove tag 
from emails that you send out in other not to pollute mailing lists that 
I'm subscribe to ;-).  And you'll need to handle 'Re: ' and similar 
prefixes, and make sure you don't add tag if it is already there.

BTW, wanted to send to you directly instead of mailing list (original 
reply didn't had MIMEDefang part), but you completely blocked off my ISP 
(GT).  Actually, after that guy from US who blocked entire ".ca" domain 
because of spam, you are the first one who bounced my mail back, eh ;-)

--
Aleksandar Milivojevic <[EMAIL PROTECTED]>Pollard Banknote Limited
Systems Administrator   1499 Buffalo Place
Tel: (204) 474-2323 ext 276 Winnipeg, MB  R3T 1L7
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] Easy way to scan for List-Id's

2004-10-29 Thread Ben Kamen
Since I'm on a couple of lists and wish they'd put [list] in the subject line 
(and don't) is there an easy way to do this via MimeDefang? (this way, every 
place I look at my mail doesn't have to have duplicate mail filter setups.. it 
would just be done on the server..)

Most of the lists use the header "List-Id:"
Just wondering,
 -Ben
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Adding virus scanning after MIMEDefang installation

2004-10-29 Thread Kenneth Porter
--On Friday, October 29, 2004 1:27 PM -0500 Aleksandar Milivojevic 
<[EMAIL PROTECTED]> wrote:

I'm not sure if you are going to need to reinstall MIMEDefang.
Nope. I install MD by RPM and the RPM is built to disable all virus 
scanners. One then selectively enables them in mimedefang-filter by setting 
a feature variable. My mimedefang-filter contains this:

# manually override compile-time features, clamd is installed
$Features{'Virus:CLAMD'} = 1;
$ClamdSock  = "/var/run/clamav/clamd.sock";
The rest of your instructions match my understanding. I make clamav and 
defang members of each others' group.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Re: VERY Newbie Question

2004-10-29 Thread David F. Skoll
On Fri, 29 Oct 2004, Yang Xiao wrote:

> sub filter_sender {
> my ($sender, $ip, $hostname, $helo) = @_;
> return('CONTINUE', "OK") if ($ip eq "127.0.0.1");
> if ($helo =~ /mydomain\.com$/i) {
> return ('REJECT', "We Don't Like Spammers, Go Away!!!.");
> }

That's a good rule.

> elsif ($ip ne $helo){
> return ('REJECT', "You are not who you say you are.")
> }

That will reject 99.999% of all your e-mail.  Most machines use the
machine name in HELO, not an IP address, so...

--
David.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] Killing slaves after max number of requests is processed

2004-10-29 Thread Aleksandar Milivojevic
While I was running MIMEDefang 2.46, I've noticed in logs that if max 
requests per slave is set to 500, that slaves do not exit normally, and 
must be killed with SIGTERM ten seconds later.  This was happening every 
time slave gets to 500 requests and is instructed to exit.

After I decreased it to 100 (and upgraded to 2.47), all seems to work 
normal.  Mimedefang-multiplexor doesn't need to send SIGTERM to the 
slave anymore.  I don't see anything in changelog mentioning this, so I 
guess what helped was lowering max requests to 100.  10 seconds for the 
slave to exit seems reasonable, so I haven't attempted to experiment 
with that.

Anybody else seeing this?
--
Aleksandar Milivojevic <[EMAIL PROTECTED]>Pollard Banknote Limited
Systems Administrator   1499 Buffalo Place
Tel: (204) 474-2323 ext 276 Winnipeg, MB  R3T 1L7
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Re: VERY Newbie Question

2004-10-29 Thread Yang Xiao
OK, this what I have came up with so far,.
1. Check for anybody claims to be from mydomain.com in the HELO Line
2. Check for RCPT TO anyone in mydomain.com
3. $helo doesn't match $ip

