sql-based global use_auto_whitelist error?

2005-03-09 Thread email builder
Hi,

  I have a global setting in my SQL-based userprefs for use_auto_whitelist. 
I am noticing that spamd -D shows these messages about it, which confuse me:

debug: retrieving prefs for [EMAIL PROTECTED] from SQL server
debug: config: not parsing, administrator setting: use_auto_whitelist   1
debug: config: SpamAssassin failed to parse line, skipping:
use_auto_whitelist  1
debug: user has changed

  What's going on here?  Same thing when I set it to zero.  Obviously, it
seems to be querying the DB correctly, but barfing on what it finds.  Why?  I
also have use_bayes set up the same way, which is working just fine.

my version:  SA 3.0.2

mysql select * from spamassassin_user_settings;
+---+++
| username  | preference | value 
|
+---+++
| !GLOBAL   | use_bayes  | 1 
|
| !GLOBAL   | use_auto_whitelist | 1 
|
+---+++

in local.cf:

user_scores_sql_custom_querySELECT preference, value FROM
spamassassin_user_settings WHERE username = _USERNAME_ OR username =
'!GLOBAL' OR username = CONCAT('@', _DOMAIN_) ORDER BY username ASC





__ 
Celebrate Yahoo!'s 10th Birthday! 
Yahoo! Netrospective: 100 Moments of the Web 
http://birthday.yahoo.com/netrospective/


Re: sql-based global use_auto_whitelist error?

2005-03-09 Thread Matt Kettler
At 07:23 PM 3/8/2005, email builder wrote:
  I have a global setting in my SQL-based userprefs for use_auto_whitelist.
I am noticing that spamd -D shows these messages about it, which confuse me:
debug: retrieving prefs for [EMAIL PROTECTED] from SQL server
debug: config: not parsing, administrator setting: use_auto_whitelist   1
debug: config: SpamAssassin failed to parse line, skipping:
use_auto_whitelist  1
debug: user has changed
  What's going on here?
use_auto_whitelist cannot ever be set as a user preference. It's an 
admin-only setting and must be set at the local.cf level.




multiple hosts for spamc -d ?

2005-03-09 Thread email builder
All,

  Some postings a while back led me to believe that I could specify multiple
hosts for the -d option of spamc.  I understood that it would operate
basically on a fallback basis (not load balancing).  However, I can't seem to
get spamc to use more than one of the -d listings.  I've tried:

/usr/bin/spamc -d 123.45.67.8 -d 127.0.0.1
/usr/bin/spamc -d 123.45.67.8 127.0.0.1

  And switched the order around and fiddled with hostnames vs IP addresses,
but no dice.  I understand the man page to say that it will use fallback
logic if the hostname resolves (via DNS query, right?) to more than one
host... so why can't I give it those hosts directly?

TIA!




__ 
Celebrate Yahoo!'s 10th Birthday! 
Yahoo! Netrospective: 100 Moments of the Web 
http://birthday.yahoo.com/netrospective/


Re: multiple hosts for spamc -d ?

2005-03-09 Thread Dave Goodrich
email builder wrote:
All,
  Some postings a while back led me to believe that I could specify multiple
hosts for the -d option of spamc.  I understood that it would operate
basically on a fallback basis (not load balancing).  However, I can't seem to
get spamc to use more than one of the -d listings.  I've tried:
/usr/bin/spamc -d 123.45.67.8 -d 127.0.0.1
/usr/bin/spamc -d 123.45.67.8 127.0.0.1
  And switched the order around and fiddled with hostnames vs IP addresses,
but no dice.  I understand the man page to say that it will use fallback
logic if the hostname resolves (via DNS query, right?) to more than one
host... so why can't I give it those hosts directly?
TIA!
From http://spamassassin.apache.org/full/3.0.x/dist/doc/spamc.html
-d host
In TCP/IP mode, connect to spamd server on given host (default: 
localhost).

If host resolves to multiple addresses, then spamc will fail-over 
to the other addresses, if the first one cannot be connected to

You need to have a host that has multiple A records.
spamd.domain.com A 123.123.123.123
spamd.domain.com A 123.123.123.124
spamd.domain.com A 123.123.123.125
/usr/bin/spamc -d spamd.domain.com
If your DNS server sends the results back in a different order each time 
then it will not be a fallback but a round robin. You might be able to 
simply use /etc/host entries. I've never tried it as I use qmail which 
will not use the host file, so I always rely on DNS. Don't know if spamc 
will use the host file or not.

DAve
--
Dave Goodrich
Systems Administrator
http://www.tls.net
Get rid of Unwanted Emails...get TLS Spam Blocker!


Whitelist collection project

2005-03-09 Thread Robert Menschel
OK, based on what little discussion there's been so far, here's a
draft proposal for people to think about.

Summary: A group of volunteers will maintain a collected/distributed
whitelist, using SpamAssassin's whitelist_from_rcvd capabilities,
similar to (but in the opposite direction as) William Stearns'
collected/distributed blacklist at
http://www.stearns.org/sa-blacklist/sa-blacklist.current.cf

Goal: There are public newsletters, services, etc., which a) do not
spam, and b) can easily be mistaken as spam by SpamAssassin for a
variety of reasons (overly aggressive custom rules, wrongly taught
Bayes system, paid advertising listing SURBL URIs, etc). Though
anti-spam devotees see these as opportunities for cleaning up our
system, for the purposes of email reliability we want these emails to
go through unhindered. 

Assumption: This activity will focus only on public newsletters,
services, etc., which normally do not contain any private information.
Therefore there will not be any privacy or confidentiality concerns
for the great majority of emails from these sources.

Distribution:  The rules file which results from this activity will be
maintained within the SARE system, as file 70_sare_whitelist.cf -- it
can be downloaded manually or via RDJ.

Rules: Since these rules are gathered by the community at large,
rather than use the whitelist_from_rcvd rule which normally scores
-100, we will use the def_whitelist_from_rcvd rule, which scores only
-15. Any site that wishes can copy any of these rules to a
def_whitelist_from rule to gain the full -100 points.

[Question to the devs: would you agree this is a valid use for the
def_whitelist_from_rcvd rule?]

Adoption to SA Core: We expect that some/most of these rules will be
adopted into the SpamAssassin core distribution when new releases are
issued. At such times, rules adopted into SA will be migrated to a
stable file named 70_sare_whitelist_pre_vv.cf (eg:
70_sare_whitelist_pre_030100 for SA 3.1.0). This file will be
announced on the SA-Users list, and can be retrieved once into any/all
systems. That file will not change. These rules will be deleted from
the primary 70_sare_whitelist.cf file concurrent with the official
release of the new SA release. Systems that migrate to a new SA
release would then be expected to delete all pre files, though there
wouldn't be any harm other than a minimal performance hit if they do
not.

Contributions: Anyone within the SA community can submit a single
whitelist rule for inclusion into the active rules file, and/or submit
a qualifying email (with full headers), from which the whitelist team
will create a rule. Submissions with a full qualifying email are
preferred. Submissions should be sent to [EMAIL PROTECTED]

[Submissions can be sent to that address immediately -- something will
be done with them, whether following this proposal or not.]

Process: At least at first, we expect many/most of these submissions
to be obvious ham sources (such as NYTimes.com would be). Obvious ham
sources will be agreed upon unanimously by the whitelist team, and
added to the whitelist. 

Any non-obvious ham source, any that has a majority agreement within
the whitelist team but not unanimous agreement, will be examined in
detail by one of the team. The results of that examination will be
reviewed by the whitelist team, and any that now receives unanimous
agreement will be added to the rules file.

Any submission which does not obtain unanimous agreement will not be
added to the rules file.

Any submission which already matches a def_whitelist_from_rcvd rule
within the SA distribution will be identified and ignored (after
response back to the submitter). (We are not going to try to develop
pre-3.0.0 files.)

Team members: Anyone within the SpamAssassin community who has
submitted a CLA to Apache, and who is accepted unanimously by the
whitelist team, can join the team.

[The CLA requirement is to ensure that rules can be adopted into the
SA without any licensing concerns.]

- - - - - - -

Can anyone think of any guidelines to be added or changed?

Any volunteers willing to help out?

Bob Menschel





Re: Whitelist collection project

2005-03-09 Thread Daryl C. W. O'Shea
Robert Menschel wrote:
snipped a little for brevity
OK, based on what little discussion there's been so far, here's a
draft proposal for people to think about.
Summary: A group of volunteers will maintain a collected/distributed
whitelist, using SpamAssassin's whitelist_from_rcvd capabilities,
similar to (but in the opposite direction as) William Stearns'
collected/distributed blacklist at
http://www.stearns.org/sa-blacklist/sa-blacklist.current.cf
Don't forget about the new whitelist_from_spf capability that should be 
in the next major release.

