Re: Rejecting emails in procmailrc?

2006-02-27 Thread jdow

From: Alex Jalali [EMAIL PROTECTED]

Hello,

How can I reject mails that have a high score along with a reason message
instead of moving them to a folder?


I am using this in procmailrc to send spams to junk mail folder which works
fine.

:0:
* ^X-Spam-Status: Yes
/${HOME}/'Junk E-mail'

Now I need something like this to reject mails with score 16 or more

:0:
* ^X-Spam-Level: \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
?? 550 Your email is in our spam list. To be removed, write to us at
xxx


Um, and what makes you think such a message is likely to go any place that
cares? By the time SpamAssassin is in the picture with procmail the smtp
transaction has completed. So you cannot terminate it with a 550. Nor can
you extract enough information to send it back to the real sender. So at
that point the correct path is either is to simply continue to drop it into
a spam folder and get on with life.

{^_^}


Re: Rejecting emails in procmailrc?

2006-02-27 Thread Andrzej Adam Filip
Alex Jalali wrote:
 Hello,
 
 How can I reject mails that have a high score along with a reason
 message instead of moving them to a folder?
 
 
 I am using this in procmailrc to send spams to junk mail folder which
 works fine.
 
 :0:
 * ^X-Spam-Status: Yes
 /${HOME}/'Junk E-mail'
 
 Now I need something like this to reject mails with score 16 or more
 
 :0:
 * ^X-Spam-Level: \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
 ?? 550 Your email is in our spam list. To be removed, write to us
 at xxx
 
 
 I have setup spamassasin 3 with sendmail and procmail on redhat 9

IMHO it is a bad idea to bounce *spam* messages in procmail scripts
because sender adresses are frequntly faked.

For sendmail users much better idea is to integrate spamassassin with
sendmail using milter (e.g. http://mimedefang.org/) and:
* reject spam for (almost) sure in SMTP session [the final dot reply]
  It makes sending host responsible for generating bounce message
* mark most likely spam in headers to allow by recipient verification

-- 
[pl2en Andrew] Andrzej Adam Filip : [EMAIL PROTECTED] : [EMAIL PROTECTED]
http://anfi.homeunix.net/


sa-learn, remote spamd

2006-02-27 Thread wwp
Hello there,


I didn't find a way to make sa-learn training a remote spamassassin
installation (TCP). Would it possible to add this feature in sa-learn
and spamd? Is there a workaround that I couldn't find yet?


Regards,

-- 
wwp


signature.asc
Description: PGP signature


SORBS unreasonable

2006-02-27 Thread Johann Spies
One of our email-servers is blacklisted by SORBS and they want us to
pay $50 to get the server taken of the list.

On enquiry on why we were blacklisted, it came to light that it was
blacklisted on false accounts - a valid mailing list related to one of
our academic departments on campus.

However, no reasoning whith them is possible and they insist that it
was spam. Here are quotes from their answers:

I am referring this to the SORBS admin who received the spam. It
doesn't appear that there is any relationship with the spammer. Where
the sender obtained the addresses is not known at this time.

As I suspected, the recipient does not know the sender, so it is
indeed UBE. Where the sender obtained the address is unknown. It
certainly was not sent to a confirmed opt- in list, so it is spam and
the listing is not in error.  In order to be delisted, follow the
instructions on the Spam DB FAQ
http://www.dnsbl.sorbs.net/faq/spamdb.shtml Send confirmation of your
US$50 donation to [EMAIL PROTECTED]

It seems a bit harsh to me to blacklist a server on account of one
such incident.  We are not in a position to verify the facts because
we do not have  the email address of the SORBS admin who received the
spam.

We have three email-gateways and have a very good record as far as
fighting spam is concerned.  Now some of our email gets refused because
one administrator received an email of which he thought that it must
be spam!

How do the members of this list handle situations like that?

Regards
Johann
-- 
Johann Spies  Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch

 All we like sheep have gone astray; we have turned 
  every one to his own way; and the LORD hath laid on 
  him the iniquity of us all. Isaiah 53:6 


inconsistent results on dns tests

2006-02-27 Thread Ramprasad
Hi,
  I have seen that dns tests for the same mail sent twice ( to different
recipients ) give inconsistent results
The first mail got hit by RCVD_IN_WHOIS_BOGONS and the second did not
( I use a local caching name server ). I cant figure out why ? 
Has this occurred to anybody else ? 

Thanks
Ram



RE: SORBS unreasonable

2006-02-27 Thread Greg Allen
I noticed you did not say your mailing list was a confirmed opt-in.

If it does not do a confirmed opt-in, you should fix that. Otherwise you
will not stay delisted long. Could get expensive too at $50 a pop.



 On enquiry on why we were blacklisted, it came to light that it was
 blacklisted on false accounts - a valid mailing list related to one of
 our academic departments on campus.



RE: Rejecting emails in procmailrc?

2006-02-27 Thread Greg Allen
Title: Rejecting emails in procmailrc?



If you 
are using Postfix you can do something like this in header_checks 
:

/^X-Spam-Level: 
\*{20}.*/ REJECT Spam content 
rejected.


(Testthe 
syntax, but I think the above is correct or very very 
close.)

header_checks is 
runas a Postfix process AFTER SA is done with the message, so you can use 
it to detect SA spam headers and take an action.

Rather than send a 
message back (which could make you a spammer) it would be better to just send it 
to an admin account for further review or just delete it.


/^X-Spam-Level: \*{20}.*/ 
REDIRECT [EMAIL PROTECTED]







  -Original Message-From: Alex Jalali 
  [mailto:[EMAIL PROTECTED]Sent: Monday, February 27, 2006 2:49 
  AMTo: users@spamassassin.apache.orgSubject: Rejecting 
  emails in procmailrc?
  Hello, 
  How can I reject mails that have a high score along 
  with a reason message instead of moving them to a folder? 
  I am using this in procmailrc to send spams to junk 
  mail folder which works fine. 
  :0: * 
  ^X-Spam-Status: Yes /${HOME}/'Junk 
  E-mail' 
  Now I need something like this to reject mails with 
  score 16 or more 
  :0: * 
  ^X-Spam-Level: \*\*\*\*\*\*\*\*\*\*\*\*\*\*\* ?? "550 Your email is in our spam list. To be removed, write to us 
  at xxx" 
  I have setup spamassasin 3 with sendmail and 
  procmail on redhat 9 


Mail triggering all rbl while not being listed

2006-02-27 Thread François Conil

Hello,

I'm facing a curious problem : for 3-4 days, one of my users have been 
triggering all rbls each time a mail is sent.


It could not be that serious, weren't for the identity of this 
particular user : the root user on our network filtering smtp gateway.


Basically, the daily report triggers the tests like this :

BIZ_TLD=2.013,
DOMAIN_4U2=1.994,
INFO_TLD=1.273,
MR_DEPOT_URI=0.3,
NORMAL_HTTP_TO_IP=0.175,
NO_RELAYS=-0.001,
SPOOF_OURI=0.104,
URIBL_JP_SURBL=4.087,
URIBL_OB_SURBL=3.008,
URIBL_WS_SURBL=2.14,
URI_4YOU=0.135,
URI_NOVOWEL=0.884

(carriage returns added for an easier reading)

Do you see why all those tests are triggered ?
My first guess was that they are because of all the returned mail sent 
by the smtp filter, which makes the daily report by itself containing a 
lot of spammy material, in terms of domain names/ips.


Thanks by advance,
--
François Conil
Administrateur Systèmes et Réseaux
Pax I wish my lawn was emo, so it would cut itself.