#***
# %PROCEDURE: filter_recipient
# %DESCRIPTION:
#  Check whether HELO claims to be from internal domain and reverse DNS
#   lookup doesn't check
#***
sub filter_sender {
my ($sender, $ip, $hostname, $helo) = @_;
return('CONTINUE', "OK") if ($ip eq "127.0.0.1");
if ($helo =~ /mydomain\.com$/i) {
return ('REJECT', "We Don't Like Spammers, Go Away!!!.");
}
elsif ($ip ne $helo){
return ('REJECT', "You are not who you say you are.")
}
else {
return ('CONTINUE',"OK");
}
}

#***
# %PROCEDURE: filter_recipient
# %DESCRIPTION:
#  Check whether MAIL FROM claims to be from internal domain
#***
sub filter_recipient {
my ($recipient, $sender, $ip, $hostname, $first, $helo,
$rcpt_mailer, $rcpt_host, $rcpt_addr) = @_;
if ($sender =~ /[EMAIL PROTECTED]>?$/i) {
return ('REJECT', "Service Not Available.");
}
return ('CONTINUE',"ok");
}


I'm just concerned about the reverse dns lookup would reject too many
legit emails.


Many Thanks,

Yang
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Adding virus scanning after MIMEDefang installation

2004-10-29 Thread Aleksandar Milivojevic
Mark Osbourne wrote:
From what I can tell, it looks like I probably need to update
/usr/bin/mimedefang.pl and change $Features{'Virus:CLAMD'} so that it is
set to 1 and make sure that the clamd processes is running as the defang
user and writing it's socket in /var/spool/MIMEDefang/clamd.sock.
I'm not sure if you are going to need to reinstall MIMEDefang.
However, documentation for MIMEDefang is proposing some not needed 
changes for it to interoperate with ClamAV.  I don't know why.

All clamd needs is read access to the file that it is supposed to scan. 
 That can be done by adding user clamav (that clamd is running under) 
to group defang (/var/spool/MIMEDefang is owned and readable by group 
defang, if not than make it that way).

Also you don't need to change ClamAV socket.  Actually, you can't 
because /var/spool/MIMEDefang will not be writtable for clamd.  You can 
leave it at its default value (/var/run/clamav/clamd.sock) and use 
$ClamdSock variable in mimedefang-filter to point MIMEDefang to the 
right place.

That way you will achieve:
- two daemon processes (MIMEDefang and ClamAV) will be separated, which 
is nice from security point of view

- you run ClamAV in more or less default mode, which makes it easier to 
maintain

- makes it possible to use clamd from other appliactions 
(/var/spool/MIMEDefang is not world accessible, /var/run/clamav is world 
accessible)

IMHO, this is better and much cleaner configuration than the one 
proposed by MIMEDefang documentation.

--
Aleksandar Milivojevic <[EMAIL PROTECTED]>Pollard Banknote Limited
Systems Administrator   1499 Buffalo Place
Tel: (204) 474-2323 ext 276 Winnipeg, MB  R3T 1L7
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] /etc/sysconfig/mimedefang option questions

2004-10-29 Thread Jeff Rife
On 29 Oct 2004 at 13:03, Rich West wrote:

> In the /etc/sysconfig/mimedefang file, there are the following options:
> 
> # If "yes", turn on the multiplexor relay checking function
> # MX_RELAY_CHECK=yes

Calls "filter_relay" in mimedefang-filter, if it exists.

> # If "yes", turn on the multiplexor sender checking function
> # MX_SENDER_CHECK=yes

Calls "filter_sender" in mimedefang-filter, if it exists.

> # If "yes", turn on the multiplexor recipient checking function
> # MX_RECIPIENT_CHECK=yes

Calls "filter_recipient" in mimedefang-filter, if it exists.