I think we'd like to get away from whitelist_from_rcvd if possible for 
domains that appear to have sensible SPF records (records that actually 
list their hosts and don't use ?all, etc).  There's no point in keeping 
up with the addition/removal of a domain's hosts if we don't have to 
(which will be more common than the current whitelist_from_rcvd domains 
if there are lots of them added).  It's also somewhat unfair to restrict 
a domain to their current mail hosts due to concerns about 'their 
SpamAssassin score' if we don't have to.

For info on whitelist_from_spf (and def_whitelist_from_spf) 
implementation see bug 3487.


Assumption: This activity will focus only on public newsletters,
services, etc., which normally do not contain any private information.
Therefore there will not be any privacy or confidentiality concerns
for the great majority of emails from these sources.
What about emails from banks etc?  I'd think they'd be a good candidate 
for something you want to whitelist based on their received headers or SPF.


Distribution:  The rules file which results from this activity will be
maintained within the SARE system, as file 70_sare_whitelist.cf -- it
can be downloaded manually or via RDJ.
Rules: Since these rules are gathered by the community at large,
rather than use the whitelist_from_rcvd rule which normally scores
-100, we will use the def_whitelist_from_rcvd rule, which scores only
-15. Any site that wishes can copy any of these rules to a
def_whitelist_from rule to gain the full -100 points.
While it doesn't really matter how it's done, I'd suggest that a user 
just sets the score for def_whitelist_from_rcvd to -100 or whatever they 
want if -15 isn't enough (which I don't think I've seen a case where it 
isn't enough).

def_whitelist_from_spf currently doesn't assign the full -15, unless the 
'From:' header matches the envelope sender (see bug 3487), and would 
have to be scored appropriately if desired.


[Question to the devs: would you agree this is a valid use for the
def_whitelist_from_rcvd rule?]
I don't see a problem with it, although we may want to create an alias 
for it, such as sare_whitelist_from_(rcvd|spf), to prevent confusion 
between entries included in the distribution with those available from SARE.


Any submission which already matches a def_whitelist_from_rcvd rule
within the SA distribution will be identified and ignored (after
response back to the submitter). (We are not going to try to develop
pre-3.0.0 files.)
There aren't too many of them so it shouldn't be a problem.  I'd suggest 
listing those domains (along with new domains as added) on a web page at 
your site, along with the info on how to submit new domains.


Can anyone think of any guidelines to be added or changed?
You might want to setup a web form for submissions.  You could use it 
(well, the script behind it  a database) to automatically filter out 
duplicate submissions -- but still tally submissions for a domain.

Then again I don't know how many submissions you are expecting, so that 
may be overkill.

Daryl


Re: Rule_Du_Jour.sh

2005-03-09 Thread Loren Wilton
 FI Lint output: debug: SpamAssassin version 3.0.2
 FI ...
 FI config: SpamAssassin failed to parse line, skipping: rewrite_subject
1
 FI config: SpamAssassin failed to parse line, skipping: subject_tag
*SPAM*
 FI [...etc...]

 You have --lint errors here that are probably in your local.cf

 FI Can someone explain to me how to solve all the config issues
 FI detected ? (config: SpamAssassin failed to parse line)

 Have you checked the config docs?

A good suggestion.  Those two lines are SA 2.6 commands that have been
removed in 3.0.  This makes me suspect that other things might also not have
been correctly moved forward to 3.0.

Loren



Re: Whitelist collection project

2005-03-09 Thread Jeff Chan
On Tuesday, March 8, 2005, 8:13:05 PM, Robert Menschel wrote:
 OK, based on what little discussion there's been so far, here's a
 draft proposal for people to think about.

 Summary: A group of volunteers will maintain a collected/distributed
 whitelist, using SpamAssassin's whitelist_from_rcvd capabilities,
 similar to (but in the opposite direction as) William Stearns'
 collected/distributed blacklist at
 http://www.stearns.org/sa-blacklist/sa-blacklist.current.cf

 Goal: There are public newsletters, services, etc., which a) do not
 spam, and b) can easily be mistaken as spam by SpamAssassin for a
 variety of reasons (overly aggressive custom rules, wrongly taught
 Bayes system, paid advertising listing SURBL URIs, etc). Though
 anti-spam devotees see these as opportunities for cleaning up our
 system, for the purposes of email reliability we want these emails to
 go through unhindered. 

 Assumption: This activity will focus only on public newsletters,
 services, etc., which normally do not contain any private information.
 Therefore there will not be any privacy or confidentiality concerns
 for the great majority of emails from these sources.

 Distribution:  The rules file which results from this activity will be
 maintained within the SARE system, as file 70_sare_whitelist.cf -- it
 can be downloaded manually or via RDJ.

This is something that could potentially be useful to SURBLs as a
whitelist source (used for exclusion from SURBLs), so I'm in
favor of it.  Daryl's ideas of a web form feeding a database
and a separately named rule to use it within SA seem like good
suggestions. 

Because this would be a centrally maintained, hand-edited list I
don't see it occupying the exact same space as SPF.

Ultimately something like an RBL may be the best way to get
the data out unless the list is relatively static and not
too large.

As you outline it above it seems like it would be a global
publishing of local whitelists where there was strong consensus
about what should be whitelisted.  That could be a subset of
the local whitelist_froms of all SpamAssassin installations.
It could also grow into something larger, and that's not
necessarily a bad thing.  Collecting up SA local whitelist_froms
is a reasonable place to start.

Jeff C.
-- 
Jeff Chan
mailto:[EMAIL PROTECTED]
http://www.surbl.org/



Re: None of the Stock rules hitting

2005-03-09 Thread Martin Hepworth
John
only a few in few hours (china daily ones) or so, but not yukon 
ones...here's my hit list for one I did catch.. (note I've bumoe my 
BAYES_99 score to the pre SA3.0 score!)

5.40BAYES_99Bayesian spam probability is 99 to 100%
2.29BIZ_TLD Contains an URL in the BIZ top-level domain
3.02FB_FORWARD  
1.00FB_SPACED_MORTG_PT2 
0.45FM_WHITEONWHITE 
1.40FU_TLD_BIZ  
0.14HTML_FONT_BIG   HTML tag for a big font size
0.00HTML_MESSAGEHTML included in message
0.60J_CHICKENPOX_42 {4}Letter - punctuation - {2}Letter
0.00MIME_BOUND_NEXTPART Spam tool pattern in MIME boundary
2.67MIME_BOUND_RKFINDY  Spam tool pattern in MIME boundary (rfkindy)
0.18MIME_HTML_ONLY  Message only has text/html MIME parts
2.44MIME_HTML_ONLY_MULTIMultipart message only has text/html MIME parts
0.14MORTGAGE_BEST   Information on mortgages
0.07MPART_ALT_DIFF  HTML and text parts are different
0.11RCVD_IN_SBL Received via a relay in Spamhaus SBL
1.14SARE_MSGID_EMPTYMessage ID is empty, or just spaces
2.00SARE_SELL_STOCK2
0.85SARE_SUB_INVESTMENTSSpammer subject - credit or money
4.00URIBL_JP_SURBL  Has URI in JP at http://www.surbl.org/lists.html
3.21URIBL_OB_SURBL  Contains an URL listed in the OB SURBL blocklist
1.00URIBL_SBL   Contains an URL listed in the SBL blocklist
1.46URIBL_WS_SURBL  Contains an URL listed in the WS SURBL blocklist
0.01URI_REDIRECTOR  Message has HTTP redirector URI
--
Martin Hepworth
Snr Systems Administrator
Solid State Logic
Tel: +44 (0)1865 842300
John Andersen wrote:
I've been seeing a lot of stock-spams slipping through lately
and none of them seem to hit any of the standard stock rule 
sets.  

These guys are often not even tripping bayes rules, and 
come in under the radar even though I run surbl and razor
rules at elevated scores.

The body clearly mentions stocks, and virtually the same 
email will arrive via different routes all trying to sell me
gold mining stocks in the Yukon.  Anybody else seeing these?
**
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote confirms that this email message has been swept
for the presence of computer viruses and is believed to be clean.   
**


Re: One single mailbox for all spam

2005-03-09 Thread Stephane Parenton
Kris Deugau wrote:
Stephane Parenton wrote:
 

A mail server, serving several domains : domain_a.com, domain_b.com,
domain_c.com etc...
for the moment, domain_a and domain_b are filtered, but if everything
runs ok, all the domains should be filtered
When a mail arrives, it's controled, scored, and if it's spam, it
appears as an attachement.
What I want is when a mail arrives, it's scored, and if it's spam,
it's not put in the user's mailbox but on a single box that will
receive only spam, whatever domain it's adressed to.
   

