checkSAupdateMirrors.sh on sa-vm1.apache.org - 1 mirror DOWN, 0 mirrors STALE

2019-04-23 Thread root
Fetching sa-update URLs from http://spamassassin.apache.org/updates/MIRRORED.BY

http://sa-update.dnswl.org/ (116.203.4.105): UP (CURRENT)

http://www.sa-update.pccc.com/ (69.171.29.42): UP (CURRENT)

http://sa-update.secnap.net/ (204.89.241.6): UP (CURRENT)

http://sa-update.space-pro.be/ (176.28.55.20): UP (CURRENT)

http://sa-update.ena.com/ (96.5.1.5): UP (CURRENT)

http://sa-update.ena.com/ (96.4.1.5): UP (CURRENT)

http://sa-update.razx.cloud/ (104.27.152.42): UP (CURRENT)

http://sa-update.razx.cloud/ (104.27.153.42): UP (CURRENT)

http://sa-update.fossies.org/ (138.201.17.217): UP (CURRENT)

http://sa-update.verein-clean.net/ (37.252.124.130): UP (CURRENT)

http://sa-update.verein-clean.net/ (37.252.120.157): UP (CURRENT)

http://sa-update.verein-clean.net/ (148.251.29.131): UP (CURRENT)

http://sa-update.verein-clean.net/ (148.251.212.58): UP (CURRENT)

http://sa-update.bitwell.fi/ (104.31.75.190): DOWN

http://sa-update.bitwell.fi/ (104.31.74.190): UP

http://sa-update.spamassassin.org/ (64.142.56.146): UP (CURRENT)


Fwd: Rule updates are too old - 2019-04-23 3.3.0:2019-04-22 3.3.1:2019-04-22 3.3.2:2019-04-22

2019-04-23 Thread Kevin A. McGrail
I noticed a crashplan failure.  Does sa vm1 need a reboot?

-- Forwarded message -
From: 
Date: Tue, Apr 23, 2019, 07:00
Subject: Rule updates are too old - 2019-04-23 3.3.0:2019-04-22
3.3.1:2019-04-22 3.3.2:2019-04-22
To: , 


SpamAssassin version 3.3.0 has not had a rule update since 2019-04-22.
SpamAssassin version 3.3.1 has not had a rule update since 2019-04-22.
SpamAssassin version 3.3.2 has not had a rule update since 2019-04-22.

20190422:  Spam and ham are above threshold of 150,000:
http://ruleqa.spamassassin.org/?daterev=20190422
20190422:  Spam: 1865859, Ham: 357633


The spam and ham counts on which this script alerts are from
http://ruleqa.spamassassin.org/?daterev=20190422
Click "(source details)" (it's tiny and low contrast).
It's from the second and third columns of the line that ends with
"(all messages)"

The source to this script is
http://www.chaosreigns.com/sa/update-version-mon.pl

It looks like both the weekly and nightly masschecks need to have sufficient
corpora in order for an update to be generated.


Cron ~/svn/trunk/build/mkupdates/run_nightly | /usr/bin/tee /var/www/automc.spamassassin.org/mkupdates/mkupdates.txt

2019-04-23 Thread Cron Daemon
+ promote_active_rules
+ pwd
/usr/local/spamassassin/automc/svn/trunk
+ /usr/bin/perl build/mkupdates/listpromotable
HTTP get: https://ruleqa.spamassassin.org/1-days-ago?xml=1
HTTP get: https://ruleqa.spamassassin.org/2-days-ago?xml=1
HTTP get: https://ruleqa.spamassassin.org/3-days-ago?xml=1
day 3 contains a --net mass-check! offsetting by an extra day
Use of "goto" to jump into a construct is deprecated at 
build/mkupdates/listpromotable line 85.
HTTP get: https://ruleqa.spamassassin.org/4-days-ago?xml=1
+ mv rules/active.list.new rules/active.list
+ svn diff rules
+ cat /var/www/ruleqa.spamassassin.org/reports/LATEST
Index: rules/active.list
===
--- rules/active.list   (revision 1856032)
+++ rules/active.list   (working copy)
@@ -1,5 +1,5 @@
 # active ruleset list, automatically generated from 
https://ruleqa.spamassassin.org/
-# with results from: day 1: axb-coi-bulk axb-generic axb-ham-misc axb-ninja 
darxus ena-week0 ena-week1 ena-week2 ena-week3 ena-week4 giovanni-ham 
giovanni-spam giovanni-spammy grenier hege jarif jbrooks llanga sihde 
thendrikx; day 2: axb-coi-bulk axb-generic axb-ham-misc axb-ninja ena-week2 
ena-week3 giovanni-ham giovanni-spam giovanni-spammy jarif mmiroslaw-mails-ham 
mmiroslaw-mails-spam sihde; day 3: axb-coi-bulk axb-generic axb-ham-misc 
axb-ninja darxus ena-week0 ena-week1 ena-week2 ena-week3 ena-week4 giovanni-ham 
giovanni-spam giovanni-spammy hege jarif jbrooks llanga mmiroslaw-mails-ham 
mmiroslaw-mails-spam sihde thendrikx
+# with results from: day 1: axb-coi-bulk axb-generic axb-ham-misc darxus 
ena-week0 ena-week1 ena-week2 ena-week3 ena-week4 giovanni-ham giovanni-spam 
giovanni-spammy grenier hege jarif jbrooks pds sihde spamsponge thendrikx; day 
2: axb-coi-bulk axb-generic axb-ham-misc ena-week1 ena-week2 ena-week3 
ena-week4 jarif llanga mmiroslaw-mails-ham mmiroslaw-mails-spam; day 3: 
axb-coi-bulk axb-generic axb-ham-misc darxus ena-week0 ena-week1 ena-week2 
ena-week3 ena-week4 giovanni-ham giovanni-spam giovanni-spammy hege jarif 
jbrooks llanga mmiroslaw-mails-ham mmiroslaw-mails-spam sihde thendrikx
 
 # tflags publish
 AC_BR_BONANZA
@@ -52,6 +52,9 @@
 # tflags publish
 ADVANCE_FEE_3_NEW_FORM
 
+# good enough
+ADVANCE_FEE_3_NEW_FRM_MNY
+
 # tflags publish
 ADVANCE_FEE_3_NEW_MONEY
 
@@ -58,6 +61,18 @@
 # tflags publish
 ADVANCE_FEE_4_NEW
 
+# good enough
+ADVANCE_FEE_4_NEW_FRM_MNY
+
+# good enough
+ADVANCE_FEE_5_NEW
+
+# good enough
+ADVANCE_FEE_5_NEW_FRM_MNY
+
+# good enough
+ADVANCE_FEE_5_NEW_MONEY
+
 # tflags publish
 AD_PREFS
 
@@ -100,6 +115,9 @@
 # tflags learn
 BAYES_999
 
+# good enough
+BIGNUM_EMAILS
+
 # tflags publish
 BITCOIN_BOMB
 
@@ -142,9 +160,6 @@
 # tflags publish
 BITCOIN_SPAM_09
 
-# good enough
-BODY_SINGLE_WORD
-
 # tflags publish
 BODY_URI_ONLY
 
@@ -179,21 +194,12 @@
 CTYPE_NULL
 
 # good enough
-DEAR_WINNER
+DEAR_BENEFICIARY
 
 # tflags net
 DIGEST_MULTIPLE
 
 # tflags net
-DKIMWL_BL
-
-# tflags net
-DKIMWL_WL_HIGH
-
-# tflags net
-DKIMWL_WL_MED
-
-# tflags net
 DKIM_ADSP_ALL
 
 # tflags net
@@ -229,9 +235,6 @@
 # good enough
 DOS_OE_TO_MX
 
-# good enough
-DOS_OUTLOOK_TO_MX
-
 # tflags publish
 DX_TEXT_02
 
@@ -241,9 +244,6 @@
 # good enough
 DYN_RDNS_AND_INLINE_IMAGE
 
-# good enough
-DYN_RDNS_SHORT_HELO_HTML
-
 # tflags publish
 ENCRYPTED_MESSAGE
 
@@ -262,6 +262,9 @@
 # tflags publish
 FILL_THIS_FORM
 
+# good enough
+FILL_THIS_FORM_LOAN
+
 # tflags publish
 FORM_FRAUD
 
@@ -305,14 +308,32 @@
 FROM_LOCAL_NOVOWEL
 
 # good enough
+FROM_MISSPACED
+
+# good enough
+FROM_MISSP_DYNIP
+
+# good enough
 FROM_MISSP_EH_MATCH
 
 # good enough
-FROM_MISSP_PHISH
+FROM_MISSP_FREEMAIL
 
+# good enough
+FROM_MISSP_MSFT
+
+# good enough
+FROM_MISSP_REPLYTO
+
 # tflags net
 FROM_MISSP_SPF_FAIL
 
+# good enough
+FROM_MISSP_USER
+
+# good enough
+FROM_MISSP_XPRIO
+
 # tflags publish
 FROM_WORDY
 
@@ -320,15 +341,9 @@
 FROM_WORDY_SHORT
 
 # good enough
-FROM_WSP_LEAD
-
-# good enough
 FROM_WSP_TRAIL
 
 # good enough
-FSL_HELO_BARE_IP_1
-
-# good enough
 FSL_HELO_FAKE
 
 # tflags publish
@@ -433,9 +448,6 @@
 # tflags userconf
 HEAD_LONG
 
-# good enough
-HELO_LOCALHOST
-
 # tflags publish
 HEXHASH_WORD
 
@@ -443,8 +455,11 @@
 HK_NAME_DRUGS
 
 # good enough
-HK_SCAM_N8
+HK_NAME_MR_MRS
 
+# good enough
+HK_SCAM_N2
+
 # tflags userconf
 HTML_CHARSET_FARAWAY
 
@@ -484,6 +499,9 @@
 # good enough
 KHOP_DYNAMIC
 
+# good enough
+LIST_PARTIAL_SHORT_MSG
+
 # tflags publish
 LIST_PRTL_PUMPDUMP
 
@@ -499,15 +517,12 @@
 # tflags publish
 LOTS_OF_MONEY
 
+# good enough
+LOTTO_AGENT
+
 # tflags publish
 LUCRATIVE
 
-# good enough
-L_8BIT_MISMATCH
-
-# good enough
-MALFORMED_FREEMAIL
-
 # tflags publish
 MALF_HTML_B64
 
@@ -530,6 +545,12 @@
 MIXED_ES
 
 # good enough
+MONEY_ATM_CARD
+
+# good enough
+MONEY_FORM
+
+# good enough
 MONEY_FORM_SHORT
 
 # tflags publish
@@ -562,6 +583,12 @@
 # tflags userconf
 NO_RELAYS
 
+# good enough
+NSL_RCVD_FROM_USER
+
+# good enough
+NSL_RCVD_HELO_USER
+
 #