--
Jeff Rife| "Grab a shovel...I'm only one skull 
SPAM bait:   |  short of a Mouseketeer reunion." 
[EMAIL PROTECTED] |  
[EMAIL PROTECTED] | -- Bender, "Futurama" 


___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] filter_bad_name and virus check

2004-10-29 Thread Davide Vaghetti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Davide Vaghetti wrote:
| Do someone know how to the antivirus check before filter_bad_filename() ?
|
the original question was "Do someone know how to execute the antivirus
check before filter_bad_filename() ?"
sorry for the typo
bye
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
- --
Davide Vaghetti
University of Pisa NOC - Centro SerRA
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFBgngRxKJAsKiy+1ARArtCAJ97es7h0SRDFRml09q3+rL/gUhn2QCfb3xh
hd3p5dj8NxVkVmIBdwGqZlU=
=0B+L
-END PGP SIGNATURE-
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] /etc/sysconfig/mimedefang option questions

2004-10-29 Thread Rich West
In the /etc/sysconfig/mimedefang file, there are the following options:
# If "yes", turn on the multiplexor relay checking function
# MX_RELAY_CHECK=yes
# If "yes", turn on the multiplexor sender checking function
# MX_SENDER_CHECK=yes
# If "yes", turn on the multiplexor recipient checking function
# MX_RECIPIENT_CHECK=yes
What *exactly* do each of these do?
I enabled them even though I am doing sender and recipient checks 
(rudimentary) within mimedefang-filter, but I'm curious to know if I 
just enabled something that was going to potentially block valid email.

Additionally, by enabling the MX_RELAY_CHECK, I've gotten a few syslog 
broadcasts:
Message from [EMAIL PROTECTED] at Fri Oct 29 12:55:19 2004 ...
myhost perl: Host 211.228.227.141 claims to be my.numeric.ip.addr

I did set the syslog facility to "mail", and it does mention that I need 
to set "Also set $SyslogFacility in your filter", but where in the 
filter should that be set?

-Rich
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Pounded by spam

2004-10-29 Thread Rich West

While I know it can be easy to simply block the host, I was wondering 
if there was some way to avoid the problem all together by 
potentially identifying hosts attempting to overload the server 
(Denial Of Service) by throttling down the amount of allowed inbound 
connections (from external sources) from a single host.

Yes.  Sendmail >=8.13.0 has several nice options.
FEATURE(`ratecontrol',`nodelay',`terminate')dnl
FEATURE(`conncontrol')dnl
define(`confCONNECTION_RATE_WINDOW_SIZE',`60')dnl

I was looking at those, in addition to the FEATURE(`greet_pause', )..
The documentation on sendmail.org's site regarding greet_pause was just 
a step above non-existent.  I didn't check the others (ratecontrol and 
conncontrol).. Looking in to them now.

I am the SysAdmin for an ISP here in Billings.  I am unafraid of using 
these controls and they have really helped our situation.  I limit 25 
Connections/sec period.  I also limit 3 connections from any one 
external host/min.

Just out of curiosity, how, exactly, are you limiting the connections 
per second and connections from external hosts/domains?

I occasionally get the "25" connections and deferring at that rate in 
my logs, but not enough to worry me and we handle ~200,000 emails a 
day.  Adjust your connection/defer times accordingly to your normal load.

Have fun and knock them dead at the gate.

Thanks!
-Rich
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] Adding virus scanning after MIMEDefang installation

2004-10-29 Thread Mark Osbourne
At the time I installed MIMEDefang, I wasn't allowed to integrate virus
scanning into the setup since ClamAV wasn't approved software yet (long
story there, lawyers, etc).

Now that I've been given the go ahead to use ClamAV, I've built it for
the mailserver and have it installed (in /usr/local/bin).  Now I need to
let MIMEDefang know it can use ClamAV, but would prefer to not have to
rebuild/re-install MIMEDefang just to make that happen, unless that is
the only safe way to do it.

Has anyone else done this sort of setup?  If so, could I get some
pointers on where to look?

>From what I can tell, it looks like I probably need to update
/usr/bin/mimedefang.pl and change $Features{'Virus:CLAMD'} so that it is
set to 1 and make sure that the clamd processes is running as the defang
user and writing it's socket in /var/spool/MIMEDefang/clamd.sock.

Anything else I have missed?

Thanks in advance for any help.