Since you're using procmail, you may be able to create a global
procmailrc file (/etc/procmailrc) something like this:
# File spam in the global spambox:
:0:
* ^X-Spam-Flag: YES
/var/spool/mail/spambox
 

Hi Kris,
your mail made me read more carefully the man procmail file, and 
discovered that /etc/procmailrc was quite important ;-)... it also made 
me realize that procmail was not completely used in my config My 
postfix setup is quite ok, and i decided to setup SA and procmail... so 
spamassassin works ok since it tags the headers, but i guess that 
procmail doesn't do the whole job i'm asking, for the mails are still in 
my own mailbox, and not in a separate one I'll go back to my manual 
readings ;-)

thanks a lot for your answer
Regards
Stephane


US_ASCII 8BIT rule in airmax.cf

2005-03-09 Thread Philipp Snizek
Hi

In the mailheader below there is (unless I'm blind) nowhere a trace of
US-ASCII  8Bit encoding. Nevertheless the airmax.cf ruleset has a hit
for 2 points. Could somebody please enlighten me why the airmax.cf
rule below still applies?

Thank you
Philipp

2.0 US_8BIT US-ASCII isn't an eight bit charset.

Received: by mx..xx (XX, from userid 50001)
id 3F26F1564C; Wed,  9 Mar 2005 10:39:08 +0100 (CET)
Received: from localhost by mx..xxx
with SpamAssassin (version 3.0.1);
Wed, 09 Mar 2005 10:39:08 +0100
From: senderdomain.tld [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: *SPAM(4.5)* senderdomain.tld - Newsletter
Date: Wed, 09 Mar 2005 08:53:32 +0100
Message-Id: [EMAIL PROTECTED]
X-Spam-Flag: YES
X-Spam-Checker-Version: SpamAssassin 3.0.1 (2004-10-22) on
SpamAssassin
X-Spam-Level: 
X-Spam-Status: Yes, score=4.5 required=3.0 tests=BAYES_00,HTML_40_50,

HTML_MESSAGE,HTML_TITLE_EMPTY,URI_REDIRECTOR,US_8BIT,VOWEL_FROM_6,
VOWEL_TOCC_6,VOWEL_URI_6 autolearn=no version=3.0.1
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary=--=_422EC43C.EDCE4840
Return-Path: [EMAIL PROTECTED]
X-OriginalArrivalTime: 09 Mar 2005 09:38:13.0710 (UTC)
FILETIME=[B6DFC6E0:01C5248B]

=_422EC43C.EDCE4840
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

=_422EC43C.EDCE4840
Content-Type: message/rfc822; x-spam-type=original
Content-Description: original message before SpamAssassin
Content-Disposition: attachment
Content-Transfer-Encoding: 7bit

Received: from fw01a-qfe1.senderdomain.tld(fw01a-qfe1.senderdomain.tld
[ip.address])
by mx.x.xxx (xxx) with SMTP id C91821564C
for [EMAIL PROTECTED]; Wed,  9 Mar 2005 10:38:59 +0100 (CET)
Received: from mailhost by fw01a-qfe1.senderdomain.tld
  via smtpd (for mx.xxx.xxx [ip.address]) with SMTP; 9 Mar
2005 09:38:59 UT
Received: from senderdomain.tld [ip.address] by senderdomain.tld with
ESMTP
  (SMTPD32-7.07) id AB32ECB013A; Wed, 09 Mar 2005 08:52:18 +0100
Message-ID: [EMAIL PROTECTED]
Date: Wed, 09 Mar 2005 08:53:32 +0100
From: senderdomain.tld [EMAIL PROTECTED]
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; de-DE; rv:1.4)
Gecko/20030619 Netscape/7.1 (ax)
X-Accept-Language: de-de, de
MIME-Version: 1.0
To: [EMAIL PROTECTED]
Subject: senderdomain.tld - Newsletter
Content-Type: multipart/alternative;
 boundary=060907090407000502070702
Precedence: bulk
Sender: [EMAIL PROTECTED]

--060907090407000502070702
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: quoted-printable

--060907090407000502070702
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit


--060907090407000502070702--

=_422EC43C.EDCE4840--


Re: a problem with linux 2.6.11 and sa

2005-03-09 Thread Nix
On Tue, 8 Mar 2005, George Georgalis announced authoritatively:
 Here's what I'm doing that is broken. I use tcpserver (functionally
 similar to inetd) to receive an incoming smtp connection. While the
 smtp session is still open, the message is piped to a temp file which
 is then scanned for spam, if it passes the temp file is piped to my

Both of these sound like redirection, not piping.

(I don't see what you mean by `a pipe rom /proc/kmsg', though:
pipes connect processes, not files. File redirections are
quite different and should work unchanged in 2.6.11.)
 
 An interesting technique that allows a program (such as a log writer)
 to run as an unprivileged user, while receiving privileged data. (taken
 almost verbatim from Gerrit Pape's socklog)
 
 #!/bin/sh
 exec /proc/kmsg
 exec 21
 exec softlimit -m 200 setuidgid nobody socklog ucspi
 
 This script, run by root takes its stdin from /proc/kmsg then combines
 its stdout and stderr, and exec-switches to the socklog program run
 as an ucspi application listening to the domain stream socket, as
 nobody:nogroup, with memory consumption limited to 2Mb. (and sends
 log to stdout)

This is definitely redirection, not piping. As far as I know the
implementation of redirection in the kernel remains unchanged: certainly
the need to buffer piped data doesn't exist in this case, and since the
redesign was of the buffering, this is probably not your problem :)

 It worked flawlessly until several kernel revs back when the kernel
 started protecting kmsg and wouldn't allow the user program to receive
 it,

Indeed.

   result: nothing sent to the logging program and no error. The fix
 was to run socklog as root instead of nobody.

You should be able to open it as root and read from it as another user:
i.e., your technique above shouldn't break. (I'd hope.)

-- 
 ...Hires Root Beer...
What we need these days is a stable, fast, anti-aliased root beer
with dynamic shading. Not that you can let just anybody have root.
 --- John M. Ford


RE: Whitelist collection project

2005-03-09 Thread Chris Santerre


-Original Message-
From: Robert Menschel [mailto:[EMAIL PROTECTED]
Sent: Tuesday, March 08, 2005 11:13 PM
To: users@spamassassin.apache.org
Subject: Whitelist collection project


OK, based on what little discussion there's been so far, here's a
draft proposal for people to think about.

Summary: A group of volunteers will maintain a collected/distributed
whitelist, using SpamAssassin's whitelist_from_rcvd capabilities,
similar to (but in the opposite direction as) William Stearns'
collected/distributed blacklist at
http://www.stearns.org/sa-blacklist/sa-blacklist.current.cf

Goal: There are public newsletters, services, etc., which a) do not
spam, and b) can easily be mistaken as spam by SpamAssassin for a
variety of reasons (overly aggressive custom rules, wrongly taught
Bayes system, paid advertising listing SURBL URIs, etc). Though
anti-spam devotees see these as opportunities for cleaning up our
system, for the purposes of email reliability we want these emails to
go through unhindered. 

Assumption: This activity will focus only on public newsletters,
services, etc., which normally do not contain any private information.
Therefore there will not be any privacy or confidentiality concerns
for the great majority of emails from these sources.

*snip*


- - - - - - -

Can anyone think of any guidelines to be added or changed?

Any volunteers willing to help out?

Bob Menschel

This might just be the first time I disagree with you Bob ;) 

I don't see how this ruleset will not get abused. If I was a spammer I would
make sure all my spam hit these rules to let me in. 

As a research tool it is great! Already the SURBL whitelist is one of the
best around thanks to Jeff's work. He went mad for a few weeks and collected
just about every bit of whitelist info from the net. 

IMHO, public negative scoring rules are not a good idea, despite there best
intentions. Maybe if the airlines made there emails look less like spam? :) 

-1

--Chris (Just my opinion. I've been outruled many times beforeits pretty
fun!)



Re: a problem with linux 2.6.11 and sa

2005-03-09 Thread George Georgalis
On Wed, Mar 09, 2005 at 01:06:11PM +, Nix wrote:

 An interesting technique that allows a program (such as a log writer)
 to run as an unprivileged user, while receiving privileged data. (taken
 almost verbatim from Gerrit Pape's socklog)
 
 #!/bin/sh
 exec /proc/kmsg
 exec 21
 exec softlimit -m 200 setuidgid nobody socklog ucspi
 
 This script, run by root takes its stdin from /proc/kmsg then combines
 its stdout and stderr, and exec-switches to the socklog program run
 as an ucspi application listening to the domain stream socket, as
 nobody:nogroup, with memory consumption limited to 2Mb. (and sends
 log to stdout)

This is definitely redirection, not piping. As far as I know the
implementation of redirection in the kernel remains unchanged: certainly
the need to buffer piped data doesn't exist in this case, and since the
redesign was of the buffering, this is probably not your problem :)

 It worked flawlessly until several kernel revs back when the kernel
 started protecting kmsg and wouldn't allow the user program to receive
 it,

Indeed.

   result: nothing sent to the logging program and no error. The fix
 was to run socklog as root instead of nobody.

You should be able to open it as root and read from it as another user:
i.e., your technique above shouldn't break. (I'd hope.)