Re: Mail triggering all rbl while not being listed

2006-02-27 Thread Michael Monnerie
On Montag, 27. Februar 2006 12:13 François Conil wrote:
 Basically, the daily report triggers the tests like this :

 BIZ_TLD=2.013,
 DOMAIN_4U2=1.994,
 INFO_TLD=1.273,
 MR_DEPOT_URI=0.3,
 NORMAL_HTTP_TO_IP=0.175,
 NO_RELAYS=-0.001,
 SPOOF_OURI=0.104,
 URIBL_JP_SURBL=4.087,
 URIBL_OB_SURBL=3.008,
 URIBL_WS_SURBL=2.14,
 URI_4YOU=0.135,
 URI_NOVOWEL=0.884

URIBL are hit based on content of the e-mail. As you say it's the daily 
report, I guess there are a lot of URLs in it, hitting all the rules.

mfg zmi
-- 
// Michael Monnerie, Ing.BSc  ---   it-management Michael Monnerie
// http://zmi.at   Tel: 0660/4156531  Linux 2.6.11
// PGP Key:   lynx -source http://zmi.at/zmi2.asc | gpg --import
// Fingerprint: EB93 ED8A 1DCD BB6C F952  F7F4 3911 B933 7054 5879
// Keyserver: www.keyserver.net Key-ID: 0x70545879


pgpbdllPmnHFi.pgp
Description: PGP signature


Re: SPF Error: cannot get HELO, cannot use SPF

2006-02-27 Thread mouss
Chris Purves a écrit :
[snip]
 
 What spamc calls EnvelopeFrom is the top header of the message:
 
 Return-path:
 [EMAIL PROTECTED]
 
 I am guessing that exim calls spamc before it adds this header so that
 spamc has less information to work with than when running the tests.
 
 I'm sorry for the very long e-mail...I hope someone has a suggestion as
 to what I can do now.  I am using sa-exim inbetween exim and SA.
 

The Return-Path is added by the MTA when handing mail to something
external (mostly for delivery). whether it'll give it to SA or not
depends on how SA is integrated.



Re: Rejecting emails in procmailrc?

2006-02-27 Thread jdow

Wel, Greg, I am not an ISP. However, if I was an admin at an ISP
you can bet that *I* would blacklist any source for that kind of automated
email to the admin account. I'd also submit them as spammers to every
list in the world that I could find.

It is best to let spam rejects die on the floor. You virtually NEVER
reject to the right place.

{^_^}
- Original Message - 
From: Greg Allen [EMAIL PROTECTED]



Rejecting emails in procmailrc?If you are using Postfix you can do something
like this in header_checks :

/^X-Spam-Level: \*{20}.*/  REJECT  Spam content rejected.


(Test the syntax, but I think the above is correct or very very close.)

header_checks is run as a Postfix process AFTER SA is done with the message,
so you can use it to detect SA spam headers and take an action.

Rather than send a message back (which could make you a spammer) it would be
better to just send it to an admin account for further review or just delete
it.


/^X-Spam-Level: \*{20}.*/  REDIRECT [EMAIL PROTECTED]






 -Original Message-
 From: Alex Jalali [mailto:[EMAIL PROTECTED]

 Hello,

 How can I reject mails that have a high score along with a reason message
instead of moving them to a folder?



 I am using this in procmailrc to send spams to junk mail folder which
works fine.

 :0:
 * ^X-Spam-Status: Yes
 /${HOME}/'Junk E-mail'

 Now I need something like this to reject mails with score 16 or more

 :0:
 * ^X-Spam-Level: \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
 ?? 550 Your email is in our spam list. To be removed, write to us at
xxx





 I have setup spamassasin 3 with sendmail and procmail on redhat 9





Re: Mail triggering all rbl while not being listed

2006-02-27 Thread François Conil

Michael Monnerie a écrit :

On Montag, 27. Februar 2006 12:13 François Conil wrote:


Basically, the daily report triggers the tests like this :

BIZ_TLD=2.013,
DOMAIN_4U2=1.994,
INFO_TLD=1.273,
MR_DEPOT_URI=0.3,
NORMAL_HTTP_TO_IP=0.175,
NO_RELAYS=-0.001,
SPOOF_OURI=0.104,
URIBL_JP_SURBL=4.087,
URIBL_OB_SURBL=3.008,
URIBL_WS_SURBL=2.14,
URI_4YOU=0.135,
URI_NOVOWEL=0.884



URIBL are hit based on content of the e-mail. As you say it's the daily 
report, I guess there are a lot of URLs in it, hitting all the rules.


mfg zmi



Looks like my first guess wasn't that far from truth after all :]

Thanks for the input.

--
François Conil
Administrateur Systèmes et Réseaux
Pax I wish my lawn was emo, so it would cut itself.



Re: Mail triggering all rbl while not being listed

2006-02-27 Thread jdow

Well, I'd ask if there is any possibility some activity of the network
filtering smtp gateway is earning it a birth in the spammer's hall of
fame known as black lists. Are you sending wild rejects to forged
senders rather than the real senders, who are never there to receive
it anyway? Is the machine usable as an open relay for spam?

I'd certainly jettison the .biz TLD. It seems only spammers have them.
ut to get on the SURBL lists your system had to spray some unwanted mail
somewhere seriously.

{^_^}
- Original Message - 
From: François Conil [EMAIL PROTECTED]



Hello,

I'm facing a curious problem : for 3-4 days, one of my users have been
triggering all rbls each time a mail is sent.

It could not be that serious, weren't for the identity of this
particular user : the root user on our network filtering smtp gateway.

Basically, the daily report triggers the tests like this :

BIZ_TLD=2.013,
DOMAIN_4U2=1.994,
INFO_TLD=1.273,
MR_DEPOT_URI=0.3,
NORMAL_HTTP_TO_IP=0.175,
NO_RELAYS=-0.001,
SPOOF_OURI=0.104,
URIBL_JP_SURBL=4.087,
URIBL_OB_SURBL=3.008,
URIBL_WS_SURBL=2.14,
URI_4YOU=0.135,
URI_NOVOWEL=0.884

(carriage returns added for an easier reading)

Do you see why all those tests are triggered ?
My first guess was that they are because of all the returned mail sent
by the smtp filter, which makes the daily report by itself containing a
lot of spammy material, in terms of domain names/ips.

Thanks by advance,
--
François Conil
Administrateur Systèmes et Réseaux
Pax I wish my lawn was emo, so it would cut itself. 



Re: SORBS unreasonable

2006-02-27 Thread mouss
Johann Spies a écrit :
 One of our email-servers is blacklisted by SORBS and they want us to
 pay $50 to get the server taken of the list.
 

In many countries, this is called extorsion. but this isn't the right
forum to debate this.


[snip]
 
 How do the members of this list handle situations like that?
 

Different people have different opinions. I choose not to use sorbs.
There are enough safer lists.

Now, make sure to have things well configured on your side:

- reject invalid addresses at smtp time. don't accept and bounce
(because you'll bounce to an innocent).

- if you manage lists, make sure to implement confirmed opt-in.

Of course, sorbs can still list you if someone tries to subscribe one of
their traps. ...



Re: Mail triggering all rbl while not being listed

2006-02-27 Thread François Conil

jdow a écrit :

Well, I'd ask if there is any possibility some activity of the network
filtering smtp gateway is earning it a birth in the spammer's hall of
fame known as black lists. Are you sending wild rejects to forged
senders rather than the real senders, who are never there to receive
it anyway? Is the machine usable as an open relay for spam?

I'd certainly jettison the .biz TLD. It seems only spammers have them.
ut to get on the SURBL lists your system had to spray some unwanted mail
somewhere seriously.


The weird thing is that the server isn't listed on any rbl list. Hence 
my legitimate interrogation :/



--
François Conil
Administrateur Systèmes et Réseaux
Pax I wish my lawn was emo, so it would cut itself.



Re: sa-learn, remote spamd

2006-02-27 Thread Justin Mason

wwp writes:
 I didn't find a way to make sa-learn training a remote spamassassin
 installation (TCP). Would it possible to add this feature in sa-learn
 and spamd? Is there a workaround that I couldn't find yet?

This is already present in spamc/spamd.  Take a look at the spamc
manual page in 3.1.0 iirc.

--j.


Re: Mail triggering all rbl while not being listed

2006-02-27 Thread Michael Monnerie
On Montag, 27. Februar 2006 12:53 jdow wrote:
 I'd certainly jettison the .biz TLD. It seems only spammers have
 them.

I have one customer with a legitimate .biz address. There may be a 
second, somewhere on this planet. Maybe...

mfg zmi
-- 
// Michael Monnerie, Ing.BSc  ---   it-management Michael Monnerie
// http://zmi.at   Tel: 0660/4156531  Linux 2.6.11
// PGP Key:   lynx -source http://zmi.at/zmi2.asc | gpg --import
// Fingerprint: EB93 ED8A 1DCD BB6C F952  F7F4 3911 B933 7054 5879
// Keyserver: www.keyserver.net Key-ID: 0x70545879


pgpzkYIyHJNdI.pgp
Description: PGP signature


Re: netware

2006-02-27 Thread Matt Kettler
admin wrote:
 Hi

 I have just a simple question and I did not find any exact answer. 
 Is NetWare or is NetWare going to be supported by SpamAssassin?
 Thanks a lot for an answer.
   
Apparently Novell's perl is sufficiently broken that I highly doubt
SpamAssassin will work on it.

I found this which was discussing a netmail plugin for SA:

http://www.novell.com/coolsolutions/tools/14353.html

Unfortunately, per the Perl for NetWare readme, the fork method is not
yet implemented on NetWare
http://developer.novell.com/ndk/readme/perl5.html#ak4jmuc. Not too
big a problem though, I can always use threads. Except scripts that use
the 'Thread' and 'threads' modules may not work as desired
http://developer.novell.com/ndk/readme/perl5.html#ak4jmgd. Ok, no
problem, guess I'll just have to use non-blocking IO. Unfortunately my
tests indicate IO::Select does not work on NetWare either. Bottom line,
there is no way I can see to do this in Perl on NetWare.

While the author was trying to get perl to run his plugin for netmail,
the lack of forking, threading, and nonblocking IO under perl is a
severe deficiency.

I know that SA 3.1.x's DnsResolver.pm uses nonblocking IO to poll sockets..


   



Re: sa-learn, remote spamd

2006-02-27 Thread wwp
Hello Justin,


On Mon, 27 Feb 2006 13:57:21 + [EMAIL PROTECTED] (Justin Mason) wrote:

 
 wwp writes:
  I didn't find a way to make sa-learn training a remote spamassassin
  installation (TCP). Would it possible to add this feature in sa-learn
  and spamd? Is there a workaround that I couldn't find yet?
 
 This is already present in spamc/spamd.  Take a look at the spamc
 manual page in 3.1.0 iirc.

I see, you're right. For my bad, I was using 3.0.x :-\. Thanks!


Regards,

-- 
wwp


signature.asc
Description: PGP signature


SA running, but not working

2006-02-27 Thread Liam-PrintingAutomation

Newbie question:
I'm using Sendmail on an ES4 server that was built buy our server's host.
It originally was set up with Procmail, but because of migration 
problems from an old server we had to switch it to Sendmail.

Anyway, Spamassassin was pre-installed.
I just started the service running, but none of our mail is being tagged 
with a X-Spam header.
I've looked for Spamassassin configuration files, and all I could find 
was /etc/mail/spamassassin/local.cf and all I can do in there is change 
the threshhold and subject line tag.
Is there comething somewhere I need to check/change to get it to work 
with Sendmail?

Just a point in the right direction would be nice. =)
Thanks,
Liam


Re: Rejecting emails in procmailrc?

2006-02-27 Thread Barton L. Phillips
You could of course pipe the mail to a script like perl or awk etc. and 
do the real work there.


:0fh
* ^X-Spam-Level: \*{20}.*
|  /home/myname/mycoolprogram.pl

Another alternative is use mimedefang and write a rule in 
mimedefang_filter filter_end() to do the job.


Greg Allen wrote:

If you are using Postfix you can do something like this in header_checks :
 
/^X-Spam-Level: \*{20}.*/  REJECT  Spam content rejected. 
 
 
(Test the syntax, but I think the above is correct or very very close.)
 
header_checks is run as a Postfix process AFTER SA is done with the 
message, so you can use it to detect SA spam headers and take an action.
 
Rather than send a message back (which could make you a spammer) it 
would be better to just send it to an admin account for further review 
or just delete it.
 
 
/^X-Spam-Level: \*{20}.*/  REDIRECT [EMAIL PROTECTED] 
mailto:[EMAIL PROTECTED]
 
 
 
 
 
 


-Original Message-
*From:* Alex Jalali [mailto:[EMAIL PROTECTED]
*Sent:* Monday, February 27, 2006 2:49 AM
*To:* users@spamassassin.apache.org
*Subject:* Rejecting emails in procmailrc?

Hello,

How can I reject mails that have a high score along with a reason
message instead of moving them to a folder?


I am using this in procmailrc to send spams to junk mail folder
which works fine.

:0:
* ^X-Spam-Status: Yes
/${HOME}/'Junk E-mail'

Now I need something like this to reject mails with score 16 or more

:0:
* ^X-Spam-Level: \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
?? 550 Your email is in our spam list. To be removed, write
to us at xxx




I have setup spamassasin 3 with sendmail and procmail on redhat 9




--

Barton L. Phillips
Applied Technology Resources, Inc.
Tel: (818)652-9850
Web: http://www.applitec.com



Re: Rejecting emails in procmailrc?

2006-02-27 Thread Kris Deugau
[This isn't really an SA question.  You might get a *slightly* warmer 
response on a procmail list, or a sendmail list.]


Alex Jalali wrote:
How can I reject mails that have a high score along with a reason 
message instead of moving them to a folder?


Please don't.  You won't help anyone but yourself, and the behaviour 
you're asking about setting up *WILL* get you blacklisted by mail admins 
all around the world.  Getting off even the more restrictive RBLs is one 
thing...  getting off of a million seperate local admins' local 
blacklists is quite another.


If you really insist on doing so, read and understand the procmail and 
procmailrc man pages, and be prepared to not be able to send mail to 
much of anyone in about six months.


-kgd


/etc/shadow access from SA

2006-02-27 Thread leonard . gray

Our intrusion detection software started
picking up thousands of access attempts to /etc/shadow (the UNIX user password
store) shortly after installing SpamAssassin on our mail gateway.

Could one of the developers comment
on why SA might be doing this and/or if this is even an intent? (Running
SA 3.1.0)

Thanks!

Re: SA-LEARN HANGING when database over 2000 SPAM messages

2006-02-27 Thread Steve Thomas
 The first time I encountered this problem is when the spam database has
 around 3000 SPAM and about 1 HAM, the database seems to become
 corrupt. I start to receive PERL errors.
 ...
 Is there a problem with the database when it
 reaches a certain size?

I can't offer much assistance with your problem, but on the db size, I can
say that we were running it with around 25k spams and 25k hams learned,
with sa-learn running on shared imap folders every hour adding more.

This was with SA 2.70-cvs. We just upgraded to 3.1.0 and converted the
bayes and whitelist databases to MySQL. Spamd and MySQL now run on a
dedicated server which is accessed by spamc on our smtp/incoming MX and
sa-learn on our pop/imap server. Our setup is a little complex, but it
works very well.

St-




Re: SA running, but not working

2006-02-27 Thread Matt Kettler
Liam-PrintingAutomation wrote:
 Newbie question:
 I'm using Sendmail on an ES4 server that was built buy our server's host.
 It originally was set up with Procmail, but because of migration
 problems from an old server we had to switch it to Sendmail.

Eh? Sendmail isn't a replacement for procmail. Sendmail is a MTA (mail transfer
agent) that handles network transfers of mail. Procmail is a MDA (mail delivery
agent) that handles putting the mail into mailboxes on the local machine.

Most people that use procmail use sendmail as their MTA.

 Anyway, Spamassassin was pre-installed.
 I just started the service running, but none of our mail is being tagged
 with a X-Spam header.

Ok.. you need to do more than that.. you need to modify your some part of your
mail chain to feed messages to SA. As it is, SA is available on your system, and
has the spamd deamon running and ready to be fed mail, but nobody is feeding it.

So you have two basic options:

1) tell sendmail to use procmail as a MDA, and add a spamc call to your procmail
config.

2) add a milter to sendmail like spamass-milter or mimedefang, and have those
funnel mail into spamassassin at the MTA level.



Re: /etc/shadow access from SA

2006-02-27 Thread Justin Mason

[EMAIL PROTECTED] writes:
 Our intrusion detection software started picking up thousands of access 
 attempts to /etc/shadow (the UNIX user password store) shortly after 
 installing SpamAssassin on our mail gateway.
 
 Could one of the developers comment on why SA might be doing this and/or 
 if this is even an intent? (Running SA 3.1.0)

unfortunately, this is just what perl does when getpwuid() etc. are called
from perl code; nothing we can do about it from SpamAssassin.

can you config the IDS to silently refuse access?

--j.


Re: SA-LEARN HANGING when database over 2000 SPAM messages

2006-02-27 Thread C. Bensend

 I can't offer much assistance with your problem, but on the db size, I can
 say that we were running it with around 25k spams and 25k hams learned,
 with sa-learn running on shared imap folders every hour adding more.

This is from this morning's sa-learn run:

Total number of HAM messages : 144335
Total number of SPAM messages: 232633

I doubt if the OP's problem has to do with the number of emails.  :)


-- 
A computer lets you make more mistakes faster than any invention
in human history, with the possible exceptions of handguns and
tequila.  -- Dave Pooser



Re: SA running, but not working

2006-02-27 Thread Liam-PrintingAutomation




Matt Kettler wrote:

  Liam-PrintingAutomation wrote:
  
  
Newbie question:
I'm using Sendmail on an ES4 server that was built buy our server's host.
It originally was set up with Procmail, but because of migration
problems from an old server we had to switch it to Sendmail.

  
  
Eh? Sendmail isn't a replacement for procmail. Sendmail is a MTA (mail transfer
agent) that handles network transfers of mail. Procmail is a MDA (mail delivery
agent) that handles putting the mail into mailboxes on the local machine.

Most people that use procmail use sendmail as their MTA.

  

Er, my bad. POSTFIX is what the server was originally set up with, not
Procmail. I got those names confused. =/
Sorry.

  
  
Anyway, Spamassassin was pre-installed.
I just started the service running, but none of our mail is being tagged
with a X-Spam header.

  
  
Ok.. you need to do more than that.. you need to modify your some part of your
mail chain to feed messages to SA. As it is, SA is available on your system, and
has the spamd deamon running and ready to be fed mail, but nobody is feeding it.

So you have two basic options:

1) tell sendmail to use procmail as a MDA, and add a spamc call to your procmail
config.

2) add a milter to sendmail like spamass-milter or mimedefang, and have those
funnel mail into spamassassin at the MTA level.

OK, I'll see if it's already using Procmail since I now realize the
difference, and try the first option.
Otherwise, based on your suggestion, I found:
http://wiki.apache.org/spamassassin/IntegratedInMta
and that looks like it has all the info I'll need.
Thanks for the clue-by-four!
-Liam





prefs directories with ^M in the name

2006-02-27 Thread Jon D. Slater
Hi all,
 
I’ve read the FAQ and still don’t find this issue.
 
Configuration:
Spamassassin 3.0.4
OS:  Fedora Core 4
SPAMDOPTIONS=”-d -u spamassassin -x  -P
--virtual-config-dir=/usr/share/spamassassin/%u.prefs
 
So, my prefs files are all being stored in /usr/share/spamassassin
 
Everything seems to be running fine.
 
When I cd into /usr/share/spamassassin and do an ‘ls’, I see:
 
members.prefs
members.prefs^M   (control M, not “^” and “M”)
 
If I remove the “^M” version, after some period of time, they come back.
 
What is creating these? And how do I fix it?
 
Thanks!
 
Jon




RE: /etc/shadow access from SA

2006-02-27 Thread Dallas L. Engelken
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 Sent: Monday, February 27, 2006 11:50
 To: [EMAIL PROTECTED]
 Cc: SpamAssassin
 Subject: Re: /etc/shadow access from SA 
 
 
 [EMAIL PROTECTED] writes:
  Our intrusion detection software started picking up thousands of 
  access attempts to /etc/shadow (the UNIX user password 
 store) shortly 
  after installing SpamAssassin on our mail gateway.
  
  Could one of the developers comment on why SA might be doing this 
  and/or if this is even an intent? (Running SA 3.1.0)
 
 unfortunately, this is just what perl does when getpwuid() 
 etc. are called from perl code; nothing we can do about it 
 from SpamAssassin.
 
 can you config the IDS to silently refuse access?
 

Justin, Are you positive?  I don't see getpwnam or getpwuid accessing
/etc/shadow on linux.  It hits /etc/passwd for the getpw* calls.

# cat test.pl
my $uid = getpwnam('root');
my $name = getpwuid(0);
print name=$name uid=$uid\n;

# perl test.pl
name=root uid=0

# strace perl test.pl 21 | grep passwd
open(/etc/passwd, O_RDONLY)   = 3
open(/etc/passwd, O_RDONLY)   = 3

# strace perl test.pl 21 | grep shadow
#

spamassassin clearly hits /etc/shadow.  

# strace spamassassin 21 | grep shadow
open(/etc/shadow, O_RDONLY)   = 3


Must be something else causing it.  Maybe a module that SA requires?

Cya,
D



RE: /etc/shadow access from SA

2006-02-27 Thread Peter P. Benac
Dallas,

   It does on Solaris.  Doesn't do anything other to see if their is a
matching entry in both /etc/passwd and /etc/shadow and it checks to see
if the user is still able to log in. Linux should actually do the same
thing, but Solaris PAM and Linux PAM do operate differently.

Pete

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
 Sent: Monday, February 27, 2006 11:50
 To: [EMAIL PROTECTED]
 Cc: SpamAssassin
 Subject: Re: /etc/shadow access from SA


 [EMAIL PROTECTED] writes:
  Our intrusion detection software started picking up thousands of
  access attempts to /etc/shadow (the UNIX user password
 store) shortly
  after installing SpamAssassin on our mail gateway.
 
  Could one of the developers comment on why SA might be doing this
  and/or if this is even an intent? (Running SA 3.1.0)

 unfortunately, this is just what perl does when getpwuid()
 etc. are called from perl code; nothing we can do about it
 from SpamAssassin.

 can you config the IDS to silently refuse access?


 Justin, Are you positive?  I don't see getpwnam or getpwuid accessing
 /etc/shadow on linux.  It hits /etc/passwd for the getpw* calls.

 # cat test.pl
 my $uid = getpwnam('root');
 my $name = getpwuid(0);
 print name=$name uid=$uid\n;

 # perl test.pl
 name=root uid=0

 # strace perl test.pl 21 | grep passwd
 open(/etc/passwd, O_RDONLY)   = 3
 open(/etc/passwd, O_RDONLY)   = 3

 # strace perl test.pl 21 | grep shadow
 #

 spamassassin clearly hits /etc/shadow.

 # strace spamassassin 21 | grep shadow
 open(/etc/shadow, O_RDONLY)   = 3


 Must be something else causing it.  Maybe a module that SA requires?

 Cya,
 D





Peter P. Benac, CCNA
Emacolet Networking Services, Inc
Providing Network and Systems Project Management and Installation and
Web Hosting.
Phone: 919-618-2557
Web: http://www.emacolet.com
Need quick reliable Systems or Network Management advice visit
http://www.nmsusers.org

To have principles...
First have courage.. With principles comes integrity!!!



RE: /etc/shadow access from SA

2006-02-27 Thread Dallas L. Engelken
 -Original Message-
 From: Peter P. Benac [mailto:[EMAIL PROTECTED] 
 
 Dallas,
 
It does on Solaris.  Doesn't do anything other to see if 
 their is a matching entry in both /etc/passwd and /etc/shadow 
 and it checks to see if the user is still able to log in. 
 Linux should actually do the same thing, but Solaris PAM and 
 Linux PAM do operate differently.
 
 Pete

Peter,

I show it on linux below.  getpw* calls on my box below do not access
/etc/shadow, yet running spamassassin on the same box accesses
/etc/shadow.  SA uses getpwnam() and getpwuid(), but it cant be either
of those causing it.  So it has to be something else.  I just don't have
the time right now to trace it down any further to provide an answer.

D


 
  -Original Message-
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
  Sent: Monday, February 27, 2006 11:50
  To: [EMAIL PROTECTED]
  Cc: SpamAssassin
  Subject: Re: /etc/shadow access from SA
 
 
  [EMAIL PROTECTED] writes:
   Our intrusion detection software started picking up thousands of 
   access attempts to /etc/shadow (the UNIX user password
  store) shortly
   after installing SpamAssassin on our mail gateway.
  
   Could one of the developers comment on why SA might be 
 doing this 
   and/or if this is even an intent? (Running SA 3.1.0)
 
  unfortunately, this is just what perl does when getpwuid() 
 etc. are 
  called from perl code; nothing we can do about it from 
 SpamAssassin.
 
  can you config the IDS to silently refuse access?
 
 
  Justin, Are you positive?  I don't see getpwnam or getpwuid 
 accessing 
  /etc/shadow on linux.  It hits /etc/passwd for the getpw* calls.
 
  # cat test.pl
  my $uid = getpwnam('root');
  my $name = getpwuid(0);
  print name=$name uid=$uid\n;
 
  # perl test.pl
  name=root uid=0
 
  # strace perl test.pl 21 | grep passwd
  open(/etc/passwd, O_RDONLY)   = 3
  open(/etc/passwd, O_RDONLY)   = 3
 
  # strace perl test.pl 21 | grep shadow #
 
  spamassassin clearly hits /etc/shadow.
 
  # strace spamassassin 21 | grep shadow
  open(/etc/shadow, O_RDONLY)   = 3
 
 
  Must be something else causing it.  Maybe a module that SA requires?
 
  Cya,
  D
 
 
 
 
 
 Peter P. Benac, CCNA
 Emacolet Networking Services, Inc
 Providing Network and Systems Project Management and 
 Installation and Web Hosting.
 Phone: 919-618-2557
 Web: http://www.emacolet.com
 Need quick reliable Systems or Network Management advice 
 visit http://www.nmsusers.org
 
 To have principles...
 First have courage.. With principles comes integrity!!!
 
 


FP on URIBL_JP_SURBL + URIBL_SBL

2006-02-27 Thread Dave Pooser
So I noticed some messages from one of my mailing lists landed in the ol'
spambucket; there was a URI in there for 4dquiz-com (dot instead of dash)
and it hit on URIBL_JP_SURBL and URIBL_SBL which scored enough to override
BAYES_00. Problem is, as best I can tell it's not on the SBL:
[dave:~] bubbadv% dig +short 4dquiz[-]com
83.104.129.88
[dave:~] bubbadv% dig +short 88.129.104.83.sbl.spamhaus.org
[dave:~] bubbadv% 

(I'll take up the jp.surbl.org FP separately, as it's at least a listing,
albeit IMHO unwarranted.)

I'm running SA 3.1.on Mac OS X 10.3.9 with Perl 5.8.1-RC3; I know there was
a URI bug with SA 3.0 but I should be safe from that.

Any thoughts?
-- 
Dave Pooser
Cat-Herder-in-Chief, Pooserville.com
I don't think there's a problem you CAN'T solve with murder!




Re: Mail triggering all rbl while not being listed

2006-02-27 Thread mouss
François Conil a écrit :
 Hello,
 
 I'm facing a curious problem : for 3-4 days, one of my users have been
 triggering all rbls each time a mail is sent.
 
 It could not be that serious, weren't for the identity of this
 particular user : the root user on our network filtering smtp gateway.
 
 Basically, the daily report triggers the tests like this :
 
 BIZ_TLD=2.013,
 DOMAIN_4U2=1.994,
 INFO_TLD=1.273,
 MR_DEPOT_URI=0.3,
 NORMAL_HTTP_TO_IP=0.175,
 NO_RELAYS=-0.001,
 SPOOF_OURI=0.104,
 URIBL_JP_SURBL=4.087,
 URIBL_OB_SURBL=3.008,
 URIBL_WS_SURBL=2.14,
 URI_4YOU=0.135,
 URI_NOVOWEL=0.884

I see no RBLs here. These got hit because of the mail content. your
reports contain URIs that hit these.

your should not filter mail from your system account (unless this
account is also used to send normal mail).



RE: prefs directories with ^M in the name

2006-02-27 Thread Giff Hammar
Jon,

Typically, it's the difference between UNIX and Windows. If you edited a
conf file in Windows and used binary mode to transfer it to the SA machine,
the ^M would be in the conf file. There are a couple of ways around it. The
first is to transfer in ASCII mode, the second is to run dos2unix on the
file and the third is to edit the conf file in vi on the SA machine. If you
choose the third option, open the file in vi and you should see ^M at the
end of each line. 
Type
:1,$ s/^v^m// what you will actually see is :1,$ s/^M//
and press enter. The ^V won't actually appear, but it will force vi to look
for ^M vice the ^ character followed by M.

Hope this helps.

Giff

-Original Message-
From: Jon D. Slater [mailto:[EMAIL PROTECTED] 
Sent: Monday, February 27, 2006 1:01 PM
To: users@spamassassin.apache.org
Subject: prefs directories with ^M in the name

Hi all,
 
I’ve read the FAQ and still don’t find this issue.
 
Configuration:
Spamassassin 3.0.4
OS:  Fedora Core 4
SPAMDOPTIONS=”-d -u spamassassin -x  -P
--virtual-config-dir=/usr/share/spamassassin/%u.prefs
 
So, my prefs files are all being stored in /usr/share/spamassassin
 
Everything seems to be running fine.
 
When I cd into /usr/share/spamassassin and do an ‘ls’, I see:
 
members.prefs
members.prefs^M   (control M, not “^” and “M”)
 
If I remove the “^M” version, after some period of time, they come back.
 
What is creating these? And how do I fix it?
 
Thanks!
 
Jon






question on training spamassassin

2006-02-27 Thread Webmaster
A large number of our clients are using POP.
If I were to ask them to send false negatives to [EMAIL PROTECTED] 
and false positives to [EMAIL PROTECTED] so I can place them in 
a folder and train,  does that hinder the training process in 
anyway knowing that the header info is changed with the 
forwarding process.

Thanks.



Re: /etc/shadow access from SA

2006-02-27 Thread Theo Van Dinter
On Mon, Feb 27, 2006 at 12:01:31PM -0600, Dallas L. Engelken wrote:
 Justin, Are you positive?  I don't see getpwnam or getpwuid accessing
 /etc/shadow on linux.  It hits /etc/passwd for the getpw* calls.
 
 # cat test.pl
 my $uid = getpwnam('root');
 my $name = getpwuid(0);
 print name=$name uid=$uid\n;

That's because you're not asking for information found in shadow... :)

 # strace perl test.pl 21 | grep passwd
 open(/etc/passwd, O_RDONLY)   = 3
 open(/etc/passwd, O_RDONLY)   = 3

Here's my version:

# cat t
my @info = getpwnam(root);
my @info2 = getpwuid(0);

# strace perl t
[...]
open(/etc/passwd, O_RDONLY)   = 3
[...]
read(3, ...\n..., 4096) = 2737
close(3)= 0
open(/etc/shadow, O_RDONLY)   = 3
[...]
read(3, .., 4096) = 2030
close(3)= 0
open(/etc/passwd, O_RDONLY)   = 3
[...]
read(3, ...\n..., 4096) = 2737
close(3)= 0
open(/etc/shadow, O_RDONLY)   = 3
[...]
read(3, .., 4096) = 2030
close(3)= 0

I would assume this is implementation dependent, but it appears that
the linux glibc version of getpwnam(), etc, is smart enough to figure
out that you're only asking for information that comes from passwd,
so that's all it reads.  If you're like spamassassin though, and want a
user's home directory, the call asks for all available information, which
will include the password field which may need to come out of shadow.
If I run that script as non-root, I see 2 of these calls:

open(/etc/shadow, O_RDONLY)   = -1 EACCES (Permission denied)

which is what you expect, but the function still tries to open up the
file.  Since shadow isn't available, the x is left in the password
field for non-root users.

:)

-- 
Randomly Generated Tagline:
There are two major products to come out of Berkeley: LSD and UNIX.  We
 don't believe this to be a coincidence.  - Unknown


pgpD6YUoqmbnd.pgp
Description: PGP signature


Re: FP on URIBL_JP_SURBL + URIBL_SBL

2006-02-27 Thread Matt Kettler
Dave Pooser wrote:
 So I noticed some messages from one of my mailing lists landed in the ol'
 spambucket; there was a URI in there for 4dquiz-com (dot instead of dash)
 and it hit on URIBL_JP_SURBL and URIBL_SBL which scored enough to override
 BAYES_00. Problem is, as best I can tell it's not on the SBL:
 [dave:~] bubbadv% dig +short 4dquiz[-]com
 83.104.129.88
 [dave:~] bubbadv% dig +short 88.129.104.83.sbl.spamhaus.org
 [dave:~] bubbadv% 

SA doesn't look up the host's IP against SBL.. it looks up the IPs of the
nameservers.

In this case, the nameserver 66.249.5.25 is listed in the SBL.


Re: prefs directories with ^M in the name

2006-02-27 Thread mouss
Giff Hammar a écrit :
 Jon,
 
 Typically, it's the difference between UNIX and Windows. If you edited a
 conf file in Windows and used binary mode to transfer it to the SA machine,
 the ^M would be in the conf file. There are a couple of ways around it. The
 first is to transfer in ASCII mode, the second is to run dos2unix on the
 file and the third is to edit the conf file in vi on the SA machine. If you
 choose the third option, open the file in vi and you should see ^M at the
 end of each line. 
 Type
 :1,$ s/^v^m// what you will actually see is :1,$ s/^M//
 and press enter. The ^V won't actually appear, but it will force vi to look
 for ^M vice the ^ character followed by M.
 
 Hope this helps.

The OP's issue is that something creates these as _files_.



Re: FP on URIBL_JP_SURBL + URIBL_SBL

2006-02-27 Thread Matt Kettler
Dave Pooser wrote:
 So I noticed some messages from one of my mailing lists landed in the ol'
 spambucket; there was a URI in there for 4dquiz-com (dot instead of dash)
 and it hit on URIBL_JP_SURBL and URIBL_SBL which scored enough to override
 BAYES_00.

Also, for what it's worth, in SA 3.1.0, URIBL_JP_SURBL + URIBL_SBL + BAYES_00 is
less than 5.0.


score BAYES_00 0.0001 0.0001 -2.312 -2.599
score URIBL_JP_SURBL 0 3.360 0 4.087
score URIBL_SBL 0 1.094 0 1.639

Adding up the set 3 scores, we get 3.127 points. Clearly well below 5.0.

So you statement that BAYES_00 could not over-ride the two URIBLs is a bit 
untrue.


Re: question on training spamassassin

2006-02-27 Thread Jeff Portwine
I'm a SA newbie myself, but  I believe I've read that all the headers, etc, 
are stripped before the learning takes place, so it should work fine for you 
to have your users go ahead and do that for training.


Somebody here will correct me if i'm wrong...

-Jeff

- Original Message - 
From: Webmaster [EMAIL PROTECTED]

To: users@spamassassin.apache.org
Sent: Monday, February 27, 2006 1:45 PM
Subject: question on training spamassassin



A large number of our clients are using POP.
If I were to ask them to send false negatives to [EMAIL PROTECTED]
and false positives to [EMAIL PROTECTED] so I can place them in
a folder and train,  does that hinder the training process in
anyway knowing that the header info is changed with the
forwarding process.

Thanks.






Re: question on training spamassassin

2006-02-27 Thread Theo Van Dinter
On Mon, Feb 27, 2006 at 02:14:22PM -0500, Jeff Portwine wrote:
 I'm a SA newbie myself, but  I believe I've read that all the headers, etc, 
 are stripped before the learning takes place, so it should work fine for 
 you to have your users go ahead and do that for training.
 
 Somebody here will correct me if i'm wrong...

The SpamAssassin headers are stripped, but the other headers are definitely
not stripped!  Bayes takes tokens from the headers all the time.

http://wiki.apache.org/spamassassin/BayesFaq

may be of use. :)

-- 
Randomly Generated Tagline:
If I were here more often, I wouldn't be gone so much.


pgp54ffUeKbp7.pgp
Description: PGP signature


RE: prefs directories with ^M in the name [SOLVED]

2006-02-27 Thread Jon D. Slater
Thank you Giff!  You are exactly right!

Doing a file /etc/sysconfig/spamassassin tells me the file is CRLF
terminated.

Doing a dos2unix /etc/sysconfig/spamassassin has resolved the issue.

 -Original Message-
 From: Giff Hammar [mailto:[EMAIL PROTECTED]
 Sent: Monday, February 27, 2006 11:44 AM
 To: 'Jon D. Slater'; users@spamassassin.apache.org
 Subject: RE: prefs directories with ^M in the name
 
 Jon,
 
 Typically, it's the difference between UNIX and Windows. If you edited a
 conf file in Windows and used binary mode to transfer it to the SA
 machine,
 the ^M would be in the conf file. There are a couple of ways around it.
 The
 first is to transfer in ASCII mode, the second is to run dos2unix on the
 file and the third is to edit the conf file in vi on the SA machine. If
 you
 choose the third option, open the file in vi and you should see ^M at the
 end of each line.
 Type
 :1,$ s/^v^m// what you will actually see is :1,$ s/^M//
 and press enter. The ^V won't actually appear, but it will force vi to
 look
 for ^M vice the ^ character followed by M.
 
 Hope this helps.
 
 Giff
 
 -Original Message-
 From: Jon D. Slater [mailto:[EMAIL PROTECTED]
 Sent: Monday, February 27, 2006 1:01 PM
 To: users@spamassassin.apache.org
 Subject: prefs directories with ^M in the name
 
 Hi all,
 
 I’ve read the FAQ and still don’t find this issue.
 
 Configuration:
 Spamassassin 3.0.4
 OS:  Fedora Core 4
 SPAMDOPTIONS=”-d -u spamassassin -x  -P
 --virtual-config-dir=/usr/share/spamassassin/%u.prefs
 
 So, my prefs files are all being stored in /usr/share/spamassassin
 
 Everything seems to be running fine.
 
 When I cd into /usr/share/spamassassin and do an ‘ls’, I see:
 
 members.prefs
 members.prefs^M   (control M, not “^” and “M”)
 
 If I remove the “^M” version, after some period of time, they come back.
 
 What is creating these? And how do I fix it?
 
 Thanks!
 
 Jon
 
 
 
 
 
 
 --
 No virus found in this incoming message.
 Checked by AVG Free Edition.
 Version: 7.1.375 / Virus Database: 268.1.0/269 - Release Date: 2/24/2006




Re: question on training spamassassin

2006-02-27 Thread Matt Kettler
Webmaster wrote:
 A large number of our clients are using POP.
 If I were to ask them to send false negatives to [EMAIL PROTECTED] 
 and false positives to [EMAIL PROTECTED] so I can place them in 
 a folder and train,  does that hinder the training process in 
 anyway knowing that the header info is changed with the 
 forwarding process.
 

Yes...Forwards are more-or-less completely unusable for training purposes.


However, you might be able to get forward as attachment to work, if your mail
client supports it.


The problem with forwards is twofold.

First, the headers are completely destroyed. This is a major problem for
SpamAssassin's bayes engine, which studies headers.


Second, not only the header info is changed.. The body gets completely redone.
Mail clients typically add text to the top, and then re-encode the body text all
over.

If the orignal was base-64 encoded, the forward may not be.

If the original was multipart/alternative with text/plain and a text/html, the
forward might drop the text/plain, and create a new one based on the content of
the text/html section.

As far as spam tools are concerned, these messages bear little resemblance to
one another.





Re: FP on URIBL_JP_SURBL + URIBL_SBL

2006-02-27 Thread Dave Pooser
 SA doesn't look up the host's IP against SBL.. it looks up the IPs of the
 nameservers.

Ah. Okay, then, I have been laboring under a misapprehension.

 Also, for what it's worth, in SA 3.1.0, URIBL_JP_SURBL + URIBL_SBL +
 BAYES_00 is less than 5.0.
 
 score BAYES_00 0.0001 0.0001 -2.312 -2.599
 score URIBL_JP_SURBL 0 3.360 0 4.087
 score URIBL_SBL 0 1.094 0 1.639
 
 Adding up the set 3 scores, we get 3.127 points. Clearly well below 5.0.

True. I'd increased the SBL score because I misunderstood how URIBL_SBL
works; I thought it was flagging sites that were hosted on SBL-listed
addresses, and I trust the SBL far more than other blacklists so I was
willing to score it higher.

Gilda Radner

Never mind!

/Gilda Radner
-- 
Dave Pooser
Cat-Herder-in-Chief, Pooserville.com
...Life is not a journey to the grave with the intention of arriving
safely in one pretty and well-preserved piece, but to slide across the
finish line broadside, thoroughly used up, worn out, leaking oil, and
shouting GERONIMO!!! -- Bill McKenna




Re: question on training spamassassin

2006-02-27 Thread Jeff Portwine
Hmm.. I don't quite understand this.At my company, we forward any spam 
that gets through to [EMAIL PROTECTED] and any ham marked as spam to 
[EMAIL PROTECTED] ... this was set up long ago before I even started 
working here and the spam filter worked really well.   Recently our bayes 
database was broken and I ended up clearing it and retraining it with old 
spam and ham.   Since that time a lot of spams that were getting through 
STOPPED getting through after a couple of days of forwarding them to the 
spam address... and I haven't seen any false spams.So it seems like it 
does work for us, but you're saying it shouldn't ?



- Original Message - 
From: Matt Kettler [EMAIL PROTECTED]

To: [EMAIL PROTECTED]
Cc: users@spamassassin.apache.org
Sent: Monday, February 27, 2006 2:29 PM
Subject: Re: question on training spamassassin



Webmaster wrote:

A large number of our clients are using POP.
If I were to ask them to send false negatives to [EMAIL PROTECTED]
and false positives to [EMAIL PROTECTED] so I can place them in
a folder and train,  does that hinder the training process in
anyway knowing that the header info is changed with the
forwarding process.



Yes...Forwards are more-or-less completely unusable for training purposes.


However, you might be able to get forward as attachment to work, if your 
mail

client supports it.


The problem with forwards is twofold.

First, the headers are completely destroyed. This is a major problem for
SpamAssassin's bayes engine, which studies headers.


Second, not only the header info is changed.. The body gets completely 
redone.
Mail clients typically add text to the top, and then re-encode the body 
text all

over.

If the orignal was base-64 encoded, the forward may not be.

If the original was multipart/alternative with text/plain and a text/html, 
the
forward might drop the text/plain, and create a new one based on the 
content of

the text/html section.

As far as spam tools are concerned, these messages bear little resemblance 
to

one another.








Re: SORBS unreasonable

2006-02-27 Thread Jeremy Kister

On 2/27/2006 3:47 AM, Johann Spies wrote:

One of our email-servers is blacklisted by SORBS and they want us to
pay $50 to get the server taken of the list.


I had an entire /16 blocked by sorbs a small while ago.


How do the members of this list handle situations like that?


Three ways (only the first was productive):

1. I voiced my concerns to nanog: 
http://www.cctec.com/maillists/nanog/historical/0404/msg00353.html


2.  on every domain you can, put:
a href=http://www.sorbs.net;Worthless Project/a (a 
href=http://www.google.com/search?q=Worthless%20Project;SORBS/a)


3. I created a SORBS RBL server for folks to run on their own machine, 
which actually got quite popular at one point: 
http://jeremy.kister.net/code/perl/sorbs.pl



--

Jeremy Kister
http://jeremy.kister.net./


RE: /etc/shadow access from SA

2006-02-27 Thread Dallas L. Engelken
 -Original Message-
 From: Theo Van Dinter [mailto:[EMAIL PROTECTED] 
 Sent: Monday, February 27, 2006 12:51
 To: SpamAssassin
 Subject: Re: /etc/shadow access from SA
 
 On Mon, Feb 27, 2006 at 12:01:31PM -0600, Dallas L. Engelken wrote:
  Justin, Are you positive?  I don't see getpwnam or getpwuid 
 accessing 
  /etc/shadow on linux.  It hits /etc/passwd for the getpw* calls.
  
  # cat test.pl
  my $uid = getpwnam('root');
  my $name = getpwuid(0);
  print name=$name uid=$uid\n;
 
 That's because you're not asking for information found in shadow... :)
 
  # strace perl test.pl 21 | grep passwd
  open(/etc/passwd, O_RDONLY)   = 3
  open(/etc/passwd, O_RDONLY)   = 3
 
 Here's my version:
 
 # cat t
 my @info = getpwnam(root);
 my @info2 = getpwuid(0);
 

Gotcha.  Thanks for the clarification  :)

D


Re: FP on URIBL_JP_SURBL + URIBL_SBL

2006-02-27 Thread List Mail User
4dquiz-com (dot instead of dash) is getting DNS service from
orderbox-dns_com ('_' instead of '.') - This makes them immediately
suspect;  Some of the subdomains and servers in that domain are strictly
black, others are grey - They have been widely discussed in some non-public
forums recently.  Unfortunately there are quite a few DirectI customers
being used as human shields by the orderbox-dns_com domains and there
seems to be some sort of close relationship between DirectI and orderbox.
(DirectI are definitely now in the good guy category.)

It is likely due to the name server check that the SBL rule was
triggered.  As to the SURBL [ws], you'd have to ask (or someone from SURBL
volunteer an answer), but there is probably some reason (it still might be
a FP).

Finally, what threshold are you trying to use that a score near 3
is marked as spam?  (My addition of the rules you say were hit, estimated
independent of SA version.)

Paul Shupak
[EMAIL PROTECTED]


Re: FP on URIBL_JP_SURBL + URIBL_SBL

2006-02-27 Thread Matt Kettler
Dave Pooser wrote:

 True. I'd increased the SBL score because I misunderstood how URIBL_SBL
 works; I thought it was flagging sites that were hosted on SBL-listed
 addresses, and I trust the SBL far more than other blacklists so I was
 willing to score it higher.

Lesson to learn: Don't increase the scores without reading STATISTICS-set*.txt

From STATISTICS-set3.txt:

OVERALL%   SPAM% HAM% S/ORANK   SCORE  NAME
 22.415  31.8425   0.43700.986   0.491.64  URIBL_SBL

The S/O is 0.986, which means that 1.4% of messages matching the rule were not 
spam.

Generally speaking, SA's perceptron knows what it's doing... If you think a
score needs adjusting, check the stats to see what's going on..


Re: FP on URIBL_JP_SURBL + URIBL_SBL

2006-02-27 Thread Dave Pooser
 OVERALL%   SPAM% HAM% S/ORANK   SCORE  NAME
  22.415  31.8425   0.43700.986   0.491.64  URIBL_SBL
 
 The S/O is 0.986, which means that 1.4% of messages matching the rule were not
 spam.

Yep. But in my environment, that's my first-ever case (out of roughly
300,000 messages scanned in the past year) when URIBL_SBL hit a ham. Running
a corporate email server makes for a significantly different corpus than the
universe as a whole, and thus makes some different scoring sensible.

(But that's still no excuse for tweaking a rule score without realizing what
it's doing, and I have flogged myself appropriately for it.)
-- 
Dave Pooser
Cat-Herder-in-Chief, Pooserville.com
...Life is not a journey to the grave with the intention of arriving
safely in one pretty and well-preserved piece, but to slide across the
finish line broadside, thoroughly used up, worn out, leaking oil, and
shouting GERONIMO!!! -- Bill McKenna




RE: question on training spamassassin

2006-02-27 Thread Webmaster
 

 -Original Message-
 From: Matt Kettler [mailto:[EMAIL PROTECTED] 
 Sent: February 27, 2006 11:30 AM
 To: [EMAIL PROTECTED]
 Cc: users@spamassassin.apache.org
 Subject: Re: question on training spamassassin
 
 Webmaster wrote:
  A large number of our clients are using POP.
  If I were to ask them to send false negatives to [EMAIL PROTECTED] and 
  false positives to [EMAIL PROTECTED] so I can place them in a 
 folder and 
  train,  does that hinder the training process in anyway 
 knowing that 
  the header info is changed with the forwarding process.
  
 
 Yes...Forwards are more-or-less completely unusable for 
 training purposes.
 
 
 However, you might be able to get forward as attachment to 
 work, if your mail client supports it.
 
 
 The problem with forwards is twofold.
 
 First, the headers are completely destroyed. This is a major 
 problem for SpamAssassin's bayes engine, which studies headers.
 
 
 Second, not only the header info is changed.. The body gets 
 completely redone.
 Mail clients typically add text to the top, and then 
 re-encode the body text all over.
 
 If the orignal was base-64 encoded, the forward may not be.
 
 If the original was multipart/alternative with text/plain and 
 a text/html, the forward might drop the text/plain, and 
 create a new one based on the content of the text/html section.
 
 As far as spam tools are concerned, these messages bear 
 little resemblance to one another.
 

Yes, I thought that may be the case.
Thanks.



RE: question on training spamassassin

2006-02-27 Thread Webmaster
 

 -Original Message-
 From: Theo Van Dinter [mailto:[EMAIL PROTECTED] 
 Sent: February 27, 2006 11:18 AM
 To: users@spamassassin.apache.org
 Subject: Re: question on training spamassassin
 
 On Mon, Feb 27, 2006 at 02:14:22PM -0500, Jeff Portwine wrote:
  I'm a SA newbie myself, but  I believe I've read that all 
 the headers, 
  etc, are stripped before the learning takes place, so it 
 should work 
  fine for you to have your users go ahead and do that for training.
  
  Somebody here will correct me if i'm wrong...
 
 The SpamAssassin headers are stripped, but the other headers 
 are definitely not stripped!  Bayes takes tokens from the 
 headers all the time.
 
 http://wiki.apache.org/spamassassin/BayesFaq
 
 may be of use. :)
 

Thanks.  I read the wiki.
This is unfortunate because many clients are still using this client:
Microsoft Outlook Express: It does not appear to have a redirect option 




Re: question on training spamassassin

2006-02-27 Thread Matt Kettler
Jeff Portwine wrote:
 Hmm.. I don't quite understand this.At my company, we forward any
 spam that gets through to [EMAIL PROTECTED] and any ham marked as spam to
 [EMAIL PROTECTED] ... this was set up long ago before I even started
 working here and the spam filter worked really well.   Recently our
 bayes database was broken and I ended up clearing it and retraining it
 with old spam and ham.   Since that time a lot of spams that were
 getting through STOPPED getting through after a couple of days of
 forwarding them to the spam address... and I haven't seen any false
 spams.So it seems like it does work for us, but you're saying it
 shouldn't ?

Correct. It shouldn't work very well.

Also if your users are only or mostly forwarding spam, SA's bayes is going to
have a bayes bias that all messages forwarded by your mail clients are spam,
regardless of content.




Re: netware

2006-02-27 Thread Daryl C. W. O'Shea

On 2/27/2006 10:28 AM, Matt Kettler wrote:

admin wrote:


Hi

I have just a simple question and I did not find any exact answer. 
Is NetWare or is NetWare going to be supported by SpamAssassin?

Thanks a lot for an answer.
 


Apparently Novell's perl is sufficiently broken that I highly doubt
SpamAssassin will work on it.


I still have nightmares from when I last did any major Perl stuff on a 
Novell BorderManager server in the late 90s.


You'd probably be best off integrating spamc on the Novell server, 
getting it to pass off connections to a machine running the *nix 
platform of your choosing.



Daryl



Re: SA running, but not working

2006-02-27 Thread Evan Platt

At 08:49 AM 2/27/2006, you wrote:

Newbie question:
I'm using Sendmail on an ES4 server that was built buy our server's host.
It originally was set up with Procmail, but because of migration 
problems from an old server we had to switch it to Sendmail.

Anyway, Spamassassin was pre-installed.
I just started the service running, but none of our mail is being 
tagged with a X-Spam header.
I've looked for Spamassassin configuration files, and all I could 
find was /etc/mail/spamassassin/local.cf and all I can do in there 
is change the threshhold and subject line tag.
Is there comething somewhere I need to check/change to get it to 
work with Sendmail?

Just a point in the right direction would be nice. =)


Just a hint, but you need to somehow call SpamAssassin. Not sure how 
you'd do that with sendmail, as I run postfix. But maybe someone else 
can help you out. But basically you call spamassassin - it's not automatic.




Re: SORBS unreasonable: Accusation retracted

2006-02-27 Thread David B Funk
On Mon, 27 Feb 2006, Johann Spies wrote:

 New information came to light and I retract my insinuation that SORBS
 was unreasonable:  Apparently the owner(s) of the spesific mailing
 list populated the list with names harvested from the internet.

 Apologies to SORBS.

 Regards
 Johann

That would explain why one of my spamtrap addresses recently started
getting announcment type messages from your institution.
Would you please beat those list owners with a 'clue-stick' ;)
and then remove the address [EMAIL PROTECTED]

Thanks,
Dave

-- 
Dave Funk  University of Iowa
dbfunk (at) engineering.uiowa.eduCollege of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include std_disclaimer.h
Better is not better, 'standard' is better. B{