Mark.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] Sender Verification (was Re: VERY Newbie Question)

2004-10-29 Thread Matthew.van.Eerde
Kelson wrote:
> Ian Mitchell wrote:
>> Then I would wonder if something along the lines of SPF
>> (spf.pobox.com) would work. I know this method was recently
>> critisized for Microsoft's liscensing methods and such forth.
> 
> You're thinking of SenderID, which is a combination of SPF with
> Microsoft's own proposals.  SPF itself isn't license/patent/etc.
> encumbered, but Microsoft's sections are.  (Though reportedly less so
> than they were originally.  Something to research when I have time...)

SPF works by itself just fine.  SenderID is a specialization of SPF.
Also worth a look is Yahoo's DomainKeys idea.

These are compatible.  GMail, for example, sends all of its email from SPF-verifiable 
hosts, using DomainKeys-signed headers.

Matthew.van.Eerde (at) hbinc.com 805.964.4554 x902
Hispanic Business Inc./HireDiversity.com Software Engineer
perl -e"map{y/a-z/l-za-k/;print}shift" "Jjhi pcdiwtg Ptga wprztg,"

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Re: VERY Newbie Question

2004-10-29 Thread Jason Gurtz
On 10/29/2004 11:13, Ian Mitchell wrote:

> Then I would wonder if something along the lines of SPF (spf.pobox.com)
> would work. I know this method was recently critisized for Microsoft's
> liscensing methods and such forth.

Having followed that debacle for a while...  SPF has nothing to do with
the  technical and IPR criticisms of Microsoft's SenderID.  In a nutshell,
the criticisms are directed specifically against the SenderID technical
method of validating the PRA (more or less the From: header inside the
message) and also the incompatibility of a patent license that covers this
PRA checking with licenses like the gpl which demand that users retain the
same development rights as the developers.  There are also technical
concerns with how PRA checking gets along with envelope MAIL FROM checking.

Note that SPF, which validates with the envelope MAIL FROM header, has
it's own technical problems, mostly with mail forwarding services which
intentionally spoof it.

> [...] I would be hesitant to
> suggest this type of functionality be included in MimeDefang, atleast
> until a much better industry following took place, besides, its probably
> better suited in SpamAssassin instead,

Yep, it's already in SA 3.x and I find that SA works real nice in tandem
with MIMEDefang :)  In my case, I just reject anything (after DATA, oh
well) that outright fails the SPF check (sending domain has "-all" in
there DNS record).  Note that I have no concerns at my site with the SPF
forwarding issues.

For now, I give a slight score advantage in Spamassassin for everything
that has SPF and passes.  That will likely change at some point  :)
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] VERY Newbie Question

2004-10-29 Thread Yang Xiao
On Fri, 29 Oct 2004 17:42:36 +0200, Alexander Dalloz
<[EMAIL PROTECTED]> wrote:
> Am Fr, den 29.10.2004 schrieb Yang Xiao um 15:54:
> 
> > Hi,
> > I found out that the filter_sender() function will be enabled if I
> > turn the MX_SENDER_CHECK option on. I was just wondering where should
> > I put it and how to use it.
> 
> For you as a Fedora user it has to be activated in
> /etc/sysconfig/mimedefang.
> 
> > I got to read the man pages more carefully.
> > As for the usefullness of the code sample, I think it at least get rid
> > of half of the problem, and spammers can still forge the MAIL FROM
> > header if he uses a legit HELO. So the problem is, how do you check
> > the MAIL FROM header then?
> 
> Both HELO and MAIL FROM can be easily forged. The question is, what do
> you want to prohibit? Often a combination of tests is needed to properly
> detect spamming attempts and to not reject valid senders.
> 
> One test which stops quite some guys at the front door is following:
> 
> #***
> # %PROCEDURE: filter_relay
> # %DESCRIPTION:
> #  Check whether helo fits with hosts IP address.
> #***
> sub filter_relay () {
> my ($ip, $name, $helo, $RelayAddr) = @_;
> # Check if IP correlates to given HELO
> if (($helo =~ /^(\d{1,3})(.)(\d{1,3})(.)(\d{1,3})(.)(\d{1,3})$/) &&
> ($ip ne $helo)) {
> md_syslog('warning', "Header forgery attempt: $ip claims to be
> $helo");
> return ('REJECT', "Header forgery attempt, $ip claims to be
> $helo");
> }
> return ('CONTINUE', "ok");
> }
> 
> > Yang
> 
> Alexander
> 