Here is a nice proof that kmsg did become a problem around 2.6.0
http://article.gmane.org/gmane.comp.misc.pape.general/595
http://thread.gmane.org/gmane.comp.misc.pape.general/590


It (Gerrit Pape's technique) very defiantly stopped working a few revs
back (2.6.7?). I'm seeing a similar failed read from /dev/rtc and
mplayer with 2.6.10, now too.

http://lkml.org/lkml/2005/3/8/226

while read file; do mplayer $file ; done mediafiles.txt

Failed to open /dev/rtc: Permission denied

for file in `cat mediafiles.txt`; do mplayer $file ; done

works.

// George

-- 
George Georgalis, systems architect, administrator Linux BSD IXOYE
http://galis.org/george/ cell:646-331-2027 mailto:[EMAIL PROTECTED]


URIBL_SBL Weirdness

2005-03-09 Thread Rikhardur.EGILSSON


Can anyone explain to me what the URIBL_SBL rule does (I.e. which list Is
used)

I have an email that this rule catches because of a email address inside it.

The SpamAssassin report lists it as :
0.6 URIBL_SBL   Contains an URL listed in the SBL blocklist
[URIs: gov.ru]

But no matter what I try, I can´t find the blacklist that Is used.

Since we are an International Organisation, this is a very inconvenient
situaton.

- Ríkharður



Re: Whitelist collection project

2005-03-09 Thread Jeff Chan
On Wednesday, March 9, 2005, 7:30:20 AM, Chris Santerre wrote:
 I don't see how this ruleset will not get abused. If I was a spammer I would
 make sure all my spam hit these rules to let me in. 

 As a research tool it is great! Already the SURBL whitelist is one of the
 best around thanks to Jeff's work. He went mad for a few weeks and collected
 just about every bit of whitelist info from the net. 

Yep, you're right.  We don't want spammers packing their
messages full of legitimate domains and getting them through
SA because of it.

Jeff C.
-- 
Jeff Chan
mailto:[EMAIL PROTECTED]
http://www.surbl.org/



Re: Whitelist collection project

2005-03-09 Thread Daryl C. W. O'Shea
Chris Santerre wrote:
This might just be the first time I disagree with you Bob ;) 

I don't see how this ruleset will not get abused. If I was a spammer I would
make sure all my spam hit these rules to let me in. 

As a research tool it is great! Already the SURBL whitelist is one of the
best around thanks to Jeff's work. He went mad for a few weeks and collected
just about every bit of whitelist info from the net. 

IMHO, public negative scoring rules are not a good idea, despite there best
intentions. Maybe if the airlines made there emails look less like spam? :) 

-1
--Chris (Just my opinion. I've been outruled many times beforeits pretty
fun!)
How do you propose that whitelist_from_rcvd or whitelist_from_spf be 
abused, other than due to a mis configured or compromised server?

Daryl


Re: Whitelist collection project

2005-03-09 Thread Jeff Chan
On Wednesday, March 9, 2005, 8:03:49 AM, Daryl O'Shea wrote:
 Chris Santerre wrote:
 This might just be the first time I disagree with you Bob ;) 
 
 I don't see how this ruleset will not get abused. If I was a spammer I would
 make sure all my spam hit these rules to let me in. 
 
 As a research tool it is great! Already the SURBL whitelist is one of the
 best around thanks to Jeff's work. He went mad for a few weeks and collected
 just about every bit of whitelist info from the net. 
 
 IMHO, public negative scoring rules are not a good idea, despite there best
 intentions. Maybe if the airlines made there emails look less like spam? :) 
 
 -1
 
 --Chris (Just my opinion. I've been outruled many times beforeits pretty
 fun!)

 How do you propose that whitelist_from_rcvd or whitelist_from_spf be 
 abused, other than due to a mis configured or compromised server?

Oh hang on, it depends on whether it's looking at appropriate
headers like whitelist_from_rcvd or whitelist_from_spf do, or
whether it's looking at message body URIs do like uridnsbl
commands do.

As the data was proposed to be collected from local
whitelist_from_rcvd lists, apparently it would be for headers.
That should be safe, and we could probably still use them to
limited effect in SURBLs to keep those domains off SURBLs.

It's still a good idea.

Jeff C.
-- 
Jeff Chan
mailto:[EMAIL PROTECTED]
http://www.surbl.org/



Re: Whitelist collection project

2005-03-09 Thread Theo Van Dinter
On Wed, Mar 09, 2005 at 08:08:36AM -0800, Jeff Chan wrote:
 That should be safe, and we could probably still use them to
 limited effect in SURBLs to keep those domains off SURBLs.

It could also be used to generate default uridnsbl_skip_domain entries
as well. ;)

Including the domains in spams doesn't get the spammer anywhere, and it
means less useless queries against URIBLs. :)

-- 
Randomly Generated Tagline:
Daffy Duck of Borg:You're too despicable to assimilate.


pgpJeBqxjDhtD.pgp
Description: PGP signature


Re: URIBL_SBL Weirdness

2005-03-09 Thread Jeff Chan
On Wednesday, March 9, 2005, 7:50:13 AM, Rikhardur EGILSSON wrote:
 Can anyone explain to me what the URIBL_SBL rule does (I.e. which list Is
 used)

RTFM?

uridnsbl checks a URI domain's nameserver against
sbl.spamhaus.org.

 I have an email that this rule catches because of a email address inside it.

 The SpamAssassin report lists it as :
 0.6 URIBL_SBL   Contains an URL listed in the SBL blocklist
 [URIs: gov.ru]

 But no matter what I try, I can´t find the blacklist that Is used.

What this means is that the nameserver for gov.ru is listed
in SBL.

  http://www.spamhaus.org/sbl/sbl.lasso?query=SBL13545

 Ref: SBL13545
 
 213.59.0.0/23 is listed on the Spamhaus Block List (SBL)
 
 26-Feb-2005 02:47 GMT | SR01
 
   Ruslan Ibragimov / send-safe.com
 213.59.0.0/23 is listed on the Register Of Known Spam
 Operations (ROKSO) database as being assigned to, under the
 control of, or providing service to a known professional spam
 operation run by Ruslan Ibragimov / send-safe.com. 
 Rostelecom Corporate Mail Relays (escalation)

It looks like Spamhaus has listed all of Rostelecom since
it hosts send-safe.com.

Personally I don't like escalations like that, but I don't run
Spamhaus.

Fortunately URIBL_SBL usually gets a fairly low score due to
false positives like this.  I'd say keep it low.

Jeff C.
-- 
Jeff Chan
mailto:[EMAIL PROTECTED]
http://www.surbl.org/



RE: URIBL_SBL Weirdness

2005-03-09 Thread Chris Santerre

 The SpamAssassin report lists it as :
 0.6 URIBL_SBL   Contains an URL listed in the SBL blocklist
 [URIs: gov.ru]

 But no matter what I try, I can´t find the blacklist that Is used.

What this means is that the nameserver for gov.ru is listed
in SBL.

  http://www.spamhaus.org/sbl/sbl.lasso?query=SBL13545

 Ref: SBL13545
 
 213.59.0.0/23 is listed on the Spamhaus Block List (SBL)
 
 26-Feb-2005 02:47 GMT | SR01
 
   Ruslan Ibragimov / send-safe.com
 213.59.0.0/23 is listed on the Register Of Known Spam
 Operations (ROKSO) database as being assigned to, under the
 control of, or providing service to a known professional spam
 operation run by Ruslan Ibragimov / send-safe.com. 
 Rostelecom Corporate Mail Relays (escalation)

It looks like Spamhaus has listed all of Rostelecom since
it hosts send-safe.com.

Personally I don't like escalations like that, but I don't run
Spamhaus.

Hell yeah to Spamhaus! I like escalations like that! Its the only way hosts
are going to learn to keep there own backyard clean. They have no preasure
if they don't get listed. 

Of course, an escalation like this won't happen on SURBL. There are ways of
making contributors comply, and resistence is futile

--Chris (We are SURBL...the collective...OK who left the cube door open
again? )


RE: Windows with ESA - statistics?

2005-03-09 Thread Bowie Bailey
From: Tim P [mailto:[EMAIL PROTECTED]
 
 I am using spamassasin on windows with the ESA message sync (
 http://www.christopherlewis.com/ExchangeSpamAssassin.htm ) and
 would like to have some statistics so that I can better tune the
 spam assassin (particularly with the minimum spam setting and the
 purge on discovery setting).
 
 As perl is already installed what I really need is a perl script
 that can go through the messages that the ESA dumps out (.out
 files that can be read by notepad), grab the following lines and
 dump them into a file format (like a csv or a delimited text
 file) so that I can use something to give me statistics.
 
 X-Spam-Status: Yes, score=28.9 
 Date: Tue, 4 Jan 2005 06:36:10 -0700
 
 I would really like to be able to give statistics by date (daily,
 weekly, monthly), averages, numbers of spams/hams for a time
 period.  Most of that can be done using excel if I have to but
 its getting that info into a readable fileformat that is beyond
 me.  Anyone out there know how to do something like that?

Parsing the file and producing delimited text that can be imported
into Excel is simple with Perl.