Alex,
Good to see you here.
Won't this check generate a lot of false positive if the sending host
has a hostname that's different from it's public DNS name? I have had
several mailhost like this in places I've worked before, it's not
because we are lazy or careless, but because it's very hard to change
the hostnmae for various reasons.
But as to my problem, I just want to stop anybody from sending to the
mail gateway as local domain users because it's a incoming spam filter
mail host. I guess I would just need to check for MAIL FROM header
somewhere? But where should I implement this check in MIMEdefang? and
do you see any senario that it will break anything?

Thanks,
Yang
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] VERY Newbie Question

2004-10-29 Thread Alexander Dalloz
Am Fr, den 29.10.2004 schrieb David F. Skoll um 18:04:

> > sub filter_relay () {
> > my ($ip, $name, $helo, $RelayAddr) = @_;

> Note that recent versions of MIMEDefang don't pass $helo in filter_relay;
> you need to do HELO checks in filter_sender.

> David.

Oops, yes my fault! I am still running MimeDefang 2.42 on that host with
this filter_relay code. Same can be done in filter_sender. IIRC the
change came with release 2.43.

Thanks David for your attention :) Could be a trap for a MimeDefang
starter with a current version.

Alexander


-- 
Alexander Dalloz | Enger, Germany | GPG key 1024D/ED695653 1999-07-13
Fedora GNU/Linux Core 2 (Tettnang) kernel 2.6.8-1.521smp 
Serendipity 18:35:14 up 9 days, 15:14, load average: 0.00, 0.21, 0.26 

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Re: VERY Newbie Question

2004-10-29 Thread Kelson
Ian Mitchell wrote:
Then I would wonder if something along the lines of SPF (spf.pobox.com)
would work. I know this method was recently critisized for Microsoft's
liscensing methods and such forth.
You're thinking of SenderID, which is a combination of SPF with 
Microsoft's own proposals.  SPF itself isn't license/patent/etc. 
encumbered, but Microsoft's sections are.  (Though reportedly less so 
than they were originally.  Something to research when I have time...)

--
Kelson Vibber
SpeedGate Communications 
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] VERY Newbie Question

2004-10-29 Thread David F. Skoll
On Fri, 29 Oct 2004, Alexander Dalloz wrote:

> sub filter_relay () {
> my ($ip, $name, $helo, $RelayAddr) = @_;

Note that recent versions of MIMEDefang don't pass $helo in filter_relay;
you need to do HELO checks in filter_sender.

--
David.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] VERY Newbie Question

2004-10-29 Thread Alexander Dalloz
Am Fr, den 29.10.2004 schrieb Yang Xiao um 15:54:

> Hi,
> I found out that the filter_sender() function will be enabled if I
> turn the MX_SENDER_CHECK option on. I was just wondering where should
> I put it and how to use it.

For you as a Fedora user it has to be activated in
/etc/sysconfig/mimedefang.

> I got to read the man pages more carefully.
> As for the usefullness of the code sample, I think it at least get rid
> of half of the problem, and spammers can still forge the MAIL FROM
> header if he uses a legit HELO. So the problem is, how do you check
> the MAIL FROM header then?

Both HELO and MAIL FROM can be easily forged. The question is, what do
you want to prohibit? Often a combination of tests is needed to properly
detect spamming attempts and to not reject valid senders.

One test which stops quite some guys at the front door is following:

#***
# %PROCEDURE: filter_relay
# %DESCRIPTION:
#  Check whether helo fits with hosts IP address.
#***
sub filter_relay () {
my ($ip, $name, $helo, $RelayAddr) = @_;
# Check if IP correlates to given HELO
if (($helo =~ /^(\d{1,3})(.)(\d{1,3})(.)(\d{1,3})(.)(\d{1,3})$/) &&
($ip ne $helo)) {
md_syslog('warning', "Header forgery attempt: $ip claims to be
$helo");
return ('REJECT', "Header forgery attempt, $ip claims to be
$helo");
}
return ('CONTINUE', "ok");
}

> Yang

Alexander


-- 
Alexander Dalloz | Enger, Germany | GPG key 1024D/ED695653 1999-07-13
Fedora GNU/Linux Core 2 (Tettnang) kernel 2.6.8-1.521smp 
Serendipity 17:34:56 up 9 days, 14:14, load average: 0.02, 0.06, 0.09 

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] Re: VERY Newbie Question

2004-10-29 Thread Ian Mitchell


Then I would wonder if something along the lines of SPF (spf.pobox.com)
would work. I know this method was recently critisized for Microsoft's
liscensing methods and such forth. And while it's adoption or lack there
of might not allow it to be fully effective (catching people who spoof
yahoo) if your domain is participating in it, then you can definately deny
emails inbound to your domain that are spoofed. I would be hesitant to
suggest this type of functionality be included in MimeDefang, atleast
until a much better industry following took place, besides, its probably
better suited in SpamAssassin instead, and the Apache crew will have to
accept the terms before that will happen. In the mean time, a google
search can find several instances of milters designed to handle the
protocol. Nice thing is it will allow you to catch spoofed messages from
any domain, not just your own (barring that domain chooses to
participate).



> That is correct, but I don't think that is what the meaning of the code
> snippet is
> This piece of code is to reject mail that comes from someone
> impersonating your domain,
> that is an external source saying it is internal.
>
> I use almost the same setup here...
>
> --
>
> Paul Pries


___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] VERY Newbie Question

2004-10-29 Thread Yang Xiao
On Fri, 29 Oct 2004 15:33:32 +0200, Paul Pries
<[EMAIL PROTECTED]> wrote:
> Ian Mitchell wrote:
> 
> >>Ok, for something like this, a sample function on the FAQ site that
> >>filters HELO line
> >>
> >>How do I integrate this into the filter file ?
> >>
> >>
> >
> >I'm not sure that I would. Sendmail has the capability to limit
> >connections based on where the IP's come from (outside of the HELO which
> >can be spoofed). You can limit based on relaying (access_db) or you can
> >actually limit based on connections (tcp_wrappers). There is actually many
> >different ways that this can be accomplished without the need for using
> >expensive resources by having mimedefang catch it. Think of it this way,
> >if you have your mimedefang process scanning for it, then the child
> >processes for your mimedefang/spamassassin/virus scanner could potentially
> >all be called for a connection your just going to drop anyways (depend on
> >how you put together your filter) when sendmail could easily make a call
> >to tcpd and determine it's not legitimate and kill right away. Not a
> >problem with only a few connections, but what happens if you get hit by a
> >spam bot that is attempting hundreds or thousands or more connections
> >close together from all different ip's?
> >
> >
> That is correct, but I don't think that is what the meaning of the code
> snippet is
> This piece of code is to reject mail that comes from someone
> impersonating your domain,
> that is an external source saying it is internal.
> 
> I use almost the same setup here...
> 
> --
> 
> Paul Pries
> 

Hi,
I found out that the filter_sender() function will be enabled if I
turn the MX_SENDER_CHECK option on. I was just wondering where should
I put it and how to use it.
I got to read the man pages more carefully.
As for the usefullness of the code sample, I think it at least get rid
of half of the problem, and spammers can still forge the MAIL FROM
header if he uses a legit HELO. So the problem is, how do you check
the MAIL FROM header then?