Assuming that each email scanned will produce both of the lines you
listed and assuming that those entries are on their own lines and
not part of a longer line, this should work for you (untested):

print Date\tStatus\tScore\n;
while ()
{
if (/^X-Spam-Status: (Yes|No), score=([0-9.]+)/)
{
$status = $1;
$score = $2;
}
if (/^Date: (.*) [-+]\d{5}$/)
{
$date = $1;
}
if ($status and $score and $date)
{
print $date\t$status\t$score\n;
undef $date;
undef $status;
undef $score;
}
}

Output would be tab separated like this (formatted for readability):

DateStatusScore
Tue, 4 Jan 2005 06:36:10Yes   28.9

Bowie


RE: Whitelist collection project

2005-03-09 Thread Chris Santerre


-Original Message-
From: Daryl C. W. O'Shea [mailto:[EMAIL PROTECTED]
Sent: Wednesday, March 09, 2005 11:04 AM
To: Chris Santerre
Cc: 'Robert Menschel'; users@spamassassin.apache.org
Subject: Re: Whitelist collection project


Chris Santerre wrote:
 This might just be the first time I disagree with you Bob ;) 
 
 I don't see how this ruleset will not get abused. If I was a 
spammer I would
 make sure all my spam hit these rules to let me in. 
 
 As a research tool it is great! Already the SURBL whitelist 
is one of the
 best around thanks to Jeff's work. He went mad for a few 
weeks and collected
 just about every bit of whitelist info from the net. 
 
 IMHO, public negative scoring rules are not a good idea, 
despite there best
 intentions. Maybe if the airlines made there emails look 
less like spam? :) 
 
 -1
 
 --Chris (Just my opinion. I've been outruled many times 
beforeits pretty
 fun!)

How do you propose that whitelist_from_rcvd or whitelist_from_spf be 
abused, other than due to a mis configured or compromised server?

Daryl

First I propose I don't answer anymore email until I get off this cold
medication :) 

Second, I believe SPF records can be spoofed/use in a disposibal manner. But
thats my medicated brain half telling me I might remember reading something
about that. 

As for rcvd, I'm not sure how secure that is to faked headers. But you can
bet they are going to try to abuse it anyway they can. 

If you can get code to deal with those issues, then hell yeah! 

I also like Theos idea of using it for the 'skipped' domains. 

--Chris 


Re: SPF problems with this list

2005-03-09 Thread Kelson
Steven Stern wrote:
v=spf1 a mx ptr include:earthlink.net ~all
I smarthost my mail through smtpauth.earthlink.net.  The mail path then
bounces around inside earthlink for a while. The spf why page says:
hermes.apache.org saw a message coming from the IP address 209.86.89.61
which
is smtpauth01.mail.atl.earthlink.net; the sender claimed to be
[EMAIL PROTECTED]
Earthlink's SPF record at present appears to be:
v=spf1 ip4:207.217.120.0/23 ip4:207.69.200.0/24 ip4:209.86.93.0/24 
ip4:207.69.195.0/24 ?all

This doesn't include the server they sent your message out from.
How can I configure the SPF record to work?
Your record's fine.  Earthlink messed up by not listing all their 
outgoing servers in their SPF record, or by setting up new servers 
without updating their SPF record.

Notify Earthlink of the problem, and once they've updated their own SPF 
record it should be fine.

Is it possible to use SPF in this environment?
Of course, there is one more issue: hermes.apache.org should not be 
rejecting mail based on a *softfail*, which is what that message should 
have triggered.  ~all means mail will probably never come from any 
other servers than these, but we're not absolutely certain, not mail 
will only ever come from these servers.

--
Kelson Vibber
SpeedGate Communications www.speed.net


Re: Whitelist collection project

2005-03-09 Thread Kelson
Chris Santerre wrote:
Second, I believe SPF records can be spoofed
Only to the extent that any DNS record can be spoofed.
use in a disposibal manner.
In the sense that you can create any SPF entry you want... for your own 
domain.  I could set one up with +all indicating that mail sent via 
any server on the Internet using my domain should be considered valid. 
I could buy up 100 disposable domains and put SPF on all of them.

That's why an SPF pass was never intended to bypass filters by itself... 
but it can be used to decide whether an address is reliable enough to 
check it against a whitelist.

Within the SpamAssassin scoring paradigm:
whitelisted domain without SPF = no rule triggered
whitelisted domain with SPF pass = apply nice rule  subtract points
whitelisted domain with SPF fail = apply forgery rule  add points
(I'm assuming that's how the feature is to be implemented, because that 
seems to me the most reasonable way to do it.)

--
Kelson Vibber
SpeedGate Communications www.speed.net


Re: Whitelist collection project

2005-03-09 Thread Daryl C. W. O'Shea
Kelson wrote:
Chris Santerre wrote:
Second, I believe SPF records can be spoofed

Only to the extent that any DNS record can be spoofed.
use in a disposibal manner.

In the sense that you can create any SPF entry you want... for your own 
domain.  I could set one up with +all indicating that mail sent via 
any server on the Internet using my domain should be considered valid. I 
could buy up 100 disposable domains and put SPF on all of them.

That's why an SPF pass was never intended to bypass filters by itself... 
but it can be used to decide whether an address is reliable enough to 
check it against a whitelist.

Within the SpamAssassin scoring paradigm:
whitelisted domain without SPF = no rule triggered
whitelisted domain with SPF pass = apply nice rule  subtract points
Yup.  Currently it's -7.5 for the whitelist match  SPF pass and then 
another -7.5 if the envelope sender and header 'From:' match, for a 
total of -15 like the current whitelist_from_rcvd.


whitelisted domain with SPF fail = apply forgery rule  add points
I had considered also adding a rule for whitelisted domains that failed 
an SPF check, but thought (for the time being anyway) it'd be best not 
to penalize them anymore than the current SPF fail rule since many 
domains don't have up-to-date SPF records (often because they forget to 
add a webserver that sends out mail directly).


(I'm assuming that's how the feature is to be implemented, because that 
seems to me the most reasonable way to do it.)


Daryl


running spamd remotely

2005-03-09 Thread dave
What is involved in setting up spamassassin to run on a remote machine?
After installing it on hostA (mailserver) and hostB, I get onto hostA
and tweak my procmailrc to have
:0fw: $HOME/spamassassin.lock
| $SPAMHOME/bin/spamc -d hostB.FQDN
... (if spam, then filter)
And on hostB, I start it up with
$SPAMHOME/bin/spamd -d --syslog-socket=inet -r /var/tmp/spamdnew.pid \
  --allowed-ips=ip of hostA,ip of hostB
But I don't even see anything in syslog on hostB.
TIA
 =-=-=-=-=-=-=-=-=-=-  generated by /dev/dave -=-=-=-=-=-=-=-=-=-=-=-=
 David SternUniversity of Maryland
   Institute for Advanced Computer Studies


Re: running spamd remotely

2005-03-09 Thread Daryl C. W. O'Shea
[EMAIL PROTECTED] wrote:
What is involved in setting up spamassassin to run on a remote machine?
After installing it on hostA (mailserver) and hostB, I get onto hostA
and tweak my procmailrc to have
:0fw: $HOME/spamassassin.lock
| $SPAMHOME/bin/spamc -d hostB.FQDN
... (if spam, then filter)
And on hostB, I start it up with
$SPAMHOME/bin/spamd -d --syslog-socket=inet -r /var/tmp/spamdnew.pid \
  --allowed-ips=ip of hostA,ip of hostB
But I don't even see anything in syslog on hostB.
TIA
I'm assuming when you say you don't see anything, you mean you don't 
see anything about 'hostA' trying to connect.

Do you have a firewall running on the spamd host?  You'll need to open 
up tcp port 783 if you do.

Daryl


SA addr tests need to be updated

2005-03-09 Thread Eric A. Hall

SA 3.0.2 currently performs a handful of tests against HELO greetings that
contain an IP address. These tests don't currently fire when an address
literal is used in the HELO greeting, but they should.

See section 3.6 of RFC 2821:

| -  The domain name given in the EHLO command MUST BE either a primary
|host name (a domain name that resolves to an A RR) or, if the host
|has no name, an address literal as described in section 4.1.1.1.

and section 4.1.3:

4.1.3 Address Literals

| Sometimes a host is not known to the domain name system and
| communication (and, in particular, communication to report and repair
| the error) is blocked.  To bypass this barrier a special literal form
| of the address is allowed as an alternative to a domain name.  For
| IPv4 addresses, this form uses four small decimal integers separated
| by dots and enclosed by brackets such as [123.255.37.2], which
| indicates an (IPv4) Internet Address in sequence-of-octets form.  For
| IPv6 and other forms of addressing that might eventually be
| standardized, the form consists of a standardized tag that
| identifies the address syntax, a colon, and the address itself, in a
| format specified as part of the IPv6 standards [17].

Technically, addresses that are NOT enclosed in brackets are illegal, but
those are the only ones that SA sniffs out currently.

Extending the current rules to include literals can probably be done by
simply changing the sniff code to look for open and close brackets, but I
haven't looked so I'm just guessing. As far as that goes, the tests might
already do this, and just not firing.

I think the four affected rules are RCVD_HELO_IP_MISMATCH,
RCVD_NUMERIC_HELO, RCVD_ILLEGAL_IP, RCVD_BY_IP


-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: running spamd remotely

2005-03-09 Thread Dave Goodrich
[EMAIL PROTECTED] wrote:
What is involved in setting up spamassassin to run on a remote machine?
After installing it on hostA (mailserver) and hostB, I get onto hostA
and tweak my procmailrc to have
:0fw: $HOME/spamassassin.lock
| $SPAMHOME/bin/spamc -d hostB.FQDN
... (if spam, then filter)
What does a command line test tell you?
cat your.testmsg | /your/path/bin/spamc -d yourhost.com
And on hostB, I start it up with
$SPAMHOME/bin/spamd -d --syslog-socket=inet -r /var/tmp/spamdnew.pid \
  --allowed-ips=ip of hostA,ip of hostB
It would tell you there is no spamd listening, you have spamc making a 
tcp connection to spamd on another host that is listening to a socket.
You need -i ip.address in your spamd startup.

http://spamassassin.apache.org/full/3.0.x/dist/doc/spamd.html
DAve

But I don't even see anything in syslog on hostB.
TIA
 =-=-=-=-=-=-=-=-=-=-  generated by /dev/dave -=-=-=-=-=-=-=-=-=-=-=-=
 David SternUniversity of Maryland
   Institute for Advanced Computer Studies


--
Dave Goodrich
Systems Administrator
http://www.tls.net
Get rid of Unwanted Emails...get TLS Spam Blocker!


Re: SPF problems with this list

2005-03-09 Thread jdow
I believe you have to rely on Earthlink's smtpauth for its SPF.
That's what I do.

{^_^}
- Original Message - 
From: Steven Stern [EMAIL PROTECTED]


 My SPF record was working, but is now failing for this list.  So, it
 seems that SPF checking has ratcheted up a notch. I've deleted my SPF
 txt record in order to send this.
 
 Anyhow...
 
 The record was
 
 v=spf1 a mx ptr include:earthlink.net ~all
 
 I smarthost my mail through smtpauth.earthlink.net.  The mail path then
 bounces around inside earthlink for a while. The spf why page says:
 
 hermes.apache.org saw a message coming from the IP address 209.86.89.61
 which
 is smtpauth01.mail.atl.earthlink.net; the sender claimed to be
 [EMAIL PROTECTED]
 
 How can I configure the SPF record to work? I can't put in an
 a:smtpauth01.mail.atl.earthlink.net because next time it may go
 through 02,
 or 03, etc.
 
 Is it possible to use SPF in this environment?
 -- 
 
 Steve
 
 



Re: URIBL_SBL Weirdness

2005-03-09 Thread Matt Kettler
At 10:50 AM 3/9/2005, [EMAIL PROTECTED] wrote:
Can anyone explain to me what the URIBL_SBL rule does (I.e. which list Is
used)
I have an email that this rule catches because of a email address inside it.
The SpamAssassin report lists it as :
0.6 URIBL_SBL   Contains an URL listed in the SBL blocklist
[URIs: gov.ru]

The URIBL_SBL rule checks the IPs of the nameservers listed in the NS 
record against the spamhaus SBL list.

[EMAIL PROTECTED] mail]# dig ns gov.ru
;  DiG 9.2.1  ns gov.ru
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 61199
;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 2
;; QUESTION SECTION:
;gov.ru.IN  NS
;; ANSWER SECTION:
gov.ru. 345600  IN  NS  ns.rtcomm.ru.
gov.ru. 345600  IN  NS  ns1.gov.ru.
gov.ru. 345600  IN  NS  ns.gov.ru.
gov.ru. 345600  IN  NS  ns.relarn.ru.
host ns.rtcomm.ru
ns.rtcomm.ru has address 213.59.0.3
213.59.0.3 is listed in the SBL, in the following records:
   * http://www.spamhaus.org/sbl/sbl.lasso?query=SBL13545SBL13545
http://www.spamhaus.org/sbl/sbl.lasso?query=SBL13545 



Re: running spamd remotely

2005-03-09 Thread Matt Kettler
At 01:31 PM 3/9/2005, [EMAIL PROTECTED] wrote:
$SPAMHOME/bin/spamd -d --syslog-socket=inet -r /var/tmp/spamdnew.pid \
   --allowed-ips=ip of hostA,ip of hostB
But I don't even see anything in syslog on hostB.
erm, that's not going to cause it to syslog to hostB... that's going to 
cause spamd to allow hostB to run spamc and connect.

If you want to redirect your syslog output, do that in syslog.conf.  



Re: running spamd remotely

2005-03-09 Thread dave
On Wed, 9 Mar 2005, Dave Goodrich wrote:
[EMAIL PROTECTED] wrote:
What is involved in setting up spamassassin to run on a remote machine?
After installing it on hostA (mailserver) and hostB, I get onto hostA
and tweak my procmailrc to have
:0fw: $HOME/spamassassin.lock
| $SPAMHOME/bin/spamc -d hostB.FQDN
... (if spam, then filter)
What does a command line test tell you?
cat your.testmsg | /your/path/bin/spamc -d yourhost.com

Great idea. First, as mentioned below, I changed startup to add -i  ie
$SPAMHOME/bin/spamd -d --syslog-socket=inet -r /var/tmp/spamdnew.pid \
  --allowed-ips=HostA-ip,HostB-ip,127.0.0.1 -i HostB
then on HostA,
% cat /etc/motd | $SPAMHOME/bin/spamc -d hostB
X-Spam-Checker-Version: SpamAssassin 3.0.2 (2004-11-16) on
HostB.fqdn
X-Spam-Level: 
X-Spam-Status: No, score=-0.2 required=4.0 tests=ALL_TRUSTED,MISSING_DATE,
MISSING_SUBJECT,NONLOCAL autolearn=unavailable version=3.0.2

(HostA had SA v.265 installed, HostB has SA v3.02)
and the above indeed spews spamd stuff to syslog on hostB

And on hostB, I start it up with
$SPAMHOME/bin/spamd -d --syslog-socket=inet -r /var/tmp/spamdnew.pid \
  --allowed-ips=ip of hostA,ip of hostB
It would tell you there is no spamd listening, you have spamc making a tcp 
connection to spamd on another host that is listening to a socket.
You need -i ip.address in your spamd startup.

Thanks a lot for your help!
 =-=-=-=-=-=-=-=-=-=-  generated by /dev/dave -=-=-=-=-=-=-=-=-=-=-=-=
 David SternUniversity of Maryland
   Institute for Advanced Computer Studies


Re: SA addr tests need to be updated

2005-03-09 Thread List Mail User
Eric,

I believe that you have misinterpreted (and only partially quoted)
RFC2821.  A more correct interpretation (or at least different) and a fuller
set of quotations is below.


SA 3.0.2 currently performs a handful of tests against HELO greetings that
contain an IP address. These tests don't currently fire when an address
literal is used in the HELO greeting, but they should.

See section 3.6 of RFC 2821:

| -  The domain name given in the EHLO command MUST BE either a primary
|host name (a domain name that resolves to an A RR) or, if the host
|has no name, an address literal as described in section 4.1.1.1.


3.6 Domains

   Only resolvable, fully-qualified, domain names (FQDNs) are permitted
   when domain names are used in SMTP.  In other words, names that can
   be resolved to MX RRs or A RRs (as discussed in section 5) are
   permitted, as are CNAME RRs whose targets can be resolved, in turn,
   to MX or A RRs.  Local nicknames or unqualified names MUST NOT be
   used.  There are two exceptions to the rule requiring FQDNs:
...

Nothing in either the section you have quoted, or the one I have
allows a hostname which is not a FQDN to be used.

and then section 4.1.1.1 downgrades the MUST which you quote to a SHOULD.


4.1.1.1  Extended HELLO (EHLO) or HELLO (HELO)

   These commands are used to identify the SMTP client to the SMTP
   server.  The argument field contains the fully-qualified domain name
   of the SMTP client if one is available.  In situations in which the
   SMTP client system does not have a meaningful domain name (e.g., when
   its address is dynamically allocated and no reverse mapping record is
   available), the client SHOULD send an address literal (see section
   4.1.3), optionally followed by information that will help to identify
   the client system.  y The SMTP server identifies itself to the SMTP
   client in the connection greeting reply and in the response to this
   command.

...
(The 'y' which is apparently misplaced exists in the original document, it is
not a typo by me.)

Please note there is absolutely no requirement for an 'A' record;
My domain does not have one!  The requirement is for either an 'A' record
or an 'MX' record.  Admittedly, the requirement for an 'A' record is indeed
recommended as a SHOULD, but is not not a MUST.  Section 4.1.1.1, while
not as clear as it should be, is a catchall that basically allows anything
at all that is a possible FQDN and that is not identifiable as a CNAME (it
is legal in general for a CNAME to otherwise also be a FQDN, I have subdomains
for which this is true - I just don't send mail from them).  Also there is no
wording requiring the recommended reverse mapping record be an 'A' record,
any record will suffice (even a 'RP', 'TXT', 'WKS' or 'HINFO' etc.).

Also, note that RFC2821 is *still* on the standards track and has
not yet (and probably like most RFCs will never be) ratified (though RFC821
was and thus is still valid despite the intention for RFC2821 to replace it).

Further, the section you do quote makes clear that hostnames which are
not also FQDNs are illegal (yet that is actually the standard practice in use).
In other words using any old hostname to a HELO/EHLO is *not* legal by RFC2821,
but rather it is intended that one use a domain name (which, of course may be
a subdomain) which SHOULD have an 'A' record *or* MUST have an 'MX' record
*or* SHOULD use an address literal (with the caveat that 4.1.1.1 makes, most
probably because of oversight, nearly anything legal which could be interpreted
as a FQDN - hence hostnames, which are recognizable, but not identifiable
domains themselves, strictly should get a 4xx response, but I've never seen
a system which does that).

The only examples I still know of which abide strictly by RFC2821
are sgi.com and ibm.com. sun.com used to, but doesn't anymore (I have
over a decade of logs to demonstrate this).  And the most common case of using
a hostname which is not also a FQDN is clearly not allowed (again, despite
that being the standard practice) - i.e. FQHN != FQDN.

and section 4.1.3:

4.1.3 Address Literals

| Sometimes a host is not known to the domain name system and
| communication (and, in particular, communication to report and repair
| the error) is blocked.  To bypass this barrier a special literal form
| of the address is allowed as an alternative to a domain name.  For
| IPv4 addresses, this form uses four small decimal integers separated
| by dots and enclosed by brackets such as [123.255.37.2], which
| indicates an (IPv4) Internet Address in sequence-of-octets form.  For
| IPv6 and other forms of addressing that might eventually be
| standardized, the form consists of a standardized tag that
| identifies the address syntax, a colon, and the address itself, in a
| format specified as part of the IPv6 standards [17].

Technically, addresses that are NOT enclosed in brackets are illegal, but
those 

Re: SA addr tests need to be updated

2005-03-09 Thread Justin Mason
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Eric A. Hall writes:
 SA 3.0.2 currently performs a handful of tests against HELO greetings that
 contain an IP address. These tests don't currently fire when an address
 literal is used in the HELO greeting, but they should.

actually, that's deliberate -- compare the frequencies of an RFC-2821
address literal, vs. a raw address, and you'll notice that the latter
is much more prevalent in spam.

- --j.

 See section 3.6 of RFC 2821:
 
 | -  The domain name given in the EHLO command MUST BE either a primary
 |host name (a domain name that resolves to an A RR) or, if the host
 |has no name, an address literal as described in section 4.1.1.1.
 
 and section 4.1.3:
 
 4.1.3 Address Literals
 
 | Sometimes a host is not known to the domain name system and
 | communication (and, in particular, communication to report and repair
 | the error) is blocked.  To bypass this barrier a special literal form
 | of the address is allowed as an alternative to a domain name.  For
 | IPv4 addresses, this form uses four small decimal integers separated
 | by dots and enclosed by brackets such as [123.255.37.2], which
 | indicates an (IPv4) Internet Address in sequence-of-octets form.  For
 | IPv6 and other forms of addressing that might eventually be
 | standardized, the form consists of a standardized tag that
 | identifies the address syntax, a colon, and the address itself, in a
 | format specified as part of the IPv6 standards [17].
 
 Technically, addresses that are NOT enclosed in brackets are illegal, but
 those are the only ones that SA sniffs out currently.
 
 Extending the current rules to include literals can probably be done by
 simply changing the sniff code to look for open and close brackets, but I
 haven't looked so I'm just guessing. As far as that goes, the tests might
 already do this, and just not firing.
 
 I think the four affected rules are RCVD_HELO_IP_MISMATCH,
 RCVD_NUMERIC_HELO, RCVD_ILLEGAL_IP, RCVD_BY_IP
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Exmh CVS

iD8DBQFCL2QQMJF5cimLx9ARAssJAJ9n0LXbN+O1mvJ0tZTljBx9GBi5fACfQpkv
pGW3PFSvh56f/auv27fmMY8=
=m4XF
-END PGP SIGNATURE-



Re: SA addr tests need to be updated

2005-03-09 Thread Eric A. Hall

On 3/9/2005 4:01 PM, Justin Mason wrote:

SA 3.0.2 currently performs a handful of tests against HELO greetings that
contain an IP address. These tests don't currently fire when an address
literal is used in the HELO greeting, but they should.
 
 actually, that's deliberate -- compare the frequencies of an RFC-2821
 address literal, vs. a raw address, and you'll notice that the latter
 is much more prevalent in spam.

That's true, but the rules that compare for addresses should still check
the address in literals.

I think the four affected rules are RCVD_HELO_IP_MISMATCH,
RCVD_NUMERIC_HELO, RCVD_ILLEGAL_IP, RCVD_BY_IP

if the addr doesn't check out...

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: SPF problems with this list

2005-03-09 Thread Matt Kettler
At 07:57 AM 3/9/2005, Steven Stern wrote:
The record was
v=spf1 a mx ptr include:earthlink.net ~all
I smarthost my mail through smtpauth.earthlink.net.  The mail path then
bounces around inside earthlink for a while. The spf why page says:
hermes.apache.org saw a message coming from the IP address 209.86.89.61
which
is smtpauth01.mail.atl.earthlink.net; the sender claimed to be
[EMAIL PROTECTED]
When you do a SPF include, it basicaly winds up including the SPF record 
for earthlink.net.

;; QUESTION SECTION:
;earthlink.net. IN  TXT
;; ANSWER SECTION:
earthlink.net.  1800IN  TXT v=spf1 
ip4:207.217.120.0/23 ip4:207.69.200.0/24 ip4:209.86.93.0/24 
ip4:207.69.195.0/24 ?all


However, if you look, earthlink's SPF record doesn't include 209.86.98.61, 
therefore you fail the test.



Re: SA addr tests need to be updated

2005-03-09 Thread Eric A. Hall

On 3/9/2005 3:29 PM, List Mail User wrote:

 See section 3.6 of RFC 2821:
 
 | -  The domain name given in the EHLO command MUST BE either a
 primary |host name (a domain name that resolves to an A RR) or,
 if the host |has no name, an address literal as described in
 section 4.1.1.1.

 3.6 Domains

 used.  There are two exceptions to the rule requiring FQDNs: ...
 
 Nothing in either the section you have quoted, or the one I have allows
 a hostname which is not a FQDN to be used.

see the first exception, which is the text I cited above.

 Technically, addresses that are NOT enclosed in brackets are illegal,
 but those are the only ones that SA sniffs out currently.
 
 Of course, my machines just refuse these during the SMTP conversation, 

Many do.

BTW, postfix has similar problems wrt literals. For example, if postfix
gets a regular address (non-literal) in the HELO, it will split the
address into octets and do lookups for PERMIT/REJECT ACLs on incrementally
smaller sets, which is all very nice. But if it finds a literal, it
doesn't parse for the address inside, and treats the literal like a domain
name. Another bug here is that the strict-syntax checks in postfix don't
match against non-literal addresses, which it should (RFC1123 spells out
what is a valid hostname, and all-numerics is clearly not legal).

 Please be careful and check the definitions and references in each 
 document

indeed

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Possible per-user levels of grey whitelist

2005-03-09 Thread Linda W
Do you mean have it learn on my Sent folder list?
Would it help that much though since the sender is always me and will be
lacking all the Received markers that incoming mail normally has?

Justin Mason wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Effectively, there's already a way to do that...  use Bayes to
learn those mails as ham!   It works very effectively for that
purpose.
- --j.
Linda W writes:



Re: Possible per-user levels of grey whitelist

2005-03-09 Thread Justin Mason
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


should still be OK for whitelisting purposes -- as the words
in the mail will be correct.   I wouldn't use it to learn a mail
as spam, of course, but as ham it won't do any harm.

- --j.

Linda W writes:
 Do you mean have it learn on my Sent folder list?
 
 Would it help that much though since the sender is always me and will be
 lacking all the Received markers that incoming mail normally has?
 
 Justin Mason wrote:
  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA1
  
  
  Effectively, there's already a way to do that...  use Bayes to
  learn those mails as ham!   It works very effectively for that
  purpose.
  
  - --j.
  
  Linda W writes:
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Exmh CVS

iD8DBQFCL3MIMJF5cimLx9ARAk3JAKCJD7mJkD3e6EyG5S3Du66rJGPWMACfdmCb
8cakxjiYcrXRdhKEXcdVwxc=
=7YoN
-END PGP SIGNATURE-



Re: multiple hosts for spamc -d ?

2005-03-09 Thread email builder
Some postings a while back led me to believe that I could specify
 multiple
  hosts for the -d option of spamc.  I understood that it would operate
  basically on a fallback basis (not load balancing).  However, I can't
 seem to
  get spamc to use more than one of the -d listings.  I've tried:
  
  /usr/bin/spamc -d 123.45.67.8 -d 127.0.0.1
  /usr/bin/spamc -d 123.45.67.8 127.0.0.1
  
And switched the order around and fiddled with hostnames vs IP
 addresses,
  but no dice.  I understand the man page to say that it will use fallback
  logic if the hostname resolves (via DNS query, right?) to more than one
  host... so why can't I give it those hosts directly?
  
  TIA!
 
  From http://spamassassin.apache.org/full/3.0.x/dist/doc/spamc.html
 
 -d host
  In TCP/IP mode, connect to spamd server on given host (default: 
 localhost).
 
  If host resolves to multiple addresses, then spamc will fail-over 
 to the other addresses, if the first one cannot be connected to
 
 You need to have a host that has multiple A records.
 
 spamd.domain.com A 123.123.123.123
 spamd.domain.com A 123.123.123.124
 spamd.domain.com A 123.123.123.125
 
 /usr/bin/spamc -d spamd.domain.com
 
 If your DNS server sends the results back in a different order each time 
 then it will not be a fallback but a round robin. You might be able to 
 simply use /etc/host entries. I've never tried it as I use qmail which 
 will not use the host file, so I always rely on DNS. Don't know if spamc 
 will use the host file or not.

Huh, I am not familiar with how to use /etc/hosts as a DNS source.  Can you
clarify?  

Mainly my question was if/how I could avoid making it a DNS query.  I'd like
to simply hand spamc the two addresses that I want it to have manually, and I
do *NOT* want round-robin, I want failover

Your help is much appreciated!





__ 
Celebrate Yahoo!'s 10th Birthday! 
Yahoo! Netrospective: 100 Moments of the Web 
http://birthday.yahoo.com/netrospective/


Re: SA addr tests need to be updated

2005-03-09 Thread List Mail User


On 3/9/2005 3:29 PM, List Mail User wrote:

 See section 3.6 of RFC 2821:
 
 | -  The domain name given in the EHLO command MUST BE either a
 primary |host name (a domain name that resolves to an A RR) or,
 if the host |has no name, an address literal as described in
 section 4.1.1.1.

 3.6 Domains

 used.  There are two exceptions to the rule requiring FQDNs: ...
 
 Nothing in either the section you have quoted, or the one I have allows
 a hostname which is not a FQDN to be used.

see the first exception, which is the text I cited above.

 Technically, addresses that are NOT enclosed in brackets are illegal,
 but those are the only ones that SA sniffs out currently.
 
 Of course, my machines just refuse these during the SMTP conversation, 

Many do.

BTW, postfix has similar problems wrt literals. For example, if postfix
gets a regular address (non-literal) in the HELO, it will split the
address into octets and do lookups for PERMIT/REJECT ACLs on incrementally
smaller sets, which is all very nice. But if it finds a literal, it
doesn't parse for the address inside, and treats the literal like a domain
name. Another bug here is that the strict-syntax checks in postfix don't
match against non-literal addresses, which it should (RFC1123 spells out
what is a valid hostname, and all-numerics is clearly not legal).

 Please be careful and check the definitions and references in each 
 document

indeed

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/

Postfix option reject_invalid_hostname will reject bare
IPs (when used in the smtpd_helo_restrictions section of main.cf).

Paul Shupak
[EMAIL PROTECTED]

P.S.  I see hundreds of connection attempts rejected every day becuase of this.



Re: SA addr tests need to be updated

2005-03-09 Thread mouss
Justin Mason wrote:
Eric A. Hall writes:
 

SA 3.0.2 currently performs a handful of tests against HELO greetings that
contain an IP address. These tests don't currently fire when an address
literal is used in the HELO greeting, but they should.
   

actually, that's deliberate -- compare the frequencies of an RFC-2821
address literal, vs. a raw address, and you'll notice that the latter
is much more prevalent in spam.
 

Do you mean it's deliberate to catch this (as a helo ip mismatch):
Received: from unknown (HELO 212.27.42.19) (218.190.234.6)
but not this
Received: from unknown (HELO [212.27.42.19]) (218.190.234.6)
I can see that the latter may hit ham (nat+no hostname). Is this the 
justification? (hit very few spam but hit some ham?)


Re: SA addr tests need to be updated

2005-03-09 Thread Eric A. Hall

On 3/9/2005 5:17 PM, List Mail User wrote:

   Postfix option reject_invalid_hostname will reject bare
 IPs (when used in the smtpd_helo_restrictions section of main.cf).

Good to hear this was fixed. I filed a bug report on it in May '04 but
didn't get much of a response. I'll have to upgrade.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: multiple hosts for spamc -d ?

2005-03-09 Thread email builder
  Some postings a while back led me to believe that I could specify
  multiple hosts for the -d option of spamc.  I understood that it
  would operate basically on a fallback basis (not load balancing).
  However, I can't seem to get spamc to use more than one of the -d
  listings.  I've tried:
 
 /usr/bin/spamc -d 123.45.67.8 -d 127.0.0.1
 /usr/bin/spamc -d 123.45.67.8 127.0.0.1
 
  And switched the order around and fiddled with hostnames vs IP
  addresses, but no dice.  I understand the man page to say that it 
  will use fallback logic if the hostname resolves (via DNS query, 
  right?) to more than one host... so why can't I give it those hosts
  directly?
 
  From http://spamassassin.apache.org/full/3.0.x/dist/doc/spamc.html
 
 -d host
  In TCP/IP mode, connect to spamd server on given host (default: 
 localhost).
 
  If host resolves to multiple addresses, then spamc will fail-over 
 to the other addresses, if the first one cannot be connected to
 
 You need to have a host that has multiple A records.
 
 spamd.domain.com A 123.123.123.123
 spamd.domain.com A 123.123.123.124
 spamd.domain.com A 123.123.123.125
 
 /usr/bin/spamc -d spamd.domain.com
 
 If your DNS server sends the results back in a different order each time 
 then it will not be a fallback but a round robin. You might be able to 
 simply use /etc/host entries. I've never tried it as I use qmail which 
 will not use the host file, so I always rely on DNS. Don't know if spamc 
 will use the host file or not.
  
  Huh, I am not familiar with how to use /etc/hosts as a DNS source.  Can
 you
  clarify?  
 
 I didn't mean use it as a dns source, but many programs can look first 
 to your /etc/hosts file prior to doing a DNS lookup. I do not know if 
 spamc will do that, I do not believe it does.
 
  Mainly my question was if/how I could avoid making it a DNS query.  I'd
 like
  to simply hand spamc the two addresses that I want it to have manually,
 and I
  do *NOT* want round-robin, I want failover
 
 I do not think you can do this. You can use a IP address with spamc to 
 save a lookup. I use the following run script under demontools,
 
 #!/sbin/sh
 
 PATH=/usr/bin:/usr/local/bin
 
 exec /usr/local/bin/softlimit -a 12800 \
  /usr/local/bin/spamd -i 10.0.240.253 -p 1783 -A 10.0.240.0/24 \
  -m 10 --max-conn-per-child=200 -u vpopmail -x -q -s stderr 21
 
 I do not believe you can have mulitple addresses behind the -i switch, 
 at least the docs do not lead me to believe it is possible. Maybe 
 someone else knows better.

spamd is not a problem for me.  I run spamd on two machines, one being my
main SA server, and one being a fallback just in case something goes awry
(something recently did).  I'd really like to be able to tell spamc that it
can go to a 2nd IP address in case the first one fails, possibly by doing as
I wrote above:

/usr/bin/spamc -d 123.45.67.8 -d 127.0.0.1

but it seems I can't do this unless I go the DNS route (which I don't know
how to do, since my main SA server must be routed to using an internal
network IP).


Thanks!





__ 
Celebrate Yahoo!'s 10th Birthday! 
Yahoo! Netrospective: 100 Moments of the Web 
http://birthday.yahoo.com/netrospective/


Re: SA addr tests need to be updated

2005-03-09 Thread Eric A. Hall

On 3/9/2005 6:08 PM, Justin Mason wrote:

 mouss writes:
 
Do you mean it's deliberate to catch this (as a helo ip mismatch):

  Received: from unknown (HELO 212.27.42.19) (218.190.234.6)

but not this

  Received: from unknown (HELO [212.27.42.19]) (218.190.234.6)

 yes.  (I'm not sure if we've retested that recently though.)

I've been playing with this a lot recently. Hence the note.

I've grepped my logs and every single instance of a helo literal is spam.
But even if you want to accomodate NATs and such, the current exception
allows spammers to bypass the tests just by excluding the brackets. If you
want to preserve the distinction, add an extra score for non-literal
addresses, since that's a rat-sign that's above-and-beyond the spam-sign
from lack of a domain name.


-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/