Many Thanks,

Yang
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] filter_bad_name and virus check

2004-10-29 Thread Davide Vaghetti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Do someone know how to the antivirus check before filter_bad_filename() ?
thanks in advance
P.S.
maybe this question was made before, but I'm new to this mailing-list
and from the searches I made I cannot find anything related.
- --
Davide Vaghetti
University of Pisa NOC - Centro SerRA
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFBglldxKJAsKiy+1ARArVgAJ9KiN7BDv+KGR4+FCKIr5+kE/wugwCfZ4HI
JZXhylaLXOGFC4gBDwnCRSo=
=rOBM
-END PGP SIGNATURE-
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] MIMEDefang 2.48 is available

2004-10-29 Thread David F. Skoll
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

MIMEDefang 2.48 is at http://www.mimedefang.org/node.php?id=1

This one finally fixes the silly bugs from 2.46 and 2.47.  Honest!

Changelog to 2.45 follows.

Regards,

David.

2004-10-29  David F. Skoll  <[EMAIL PROTECTED]>

* Version 2.48 RELEASED

* Fix dumb bugs introducted in 2.46 and 2.47 related to
slave status reports.

* embperl.c: Detect if user opens file descriptors inside his/her
filter.  If so, log a loud and nasty warning that such code should
be moved to filter_initialize.

2004-10-28  David F. Skoll  <[EMAIL PROTECTED]>

* Version 2.47 RELEASED

* Move slave "status reports" onto their own file descriptor.
If you want the status reports, you must invoke mimedefang-multiplexor
with the "-Z" flag.  In the sample init scripts, set
MX_STATUS_UDPATES=yes

2004-10-28  David F. Skoll  <[EMAIL PROTECTED]>

* Version 2.46 RELEASED

* mimedefang-multiplexor.c: Added mechanism for slaves to send
back "status reports" to the multiplexor.  The command
"md-mx-ctrl slaves" now shows the current status of busy slaves
(eg, "Running SpamAssassin", "recipok <[EMAIL PROTECTED]>", etc.)

* redhat/mimedefang-init.in: Unconditionally execute "ulimit -s 2048"
before invoking mimedefang.

2004-10-28 Bill Maidment <[EMAIL PROTECTED]>

* Added support for Command "csav" anti-virus.

2004-10-27  David F. Skoll  <[EMAIL PROTECTED]>

* Version 2.46-BETA-2 released.

* mimedefang.c: Print and log an error if we can't determine our
own IP address.

* mimedefang.pl.in: append_html_boilerplate and append_text_boilerplate
refuse to tamper with S/MIME messages.  They won't descend into
multipart/signed or multipart/encrypted parts.  Similarly for
remove_redundant_html_parts.

* mimedefang.pl.in: Split-and-rebuild algorithm is greatly improved.
In particular:  In filter_end, the $entity->head correctly contains
all message headers.  And we try to avoid creating useless
multipart containers -- if we would end up with a multipart/mixed
or multipart/alternative with only one sub-part, we "pop" the sub-part
up to the top level.

2004-10-26  David F. Skoll  <[EMAIL PROTECTED]>

* Version 2.46-BETA-1 released.

* mimedefang-filter.5.in: Corrected an error in one of the examples

* mimedefang.c: Add IP address of scanning host to X-Scanned-By:
header.

* SECURITY FIX: mimedefang.c: Tempfail message if RESULTS file
doesn't terminate with 'F' line.  (Detects disk-full condition.)

* mimedefang.pl.in (rebuild_entity): Add a Content-Type: header
if MIME part lacks one.  Some marginal e-mail software chokes on
a part with a missing content-type header.

* mimedefang.pl.in: flatten_mime removed.  Support for
$Stupidity{"flatten"} removed.  *** NOTE INCOMPATIBILITY ***

* action_add_part revamped completely; we try to preserve original
multipart type of message.  action_add_part now simply keeps a list
of parts to be added.  At the end:

a) If original message was multipart/mixed, we simply add
the part.

b) Otherwise, we make a new multipart/mixed container, put
original message as the first part of this new container, and
then add part to the multipart/mixed container.

*** NOTE INCOMPATIBILITY ***

* Proper multipart type passed to filter_end.

* All mimedefang.pl-generated messages have an
Auto-Submitted: auto-generated header.

* mimedefang.pl.in: Return codes of I/O operations are checked; we
die if any fail.  This is a security fix.

* mimedefang.pl.in (interpret_trend_code): Treat any code from
1 to 9 as indicative of a virus, upon recommendation of Stephane Lentz.

* mimedefang.pl.in (spam_assassin_init): Add a
LOCAL_RULES_DIR => @CONFDIR@/spamassassin argument to SpamAssassin
constructor.



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)
Comment: For info see http://quantumlab.net/pine_privacy_guard/

iD8DBQFBglkudB1gkTPXMwsRAjodAKDYl3dhYEhMYOM8FkbWNrrXfk53tACg7unK
S8c/mPx7jT/yXNfpluse8hQ=
=BaBc
-END PGP SIGNATURE-
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] VERY Newbie Question

2004-10-29 Thread Paul Pries
Ian Mitchell wrote:
Ok, for something like this, a sample function on the FAQ site that
filters HELO line
How do I integrate this into the filter file ?
   

I'm not sure that I would. Sendmail has the capability to limit
connections based on where the IP's come from (outside of the HELO which
can be spoofed). You can limit based on relaying (access_db) or you can
actually limit based on connections (tcp_wrappers). There is actually many
different ways that this can be accomplished without the need for using
expensive resources by having mimedefang catch it. Think of it this way,
if you have your mimedefang process scanning for it, then the child
processes for your mimedefang/spamassassin/virus scanner could potentially
all be called for a connection your just going to drop anyways (depend on
how you put together your filter) when sendmail could easily make a call
to tcpd and determine it's not legitimate and kill right away. Not a
problem with only a few connections, but what happens if you get hit by a
spam bot that is attempting hundreds or thousands or more connections
close together from all different ip's?
 

That is correct, but I don't think that is what the meaning of the code 
snippet is
This piece of code is to reject mail that comes from someone 
impersonating your domain,
that is an external source saying it is internal.

I use almost the same setup here...
--
Paul Pries

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] VERY Newbie Question

2004-10-29 Thread Ian Mitchell
> Ok, for something like this, a sample function on the FAQ site that
> filters HELO line
>
> How do I integrate this into the filter file ?

I'm not sure that I would. Sendmail has the capability to limit
connections based on where the IP's come from (outside of the HELO which
can be spoofed). You can limit based on relaying (access_db) or you can
actually limit based on connections (tcp_wrappers). There is actually many
different ways that this can be accomplished without the need for using
expensive resources by having mimedefang catch it. Think of it this way,
if you have your mimedefang process scanning for it, then the child
processes for your mimedefang/spamassassin/virus scanner could potentially
all be called for a connection your just going to drop anyways (depend on
how you put together your filter) when sendmail could easily make a call
to tcpd and determine it's not legitimate and kill right away. Not a
problem with only a few connections, but what happens if you get hit by a
spam bot that is attempting hundreds or thousands or more connections
close together from all different ip's?


___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] Milter (mimedefang): to error state

2004-10-29 Thread Alex S Moore
On Thu, 2004-10-28 at 12:53 +0200, Stefaan Van Hoornick wrote:
> Hello,
> 
> I receive following error:
> 
> Oct 28 12:51:44 mail sendmail[659]: [ID 801593 mail.error] i9SApiO659: Milter 
> (mimedefang): local socket name /var/spool/MIMEDefang/mimedefang.sock unsafe
> Oct 28 12:51:44 mail sendmail[659]: [ID 801593 mail.info] i9SApiO659: Milter 
> (mimedefang): to error state

Sendmail does like the permissions on /var/spool/MIMEDefang.  Change the
permissions to 0700 or 0755 and make sure that the MD user owns the
directory.  Group and/or world writable does not work without turning
off a feature of sendmail (which is not recommended).

Alex

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


[Mimedefang] SURBL - MIMEDefang 2.47

2004-10-29 Thread Trevor Dodds
Hi,

I've upgraded to MIMEDefang 2.47 I modified mimedefang.pl
And changed $SALocalTestsOnly = 0; and skip_rbl_checks 0
SURBL is still not working,  I had 2.45 previously and it worked
Fine.  Are there any other changes that need to be made in 2.47?

Thanks
Trevor

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang