Next Botnet plugin soon

2006-12-07 Thread John Rudd


I'm going to release 0.6 on Thursday or Friday.  It will only have the 
following changes:



1) a typo in the .txt file.

2) I figured out how to get the long package name ( 
Mail::SpamAssassin::Plugin::Botnet ) to work.


3) A coworker found a genuine bug in the IP-in-Hostname check (it would 
match the same IP octet twice because I took a shortcut in my regular 
expression; this was almost never a worry, except, if, say, your ip 
address included an octet of .1., and your hostname had something like 
101 in it ... not really a fair match, so I have written a slightly 
less optimal regular expression that makes sure any given octet is only 
matched once). (I'm using tonight and tomorrow to get some extra time in 
to be sure the bug fix works, etc.; that's why I'm waiting a _little_ 
longer before I release this bug fix)



I may also do a slight code-reorganization for 0.7 that moves the actual 
checks into subroutines that can be called outside of spam assassin (ie. 
that don't use $pms arguments).  Then include a give me an IP address 
and I'll tell what rules it fails utility in the tar file.  This would 
also make it easy to use the exact same code directly in things like 
Mimedefang and such.


So, the spamassassin based calls would take the $pms object, extract a 
relay IP addr and hostname (and test for things like which IP's to skip 
or pass, etc.).  Then they would call the new subroutines with that 
extracted information.


If you wanted to do the same checks from some other perl program, you'd 
have to feed it an IP address and hostname in the call.



So, that's my plans for 0.6 and 0.7.  Hopefully I wont need to do 
anything else before a 1.0 release.














Re: Rule update over DNS?

2006-12-07 Thread Justin Mason

Jason Haar writes:
 Daryl C. W. O'Shea wrote:
 
  What's stopping you from running sa-update more frequently?  I run it
  once an hour on most of my systems.
 May I propose that sa-update should become merged into spamd? (or
 daemonized)
 
 I'm thinking of lessons learned with ClamAV. Once upon a time they
 relied on people running freshclam manually (via cron) to look for
 updates. People loved it. Tens of thousands loved it. Update servers got
 HAMMERED by people running freshclam every MINUTE.
 
 So they did two things: Starting using DNS to tell freshclam if there
 really was a new update,

uh yeah, we do that already, for that reason! ;)

 and got freshclam to run as a daemon - so it
 could randomly sleep between lookups - and thus spread the load.

Well, that's a good point.

I can think of a useful modification -- change sa-update so that, if it's
run non-interactively, it sleeps for a random amount of 0-600 seconds.
That would reduce the hit.

(it's easy enough to tell if it's an interactive session; perl's
(-T STDIN) switch can tell if it's run from the command line
or cron.)

However note that we also support any number of mirror servers, too.
given that, I think it's doubtful we're going to run into this
problem...

--j.

 If all SA users set sa-update to run hourly - then when an update comes
 out, you will have *all* SA users contacting the same sites
 simultaneously for the downloads. Och...
 
 OTOH, if a daemon (like spamd itself - or a daemonized version of
 sa-update I suppose) was responsible, it could do the initial DNS lookup
 every 0-3600 seconds (just an example) and download when it sees an
 update - thus spreading the load.
 
 I know putting a sleep `expr $RANDOM / 9`  sa-update  does the same
 thing - but people won't do that...
 
 -- 
 Cheers
 
 Jason Haar
 Information Security Manager, Trimble Navigation Ltd.
 Phone: +64 3 9635 377 Fax: +64 3 9635 417
 PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1


RE: how to modify headers so sa-learn gives more accurate results?

2006-12-07 Thread Leon Kolchinsky


 -Original Message-
 From: Matt Kettler [mailto:[EMAIL PROTECTED]
 Sent: Wednesday, December 06, 2006 7:15 PM
 To: לאון קולצ'ינסקי
 Cc: users@spamassassin.apache.org
 Subject: Re: how to modify headers so sa-learn gives more accurate
 results?
 
 Leon Kolchinsky wrote:
  Hello All,
 
  I'm using the following script for reporting Razor and teaching BAYESIAN
 with ham and spam messages.
 
  I have the following questions:
  ---
  1) If I have the following in local.cf:
  use_bayes1
  bayes_auto_learn 1
 
  Starting from what score message automatically learned by Bayesian?
 
  2) I do quarantine to spam mails and manually review all spam, then I
 put all False Positives (ham) to ham folder and all spam to spam folder
 and run the following script to populate Bayesian and report to Razor.
 
  Should I remove headers added like those -
  X-Quarantine-ID: X-Spam-Flag: X-Spam-Score: X-Spam-Level: X-Spam-Status:
 
 sa-learn will automatically ignore any headers and other markups that
 were added by SA, so you don't need to remove those.
 
 You can either remove X-Quarantine-ID, or use a bayes_ignore_header
 command to tell SA not to tokenize this.
 

OK, Thanks,

So the script should look like this now?

sa-learn --showdots --bayes_ignore_header X-Quarantine-ID --bayes_ignore_header 
X-Amavis-Alert --ham *

The problem that I can't find any bayes_ignore_header option in 
# man sa-learn


  Or any others, so learning (sa-learn) would be more accurate?
  Any other recommendations?
 


Regards,
Leon



Re: SA not firing on every email

2006-12-07 Thread Jason Marshall
Perhaps SA was too busy and those messages timed out and weren't scanned ? 
Maybe those messages were greater than 250K (default max scan size) ?


I have the same sort of problem, though it's on linux rather than windows. 
Several emails sneak through when the server is busy.


I write to spam quarantine, mail spool, and bayes databases over NFS, and 
sometimes the NFS server gets busy.


I understand that spamassassin times out, but i'm running spamc with the 
-x option, which is supposed to, rather than pass the message through 
un-filtered, bounce it back to sendmail to try again.  Is an appropriate 
return code not being set when spamc times out, maybe?  Or does the -x 
option no longer work?



From the manpage:


   -x  Disables the 'safe fallback' error-recovery method, which passes
   through the unaltered message if an error occurs.  Instead, exit
   with an error code, and let the MTA queue up the mails for a retry
   later.  See also EXIT CODES.


From my .procmailrc:


:0fw
| /usr/local/bin/spamc -x

:0:
* ^X-Spam-Status: YES
mail/spamfile

Am I missing something obvious?  thanks anyone!

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
| Jason Marshall, [EMAIL PROTECTED] Spots InterConnect, Inc. Calgary, AB |
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


Re: how to modify headers so sa-learn gives more accurate results?

2006-12-07 Thread Matt Kettler
Leon Kolchinsky wrote:
 OK, Thanks,

 So the script should look like this now?

 sa-learn --showdots --bayes_ignore_header X-Quarantine-ID 
 --bayes_ignore_header X-Amavis-Alert --ham *
   
Erm.. bayes_ignore_header isn't a command-line option. It's a
config-file option. put it in your local.cf.


 The problem that I can't find any bayes_ignore_header option in 
 # man sa-learn
   
Of course not. see man Mail::SpamAssassin::Conf



RE: how to modify headers so sa-learn gives more accurate results?

2006-12-07 Thread Leon Kolchinsky


 -Original Message-
 From: Matt Kettler [mailto:[EMAIL PROTECTED]
 Sent: Thursday, December 07, 2006 12:36 PM
 To: לאון קולצ'ינסקי
 Cc: users@spamassassin.apache.org
 Subject: Re: how to modify headers so sa-learn gives more accurate
 results?
 
 Leon Kolchinsky wrote:
  OK, Thanks,
 
  So the script should look like this now?
 
  sa-learn --showdots --bayes_ignore_header X-Quarantine-ID --
 bayes_ignore_header X-Amavis-Alert --ham *
 
 Erm.. bayes_ignore_header isn't a command-line option. It's a
 config-file option. put it in your local.cf.
 
 
  The problem that I can't find any bayes_ignore_header option in
  # man sa-learn
 
 Of course not. see man Mail::SpamAssassin::Conf

Thanks, for pointing that out for me :)


Help with understanding a rule

2006-12-07 Thread Magnus.Ekhall

Hi,

Recently I sent an email to a list. That email was classified by several
spamassasins as spam due to the contents of the From: header that did not
include my full name. (This email is sent from the same account)

Users on the list said that the full name should be included in the From:
header and not only the email address as is the case now.

I want the IT staff to change this, but they require some proof that the
full name should be there(!).

Does anyone know why the full name should be in the From: header? From what
I can read in RFC 822, 4.2.1 there is no real requiremet of this. Is there
anything else I can point to?


This is the rule that matched my email:


Content analysis details:   (3.0 points, 3.0 required)

 pts rule name  description
 -- --
 3.0 NO_REAL_NAME   From: does not include a real name


Thanks,
Magnus Ekhall


missing SA scores in headers

2006-12-07 Thread vertito
My SA score inside headers are missing but the scores would inside the body of 
that spam email?
 
How can I bring the SA scores back to headers? See below:
 
X-Spam-Status: No, score=4.7 required=5.0 tests=HTML_80_90, 
HTML_IMAGE_RATIO_06,HTML_MESSAGE,HTML_NONELEMENT_00_10 
autolearn=disabled version=3.1.7 



Re: trouble calling spamc from within postfix

2006-12-07 Thread Mathias Homann

Noel Jones schrieb:

 * NEVER * use sendmail -t to reinject mail coming from the network.
 Doing so will send mail to everyone listed in the To: header, which
 doesn't have anything to do with who should receive the mail.

 As the guide said, use sendmail -oi -f ${sender} -- ${recipient}.

[...]
 In your case, probably the easiest solution is to add -o
 content_filter=spamassassin to the 127.0.0.1:10031 ... smtpd entry,
 and remove the content_filter from the pickup entry, and don't set
 content_filter in master.cf.



thanks a lot, that did it.


bye,
MH

-- 
Die unaufgeforderte Zusendung einer Werbemail an Privatleute verstößt gegen §1 
UWG und §823 I
BGB (Beschluß des LG Berlin vom 2.8.1998 Az: 16 O 201/98). Jede kommerzielle 
Nutzung der
übermittelten persönlichen Daten sowie deren Weitergabe an Dritte ist 
ausdrücklich untersagt!



RE: Help with understanding a rule

2006-12-07 Thread Michael Scheidell
 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] 
 Sent: Thursday, December 07, 2006 5:54 AM
 To: users@spamassassin.apache.org
 Subject: Help with understanding a rule
 
 
 Content analysis details:   (3.0 points, 3.0 required)
 
  pts rule name  description
  -- 
 --
  3.0 NO_REAL_NAME   From: does not include a real name
 
 

3.0 is WAY too low to be a useful score.

The list managers also have way too much spam coming in, so they over
reacted.

The list managers are the first ones who have to change.

Also, the default scoring for no_real_name is NOT 3.  Again, the list
managers are the ones who are telling you that they don't want to bother
with you.

Here is the default SA score:

score NO_REAL_NAME 0 0.550 0 0.961

NOT 3.0.

-- 
Michael Scheidell, CTO
SECNAP Network Security Corporation
Keep up to date with latest information on IT security: Real time
security alerts:
http://www.secnap.com/news
 


What is the correct way of whitelisting local mail?

2006-12-07 Thread Robert S

I'm trying to stop SA from incorrectly labeling local messages as
spam.  The most common target is a weekly script that notifies the
user of quarantined spams.  The subject lines of each message fire off
a false positive.

What is the correct way of whitelisting local mail?

trusted_networks 192.168.2. 127.0.0.1 does not seem to ensure this and

whitelist_from @mydomain.com

might whitelist messages with spoofed sending addresses.

Can anybody help?


SV: Help with understanding a rule

2006-12-07 Thread Magnus.Ekhall
The list managers are the first ones who have to change.


Yes, you are probably right. But: there must be a reason why the
rule no_real_name exists? And if there is a rule (written or not)
that From: headers should contain a real name, I want to follow it.

And to follow it I need to convince my IT staff somehow...

So, what is the reason behind no_real_name?

Cheers,
Magnus Ekhall


RE: Help with understanding a rule

2006-12-07 Thread Sietse van Zanen
I want the IT staff to change this, but they require some proof that the
full name should be there(!).

That is definite proof of an incompetent IT staff..


Re: SA not firing on every email

2006-12-07 Thread Craig
Thanks for your reply
 
Its not that the server is to busy-I can put any one of those emails in the 
receive directory when no other emails are in the que-and being scanned and it 
still gets passed through.
 
Size is not an issue, the emails are 26k.
 
More details-
I have spamassassin intigrated with Guinevere, and Groupwise is my mail 
application.
 
Any and all suggestions are welcome!

 Rick Macdougall [EMAIL PROTECTED] 12/06/2006 5:01 PM 
Craig wrote:
 Yes I have asked this question previously, but  with not as much detail.
  
 MY ENVIRONMENT
 SA 3.1.7
 running on Windows 2000
 Using Bayes
  
 In the past 2 days my email server has received 14,973 email messages, 
 Spamassassin has scanned 10,951 of those messages, and my users have 
 received @ 250 spam messages.
  
 Most of those spam messages have Subjects like;
 - All love enhancers on one portal!
 - Full of health? Then don't click!
 - Need medicine? All here!
   and my favorite
 - She wants a better sex? All you need's here!
  
 Why does SA fire on some emails (10,951) and not others (4,022)
 If I run any of these captured emails through manually, they score 50+ 
 points.
  

Hi,

Perhaps SA was too busy and those messages timed out and weren't scanned 
?  Maybe those messages were greater than 250K (default max scan size) ?

I'd personally go with option 1 but I don't know your server setup, how 
many children you allow with spamd and how busy your server is.

Regards,

Rick



Re: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread Justin Mason

Kelly Jones writes:
 Spamassassin has lots of tests for fake HELOs. If someone says HELO
 hotmail.com, but aren't connecting from a Hotmail IP address, they
 get dinged (spam score is increased).
 
 Recently, someone connected our server, call it mx.xyz.com, and said
 HELO mx.xyz.com. Spamassassin didn't ding it for doing this.
 
 Is there a ruleset that does this? I realize xyz.com couldn't be
 hardcoded (otherwise, it'd be a different ruleset for everyone), but
 is there a generic ruleset that uses a function call or something to
 figure out your MX server (or the name of the machine spamassassin is
 running on) and then ding someone HELO'ing as that?

This is a great spam-sign alright, but I don't know of a way to detect
what the local site's HELO is, bar each site writing their own rules to do
so.

Bayes does a good job of figuring this out, btw.

Any suggestions?

--j.


Re: SA not firing on every email

2006-12-07 Thread guenther
On Thu, 2006-12-07 at 03:12 -0700, Jason Marshall wrote:
  Perhaps SA was too busy and those messages timed out and weren't scanned ? 
  Maybe those messages were greater than 250K (default max scan size) ?
 
 I have the same sort of problem, though it's on linux rather than windows. 
 Several emails sneak through when the server is busy.

This most likely is not the same issue as the OP has,


 I write to spam quarantine, mail spool, and bayes databases over NFS, and 
 sometimes the NFS server gets busy.
 
 I understand that spamassassin times out, but i'm running spamc with the 
 -x option, which is supposed to, rather than pass the message through 
 un-filtered, bounce it back to sendmail to try again.  Is an appropriate 
 return code not being set when spamc times out, maybe?  Or does the -x 
 option no longer work?
 
 From the manpage:
 
 -x  Disables the 'safe fallback' error-recovery method, which passes
 through the unaltered message if an error occurs.  Instead, exit
 with an error code, and let the MTA queue up the mails for a retry
 later.  See also EXIT CODES.
 
 From my .procmailrc:

procmail ist not an MTA, but an MDA (Mail Transport or Delivery Agent
respectively). procmail processes your mail and delivers it. According
to your receipts, correctly. ;)


 :0fw
 | /usr/local/bin/spamc -x

You're using spamc as a filter. There is no fallback receipt what to do
when the filter finishes unsuccessful (based on the exit code).

 :0:
 * ^X-Spam-Status: YES
 mail/spamfile

Filter finished unsuccessful, mail not altered, hence no such header. So
let's move on and check the next receipt...


 Am I missing something obvious?  thanks anyone!

The fact that procmail is not an MTA and does not queue mails (see the
description of the spamc -x option above).

...guenther


-- 
char *t=[EMAIL PROTECTED];
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



false positives

2006-12-07 Thread Kamen TOMOV
Hi,

I constantly have problems with spamcop these days. Could you tell me
what's wrong with my messages so that I can fix it?

Thanks,
-- 
Камен


RE: false positives

2006-12-07 Thread Sietse van Zanen
They contain too little information.

-Sietse



From: Kamen TOMOV
Sent: Thu 07-Dec-06 14:34
To: users@spamassassin.apache.org
Subject: false positives


Hi,

I constantly have problems with spamcop these days. Could you tell me
what's wrong with my messages so that I can fix it?

Thanks,
-- 
Камен


Re: SV: Help with understanding a rule

2006-12-07 Thread Chris Lear

* [EMAIL PROTECTED] wrote (07/12/06 12:03):

The list managers are the first ones who have to change.



Yes, you are probably right. But: there must be a reason why the
rule no_real_name exists? And if there is a rule (written or not)
that From: headers should contain a real name, I want to follow it.

And to follow it I need to convince my IT staff somehow...

So, what is the reason behind no_real_name?


Most MUAs, most of the time, put a real name into mail they send. It's 
standard setup. So not having a real name is, perhaps, a spam sign This 
isn't the same as contravening RFCs. Remember that there's a rule called 
HTML_MESSAGE as well, which might be a spam sign. Both of these are 
bound to hit ham a lot of the time, so scoring them high would be, at 
best, an unusual decision. Scoring them high enough to reject would be 
very unusual.


As it happens, on a server I manage NO_REAL_NAME hits 5% of spam, and 
25% of ham (much of which is not MUA-originated). So it's not a rule I'd 
like to reject on.


But if a mailing list or a user has a you must provide a real name 
policy, spamassassin's flexible enough to be able to enforce it.


Chris


Re: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread Alan Munday

Justin Mason wrote the following on 07/12/2006 13:21:


This is a great spam-sign alright, but I don't know of a way to detect
what the local site's HELO is, bar each site writing their own rules to do
so.

Bayes does a good job of figuring this out, btw.

Any suggestions?


A script that telnets into the mail system to discover helo name and the 
associated IP?

Then it can write a system specific rule.

Alan



Re: Rule update over DNS?

2006-12-07 Thread Theo Van Dinter
On Thu, Dec 07, 2006 at 09:31:36AM +, Justin Mason wrote:
  and got freshclam to run as a daemon - so it
  could randomly sleep between lookups - and thus spread the load.
 
 I can think of a useful modification -- change sa-update so that, if it's
 run non-interactively, it sleeps for a random amount of 0-600 seconds.
 That would reduce the hit.

I'm not sure how this would help exactly.  If people want to check for updates
once a minute, and sa-update sleeps randomly for up to 10m, this just means
their system will have (potentially) 10 sa-updates running at the same time.
Through the magic of randomness, all 10 of those could end up making requests
at the same time (or at least within the same minute), and that's a lot less
spread out than once a minute.

 However note that we also support any number of mirror servers, too.
 given that, I think it's doubtful we're going to run into this
 problem...

Yeah, the design, I think, is pretty scalable.

-- 
Randomly Selected Tagline:
Don't ever make trouble here, I beat you up each time.
  - From Rumble in the Bronx


pgpVllgCOSCT6.pgp
Description: PGP signature


RE: SV: Help with understanding a rule

2006-12-07 Thread Sietse van Zanen

Think of this anology:

If somebody calls me on my home phone, I immediately see his nr. (If I don't 
see a nr. I don't pick up my phone at all). Now, the first thing I'd expect 
someone to say when I pick up is his name. If people start talking to me 
without stating who they are, it is commercial sh*** 95% of the time and I just 
hang up.

It's a matter of being polite. Very regularly e-mail addresses are unindicating of the person's name, for example only containing initials. 


It basically comes down to this, if a real name is not specified the chance 
that it is spam is considerable and it should be scored a couple of points.

-Sietse



From: Chris Lear
Sent: Thu 07-Dec-06 15:06
To: users@spamassassin.apache.org
Subject: Re: SV: Help with understanding a rule


* [EMAIL PROTECTED] wrote (07/12/06 12:03):

The list managers are the first ones who have to change.



Yes, you are probably right. But: there must be a reason why the
rule no_real_name exists? And if there is a rule (written or not)
that From: headers should contain a real name, I want to follow it.

And to follow it I need to convince my IT staff somehow...

So, what is the reason behind no_real_name?


Most MUAs, most of the time, put a real name into mail they send. It's 
standard setup. So not having a real name is, perhaps, a spam sign This 
isn't the same as contravening RFCs. Remember that there's a rule called 
HTML_MESSAGE as well, which might be a spam sign. Both of these are 
bound to hit ham a lot of the time, so scoring them high would be, at 
best, an unusual decision. Scoring them high enough to reject would be 
very unusual.


As it happens, on a server I manage NO_REAL_NAME hits 5% of spam, and 
25% of ham (much of which is not MUA-originated). So it's not a rule I'd 
like to reject on.


But if a mailing list or a user has a you must provide a real name 
policy, spamassassin's flexible enough to be able to enforce it.


Chris


Re: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread Jack L. Stone
On 7 Dec 2006 at 13:21, Justin Mason wrote:

 
 Kelly Jones writes:
  Spamassassin has lots of tests for fake HELOs. If someone says
  HELO hotmail.com, but aren't connecting from a Hotmail IP
  address, they get dinged (spam score is increased).
  
  Recently, someone connected our server, call it mx.xyz.com, and
  said HELO mx.xyz.com. Spamassassin didn't ding it for doing
  this.
  
  Is there a ruleset that does this? I realize xyz.com couldn't
  be hardcoded (otherwise, it'd be a different ruleset for
  everyone), but is there a generic ruleset that uses a function
  call or something to figure out your MX server (or the name of
  the machine spamassassin is running on) and then ding someone
  HELO'ing as that?
 
 This is a great spam-sign alright, but I don't know of a way to
 detect what the local site's HELO is, bar each site writing their
 own rules to do so.
 
 Bayes does a good job of figuring this out, btw.
 
 Any suggestions?
 
 --j.
 

I use milter-regex as the frontline wall and this regex for 
catching fakers:

## HELO faking my own IP address
tempfail Malformed HELO (can't be me)
helo /^70\.86\.37\.82$/

HTH.




Regards,
Jack L. Stone
System Admin


Re: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread Justin Mason

Jack L. Stone writes:
 On 7 Dec 2006 at 13:21, Justin Mason wrote:
  Kelly Jones writes:
   Spamassassin has lots of tests for fake HELOs. If someone says
   HELO hotmail.com, but aren't connecting from a Hotmail IP
   address, they get dinged (spam score is increased).
   
   Recently, someone connected our server, call it mx.xyz.com, and
   said HELO mx.xyz.com. Spamassassin didn't ding it for doing
   this.
   
   Is there a ruleset that does this? I realize xyz.com couldn't
   be hardcoded (otherwise, it'd be a different ruleset for
   everyone), but is there a generic ruleset that uses a function
   call or something to figure out your MX server (or the name of
   the machine spamassassin is running on) and then ding someone
   HELO'ing as that?
  
  This is a great spam-sign alright, but I don't know of a way to
  detect what the local site's HELO is, bar each site writing their
  own rules to do so.
  
  Bayes does a good job of figuring this out, btw.
  
  Any suggestions?
 
 I use milter-regex as the frontline wall and this regex for 
 catching fakers:
 
 ## HELO faking my own IP address
 tempfail Malformed HELO (can't be me)
 helo /^70\.86\.37\.82$/
 
 HTH.

yeah -- there are any number of ways to do this, if requiring admin
configuration is OK -- I'm asking for ways we can automatically
figure it out from SpamAssassin code, without help. ;)

--j.


Re: SpamAssassin dns timeouts... why?!

2006-12-07 Thread Richard D Alloway

On Thu, 7 Dec 2006, Matthias Häker wrote:


Richard D Alloway schrieb:


Hi!  I have been having loads of problems with spamassassin timing out 
during DNS lookups...


If I use

/usr/bin/spamassassin -D  /tmp/spamemail.txt

I see the correct IP used for the nameserver:

[16018] dbg: dns: name server: 192.168.1.1, family: 2, ipv6: 0



maybe you should use the DNS Server from your ISP and not the DNS Proxy from 
your Router / Gateway


Hi Matthias.

I *AM* the ISP ;)

We have a dedicated DNS server that we communicate with over a non-routable 
network to segregate the mail server traffic from the rest of our network. 
This was to reduce the load on our primary and secondary DNS servers that serve 
our customers.


The dedicated mail DNS server handles 2 RBLs locally (one rsync'd from the RBL 
vendor and one that is our own) and caches all non-authoritative traffic.


Thanks for the suggestion, though! :)

-Rich

Re: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread Duncan Hill
On Thursday 07 December 2006 15:11, Justin Mason wrote:

 yeah -- there are any number of ways to do this, if requiring admin
 configuration is OK -- I'm asking for ways we can automatically
 figure it out from SpamAssassin code, without help. ;)

Really and truly, it belongs at the MTA level, not in the scoring engine.  
Being pedantic aside...

A new config item would make it easier - one that defines the IP address 
and/or names (including NAT/CNAME) that the MTAs talking to the SA instance 
are known by.  A plug-in / core subroutine can then compare the received 
lines to see if the HELO fragment matches the 'by a.b.c' fragments, where 
a.b.c is a name listed in the config item.

Problem is, I don't have any samples to be more concrete with - my servers 
reject any machines that claim to be in my DNS domain or IP range (unless 
they're in mynetworks).


Re[4]: spam

2006-12-07 Thread Fred T
Hello Neal,

Wednesday, December 6, 2006, 11:08:27 AM, you wrote:

 Except for the problem that body tests include the subject, so there
 will be non-alpha characters in the body due to the subject inclusion.

 Are you sure about that?  I find nothing in the documentation that
 indicates this (though I admit I didn't look terribly hard).  All I see
 is:

100% sure of this, I've been writing rules for over 2 years, not that
big by some standards, but I've come to know for a very long time this
is how it is.  Do a simple test to see for yourself, I have a rule to
check for FREE in caps.  It's a body rule, create a simple test
message with FREE in the subject and not in the body, now run that
message through and see it hit ;)


 http://wiki.apache.org/spamassassin/WritingRules
 For our first rule, let's start with the simplest type of
 rules, the basic body rule. These rules search the body of the message
 with a regular expression and if it matches, the corresponding score is
 assigned.

It must be in the official doc's that come with the install, I'm
looking over the wiki to see how it can be updated.


 Considering headers are not part of the body, I'd say that if body rules
 match against the subject, then either the documentation in the wiki is
 misleading and needs to be changed, or there's a problem with the body
 rules behavior.

I know it's been this way, there's probably a really old bugzilla
ticket someone can dig up, but it's been around since 2.64 or earlier.


-- 
Best regards,
 Fredmailto:[EMAIL PROTECTED]



No Nework tests?!

2006-12-07 Thread leemansvg

I'm running spamassasint --lint and it comes up saying that its only doing
local tests. I've enabled dns and I am connected to the internet. I've also
enabled razor, dcc, and pyzor in the spam.assassin.perfs files. Does anyone
have an idea where I might have a mis-configuration. Here's snap in from the 
--lint test

[30223] dbg: plugin: loading Mail::SpamAssassin::Plugin::DCC from @INC  
0.00032
[30223] dbg: dcc: local tests only, disabling DCC   0.00817
[30223] dbg: plugin: registered
Mail::SpamAssassin::Plugin::DCC=HASH(0x91ef780) 0.00028
[30223] dbg: plugin: loading Mail::SpamAssassin::Plugin::Pyzor from @INC 
0.00016
[30223] dbg: pyzor: local tests only, disabling Pyzor   0.00346
[30223] dbg: plugin: registered
Mail::SpamAssassin::Plugin::Pyzor=HASH(0x928b9a8)   0.00022
[30223] dbg: plugin: loading Mail::SpamAssassin::Plugin::Razor2 from @INC 
0.00016
[30223] dbg: razor2: local tests only, skipping Razor   0.00372
[30223] dbg: plugin: registered
Mail::SpamAssassin::Plugin::Razor2=HASH(0x91b29f4)  0.0002
[30223] dbg: plugin: loading Mail::SpamAssassin::Plugin::SpamCop from @INC 
0.00016
[30223] dbg: reporter: local tests only, disabling SpamCop

Thanks.
-- 
View this message in context: 
http://www.nabble.com/No-Nework-tests-%21-tf2775186.html#a7741659
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re[2]: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread Fred T
Hello Justin,

Thursday, December 7, 2006, 10:11:45 AM, you wrote:

 yeah -- there are any number of ways to do this, if requiring admin
 configuration is OK -- I'm asking for ways we can automatically
 figure it out from SpamAssassin code, without help. ;)

As someone else pointed out, the best bet might be the use of a new
config item / plugin.  something like:

ifplugin mxhelo
mx_helo_name  mx.host.tld host.tld d.d.d.d
headerHELO_AS_ME  eval:check_for_my_mx()
score HELO_AS_ME  0.1
endif

I'll create a ticket for enhancement.


-- 
Best regards,
 Fredmailto:[EMAIL PROTECTED]



RE: No Nework tests?!

2006-12-07 Thread Bowie Bailey
leemansvg wrote:
 I'm running spamassasint --lint and it comes up saying that its only
 doing local tests. I've enabled dns and I am connected to the
 internet. I've also enabled razor, dcc, and pyzor in the
 spam.assassin.perfs files. Does anyone have an idea where I might
 have a mis-configuration. Here's snap in from the --lint test

As of the most recent versions, --lint does not do network tests.  If you
want to debug network tests, you will need to feed in a test message that
has some header information for the network tests to work with.

spamassassin -D  test.msg

-- 
Bowie


Synchronizing two Bayes database

2006-12-07 Thread Emmanuel Lesouef
Dear List,

This is sort of a repost of a previous email I sent to this list.

I have two mailserver acting as mail proxies for ou main mailserver.

These two servers have the same sitewide configuration for Spamassassin
and they use site-wide bayes databases.

For a reason I don't really know, the 2 bayes database are not the same.
And the one of the second MX isn't really good at detecting spam. I
suppose I forgot to do a sa-learn someday...

My question is : what can I do to have the same database on the two
mailserver ? Is there a procedure to dump the database from the best
mailserver and import it on the second ?

Thanks for your attention and help you can give.

-- 
Emmanuel Lesouef


RE: Re[4]: spam

2006-12-07 Thread Coffey, Neal
Fred T wrote:
 100% sure of this, I've been writing rules for over 2 years, not that
 big by some standards, but I've come to know for a very long time this
 is how it is.

 [...]
 
 I know it's been this way, there's probably a really old bugzilla
 ticket someone can dig up, but it's been around since 2.64 or earlier.

Thanks for the clarification, Fred.  It's behavior I wouldn't have
expected, so I'm glad it's been brought up.


Re: ***SPAM*** SpamAssassin dns timeouts... why?!

2006-12-07 Thread Jeff Chan
On Wednesday, December 6, 2006, 2:19:11 PM, Richard Alloway wrote:
 Any idea what could be wrong?  I'm rapidly running out of ways to try to
 increase performance here.

Net::DNS uses the first server in your resolv.conf .  Make sure
that server works, is local, etc.

Jeff C.
-- 
Jeff Chan
mailto:[EMAIL PROTECTED]
http://www.surbl.org/



RE: Synchronizing two Bayes database

2006-12-07 Thread Sietse van Zanen
Sure, use MySQL for bayes storage and have both servers use that DB. Then you 
could be fairly sure, both use the same bayes.

I think it should even be possible to dump both databases and migrate into one 
SQL db. But I don't use MySQL myself, so I would not know how.

-Sietse




From: Emmanuel Lesouef
Sent: Thu 07-Dec-06 17:28
To: Spamassassin Mailing-List
Subject: Synchronizing two Bayes database


Dear List,

This is sort of a repost of a previous email I sent to this list.

I have two mailserver acting as mail proxies for ou main mailserver.

These two servers have the same sitewide configuration for Spamassassin
and they use site-wide bayes databases.

For a reason I don't really know, the 2 bayes database are not the same.
And the one of the second MX isn't really good at detecting spam. I
suppose I forgot to do a sa-learn someday...

My question is : what can I do to have the same database on the two
mailserver ? Is there a procedure to dump the database from the best
mailserver and import it on the second ?

Thanks for your attention and help you can give.

-- 
Emmanuel Lesouef


Re: rules_du_jour not working confusion?

2006-12-07 Thread Daryl C. W. O'Shea

Alan Munday wrote:

Daryl C. W. O'Shea wrote the following on 06/12/2006 17:31:


Is a migration document really necessary?  Stop using the rule files 
you got via RDJ that you now want to get with sa-update.  Start using 
sa-update for those rule files.  Have some lunch.


Agreed - I do like to lunch. Though the last time I counted there are 26 
rulesets on the SARE site but only 20 on your channels page.


I don't have a channels page.  I will in the future, but it's way down 
the list of things to do.


My howto says:

  Channels names are created by prepending the .cf file name found on
  the SARE site (http://www.rulesemporium.com/rules.htm) to
  .sare.sa-update.dostech.net.

It has no mention of there only being a subset of the rules available. 
They're all there, even some old ones that aren't listed on the rules 
page anymore.  The current count is one hundred (100) channels, some of 
which are pretty much useless though, as they're rules for old versions 
of SA.


If you want to confirm I have a ruleset, either check DNS, or do what a 
good 75% of the people currently using the channels have done and check 
out the index of the directory housing all the channels:


http://daryl.dostech.ca/sa-update/sare/


A migration document which covers why this is the case and what to do 
about the other rulesets covered by RDJ or there status as they are 
added to the number of rulesets that can be updated via sa-update may be 
very useful.


As a said before, the only channels that aren't currently provided are 
ones for Bill Stearns rules and I think at least some of those are used 
for input to SURBL anyway.


So:
 - it's not really the case
 - new SARE rulesets are added immediately (as in less than 5 minutes)


Feel free, though, to edit the SpamAssassin wiki to improve the 
documentation there as you see fit.  This and my last two emails to this 
thread should have all the necessary info.



Daryl


Re: false positives

2006-12-07 Thread Kamen TOMOV
On четвъртък, Декември 07 2006, Sietse van Zanen wrote:

 They contain too little information.

All right - here is more information. I sent a message to a group and
I got it classified as spam. Here is the report:

*  1.7 SUBJECT_ENCODED_TWICE Subject: MIME encoded twice

Here is how the subject looks like when I sent it:

(off-topic) spamcop =?windows-1251?B?4vrv8O7x6A==?=

It looks to me that it is not encoded twice. However, here is the
subject of the message that was received in the list:

 [SPAM] =?windows-1251?q?=5BSPAM=5D_=28off-topic=29_spamcop_=E2?=
=?windows-1251?b?+u/w7vHo?=

.., which might have been encoded twice. So is that a problem of the
mail-list?

* -0.0 SPF_HELO_PASS SPF: HELO matches SPF record
*  0.1 FORGED_RCVD_HELO Received: contains a forged HELO

Can anybody tell me what does HELO matches SPF record mean?

* -0.0 SPF_PASS SPF: sender matches SPF record
*  0.0 BAYES_50 BODY: Bayesian spam probability is 40 to 60%
*  [score: 0.4115]
*  0.2 MIME_BASE64_NO_NAME RAW: base64 attachment does not have a file
*  name

What attachments? I haven't attached anything to my message. It looks
like spamassassin took the hole message as an attachment just because
it is base64 - encoded.

*  1.9 MIME_BASE64_TEXT RAW: Message text disguised using base64 encoding

I don't understand why base64 encoded message is classified as
disguised? My mail agent had just decided to encode the message in
base64 encoding as it contains cp1251 characters so what's wrong with
that?

*  0.4 AWL AWL: From: address is in the auto white-list

Can anybody tell me what does From: address is in the auto
white-list mean? If it is in a white list why the coefficient is 0?

-- 
Камен


forwarding email

2006-12-07 Thread aubreyL

OS - slackware 11.0
MDA - sendmail 8.13.8
mimedefang version 2.58
SpamAssassin version 3.1.7
 running on Perl version 5.8.8


I have one user that has to get email forwarded from an old account to 
the server that I administer.  I have spam going to a spamdrop via 
MiMEDefang.  So I added this little bit into mimedefang-filter



   # Spam checks if SpamAssassin is installed
   if ($Features{SpamAssassin}) {
   if (-s ./INPUTMSG  100*1024) {
   # Only scan messages smaller than 100kB.  Larger messages
   # are extremely unlikely to be spam, and SpamAssassin is
   # dreadfully slow on very large messages.
   my($hits, $req, $names, $report) = spam_assassin_check();
   my($score);
   if ($hits = req) {
   #   action_discard();

   # Remove original recipients
   # Add a header with original recipients, just for info
   action_add_header(X-Orig-Rcpts, join(, , @Recipients));

   # Remove original recipients
   foreach $recip (@Recipients) {
   delete_recipient($recip);
   }

   # Send to spam address
   add_recipient('[EMAIL PROTECTED]');
   }

This works great, except for that email that is getting forwarded.  
Maybe 1 out of 45 messages are ham, the rest, spam.  The problem I have 
is the messages that are ham are getting sent to the spamdrop as well.  
All of the messages that get tagged as spam, get the spamassassin report 
attached.  But the ham messages that should not go to the spamdrop *do 
not* get a spamassassin report, or score.  If I take the message(s) out 
of the spamdrop, and run them through spamassassin, then they do not 
score high enough to get filtered.


Does anyone know why this is, or ever had an issue like this?

TIA
-Aubrey


RE: false positives

2006-12-07 Thread Sietse van Zanen
off-topic) spamcop =?windows-1251?B?4vrv8O7x6A==?=

Was that really your subject, did you type that? I think the 
=?windows-1251?B?4vrv8O7x6A==?= is the double encoded part.

Your problem might be the result of some incompatibility between slavic - 
european character sets. But I'm not suchh an smtp expert. Other people 
probably can elaborate more on this.

SPF is Sender Policy Framework. More information can be found here: 
http://www.openspf.org/
It validates that the mail servers sending are really mail servers responsible 
for the domain they send mail for. So SPF matches are a good thing.

More info on the AWL can be found here: 
http://wiki.apache.org/spamassassin/AutoWhitelist

-Sietse



From: Kamen TOMOV
Sent: Thu 07-Dec-06 18:00
To: users@spamassassin.apache.org
Subject: Re: false positives


On четвъртък, Декември 07 2006, Sietse van Zanen wrote:

 They contain too little information.

All right - here is more information. I sent a message to a group and
I got it classified as spam. Here is the report:

*  1.7 SUBJECT_ENCODED_TWICE Subject: MIME encoded twice

Here is how the subject looks like when I sent it:

(off-topic) spamcop =?windows-1251?B?4vrv8O7x6A==?=

It looks to me that it is not encoded twice. However, here is the
subject of the message that was received in the list:

 [SPAM] =?windows-1251?q?=5BSPAM=5D_=28off-topic=29_spamcop_=E2?=
=?windows-1251?b?+u/w7vHo?=

.., which might have been encoded twice. So is that a problem of the
mail-list?

* -0.0 SPF_HELO_PASS SPF: HELO matches SPF record
*  0.1 FORGED_RCVD_HELO Received: contains a forged HELO

Can anybody tell me what does HELO matches SPF record mean?

* -0.0 SPF_PASS SPF: sender matches SPF record
*  0.0 BAYES_50 BODY: Bayesian spam probability is 40 to 60%
*  [score: 0.4115]
*  0.2 MIME_BASE64_NO_NAME RAW: base64 attachment does not have a file
*  name

What attachments? I haven't attached anything to my message. It looks
like spamassassin took the hole message as an attachment just because
it is base64 - encoded.

*  1.9 MIME_BASE64_TEXT RAW: Message text disguised using base64 encoding

I don't understand why base64 encoded message is classified as
disguised? My mail agent had just decided to encode the message in
base64 encoding as it contains cp1251 characters so what's wrong with
that?

*  0.4 AWL AWL: From: address is in the auto white-list

Can anybody tell me what does From: address is in the auto
white-list mean? If it is in a white list why the coefficient is 0?

-- 
Камен


Re: Percentage of email that is spam after filtering?

2006-12-07 Thread Fred T
Hello Kelly,

Friday, November 24, 2006, 8:28:38 PM, you wrote:

 I know that most (90%+) email sent now is spam, but what are the
 numbers for people who use spam filtering?

Well, I run a small ISP with about 3,000 mailboxes, we receive about
50k messages per day.  Of that, on average 39-44k are blocked by SA
for scoring 6+ points.  From what slips in, I created a simple VB
program to use spamassassin to scan the messages sitting in the
inboxes. In the last few days of running, it's identified 12,404 spam
and 72,520 ham.  Since the spammers make huge runs and then change or
disappear for a while, I needed a method to clean my maildir almost
like real-time virus scanning.  Except I'm just running my scanners on
free CPU of various workstations, if my program ID's spam in someone's
mailbox, it removes it and I verify it and add to my corpus.

According to my numbers, about 17% of mail passing SA is considered
spam by the time I'm done writing rules after it's already entered my
system.  I block at 6.0 and use no RBL's.  I do write custom rules
daily.

-- 
Best regards,
 Fredmailto:[EMAIL PROTECTED]



Re: SV: Help with understanding a rule

2006-12-07 Thread Michael Scheidell
[EMAIL PROTECTED] wrote:
 The list managers are the first ones who have to change.

 

 Yes, you are probably right. But: there must be a reason why the
 rule no_real_name exists? And if there is a rule (written or not)
 that From: headers should contain a real name, I want to follow it.

 And to follow it I need to convince my IT staff somehow...

 So, what is the reason behind no_real_name?

   
None.

 Cheers,
 Magnus Ekhall

   


-- 
Michael Scheidell, CTO
SECNAP Network Security / www.secnap.com
[EMAIL PROTECTED]  / 1+561-999-5000, x 1131



Re: Percentage of email that is spam after filtering?

2006-12-07 Thread aubreyL

Fred T wrote:

Hello Kelly,

Friday, November 24, 2006, 8:28:38 PM, you wrote:

  

I know that most (90%+) email sent now is spam, but what are the
numbers for people who use spam filtering?



Well, I run a small ISP with about 3,000 mailboxes, we receive about
50k messages per day.  Of that, on average 39-44k are blocked by SA
for scoring 6+ points.  From what slips in, I created a simple VB
program to use spamassassin to scan the messages sitting in the
inboxes. In the last few days of running, it's identified 12,404 spam
and 72,520 ham.  Since the spammers make huge runs and then change or
disappear for a while, I needed a method to clean my maildir almost
like real-time virus scanning.  Except I'm just running my scanners on
free CPU of various workstations, if my program ID's spam in someone's
mailbox, it removes it and I verify it and add to my corpus.

According to my numbers, about 17% of mail passing SA is considered
spam by the time I'm done writing rules after it's already entered my
system.  I block at 6.0 and use no RBL's.  I do write custom rules
daily.

  
Why do you not run RBL's?  RBL's account for more than 60% of all spam 
that is getting filtered from my server.  Of course I'm small (60 users) 
but we get 25MB of spam daily.  So far, 100% spam is filtered from my 
server.


-=Aubrey=-


Re: What is the correct way of whitelisting local mail?

2006-12-07 Thread Nels Lindquist

Robert S wrote:


I'm trying to stop SA from incorrectly labeling local messages as
spam.  The most common target is a weekly script that notifies the
user of quarantined spams.  The subject lines of each message fire off
a false positive.

What is the correct way of whitelisting local mail?


The best way, if possible, is to configure your MTA not to run 
SpamAssassin on local mail traffic, however you define that.



Nels Lindquist


Re: Synchronizing two Bayes database

2006-12-07 Thread Emmanuel Lesouef
Yes, I was thinking about this solution.

But isn't it network ressource hungry ?

And if I would like to keep a files based bayes db, what should be the
good manner to migrate one to another server ?

Thanks Sietse for the advice.

Sietse van Zanen a écrit :
 Sure, use MySQL for bayes storage and have both servers use that DB.
 Then you could be fairly sure, both use the same bayes.
  
 I think it should even be possible to dump both databases and migrate
 into one SQL db. But I don't use MySQL myself, so I would not know how.
  
 -Sietse
  
 
 
 *From:* Emmanuel Lesouef
 *Sent:* Thu 07-Dec-06 17:28
 *To:* Spamassassin Mailing-List
 *Subject:* Synchronizing two Bayes database
 
 Dear List,
 
 This is sort of a repost of a previous email I sent to this list.
 
 I have two mailserver acting as mail proxies for ou main mailserver.
 
 These two servers have the same sitewide configuration for Spamassassin
 and they use site-wide bayes databases.
 
 For a reason I don't really know, the 2 bayes database are not the same.
 And the one of the second MX isn't really good at detecting spam. I
 suppose I forgot to do a sa-learn someday...
 
 My question is : what can I do to have the same database on the two
 mailserver ? Is there a procedure to dump the database from the best
 mailserver and import it on the second ?
 
 Thanks for your attention and help you can give.
 
 -- 
 Emmanuel Lesouef


-- 
Emmanuel Lesouef


Re: Score=x+5

2006-12-07 Thread Fred T
Hello Alan,

Wednesday, November 29, 2006, 8:23:14 PM, you wrote:

 -0.0 P0F_UNIX   OS fingerprint BSD/Solaris/HP-UX/Tru64

I'm curious about P0F_UNIX could you share this rule with me?  And any
similar fingerprint rules?  Thanks!


-- 
Best regards,
 Fredmailto:[EMAIL PROTECTED]



local.cf

2006-12-07 Thread Andrea Bencini
I am looking for local.cf documentation to understand which are the
variables to set in this file.
Can you help me?
Thank
Andrea



Re: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread John D. Hardin
On Wed, 6 Dec 2006, Kelly Jones wrote:

 Recently, someone connected our server, call it mx.xyz.com, and said
 HELO mx.xyz.com. Spamassassin didn't ding it for doing this.

IMHO this is worthy of a 500 reject at the MTA level. There is NO
legitimate reason for J. Random User out on the internet to claim his
MTA is yours.

I've posted milter-regex examples that do this here before.

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  The fetters imposed on liberty at home have ever been forged out
  of the weapons provided for defense against real, pretended, or
  imaginary dangers from abroad.   -- James Madison, 1799
---
 8 days until Bill of Rights day



Re: Rule update over DNS?

2006-12-07 Thread Kelson

Jason Haar wrote:

May I propose that sa-update should become merged into spamd? (or
daemonized)


Merging would be bad. There are plenty of us using methods other than 
spamd to call SpamAssassin.


--
Kelson Vibber
SpeedGate Communications www.speed.net


Re: What is the correct way of whitelisting local mail?

2006-12-07 Thread John D. Hardin
On Thu, 7 Dec 2006, Robert S wrote:

 I'm trying to stop SA from incorrectly labeling local messages as
 spam.  The most common target is a weekly script that notifies the
 user of quarantined spams.  The subject lines of each message fire off
 a false positive.

Determine what is passing messages to SA and tell it to not do that
with locally-sources messages. If you use procmail to launch spamc
this is pretty easy to do.

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  The fetters imposed on liberty at home have ever been forged out
  of the weapons provided for defense against real, pretended, or
  imaginary dangers from abroad.   -- James Madison, 1799
---
 8 days until Bill of Rights day



Re: local.cf

2006-12-07 Thread Steven Stern

Andrea Bencini wrote:

I am looking for local.cf documentation to understand which are the
variables to set in this file.
Can you help me?
Thank
Andrea
  

man Mail::SpamAssassin::Conf



RE: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread Larry Rosenman
John D. Hardin wrote:
 On Wed, 6 Dec 2006, Kelly Jones wrote:
 
 Recently, someone connected our server, call it mx.xyz.com, and said
 HELO mx.xyz.com. Spamassassin didn't ding it for doing this.
 
 IMHO this is worthy of a 500 reject at the MTA level. There is NO
 legitimate reason for J. Random User out on the internet to claim his
 MTA is yours.  
 
 I've posted milter-regex examples that do this here before.

I have the following in my EXIM Rcpt ACL:
---
  # kill off the folks that use OUR ip's in HELO Nice and Early.
  drop   message= Forged IP detected in HELO: $sender_helo_name
 hosts  = !+relay_from_hosts
 !authenticated = *
 condition  = ${if \
eq{$sender_helo_name}{$interface_address}{yes}{no}}
  # Forged hostname - HELOs as my own hostname or domain (early as well)
  drop   message= Forged hostname detected in HELO:
$sender_helo_name
 hosts  = !+relay_from_hosts
 !authenticated = *
 condition  = ${lookup {$sender_helo_name} \
 
lsearch{/usr/local/etc/exim/checkfiles/our_host_names}
{yes}{no}}

If they try and HELO/EHLO as my IP or host name, we unceremoniusly drop the
connection. 

Just one other solution to this issue.



-- 
Larry Rosenman http://www.lerctr.org/~ler
Phone: +1 512-248-2683 E-Mail: ler@lerctr.org
US Mail: 430 Valona Loop, Round Rock, TX 78681-3893



Re: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread hamann . w
 
 On Wed, 6 Dec 2006, Kelly Jones wrote:
 
  Recently, someone connected our server, call it mx.xyz.com, and said
  HELO mx.xyz.com. Spamassassin didn't ding it for doing this.
 
 IMHO this is worthy of a 500 reject at the MTA level. There is NO
 legitimate reason for J. Random User out on the internet to claim his
 MTA is yours.
 
 I've posted milter-regex examples that do this here before.
 
 --

Hi,

if you have outside users sending through your mta, you need to allow them 
almost any
garbage in the helo string.
So the helo check should be run at mail or rcpt time - users are authenticated 
then

Wolfgang Hamann





Re: forwarding email

2006-12-07 Thread Jonas Eckerman
This really would be more on topic on the MIMEDefang list, but here goes...

You have a small but significant typo in your code:

 if ($hits = req) {

You forgot the $ in $req.

The effect of the above comparison is that all mail that scores above 0 (zero) 
are considered spam.

Regards
/Jonas
-- 
Jonas Eckerman, FSDB  Fruktträdet
http://whatever.frukt.org/
http://www.fsdb.org/
http://www.frukt.org/



Re: Rule update over DNS?

2006-12-07 Thread Jim Maul

Kelson wrote:

Jason Haar wrote:

May I propose that sa-update should become merged into spamd? (or
daemonized)


Merging would be bad. There are plenty of us using methods other than 
spamd to call SpamAssassin.





I dont think anyone is using spamd to call SpamAssassin.



New to Spamassassin

2006-12-07 Thread Development

I would like to know if it is possible to use spamassassin on one server to
filter mail and then deliver it to a seperate mail server on the network
running exchange, groupwise, etc?


Re: Rule update over DNS?

2006-12-07 Thread Justin Mason

Jim Maul writes:
 Kelson wrote:
  Jason Haar wrote:
  May I propose that sa-update should become merged into spamd? (or
  daemonized)
  
  Merging would be bad. There are plenty of us using methods other than 
  spamd to call SpamAssassin.
 
 I dont think anyone is using spamd to call SpamAssassin.

???

one over here ;)

--j.


Botnet 0.6 plugin for Spam Assassin availabile

2006-12-07 Thread John Rudd


(I had a bout of insomnia last night, and got more done than I had 
pre-announced yesterday...)



The next version of the Botnet plugin for Spam Assassin is ready.  The 
install instructions are in the Botnet.txt file, and in the INSTALL file.


For those who don't know what Botnet is, it's a plugin which tries to 
identify whether or not the message has been submitted by a 
botnet/spam-zombie type host by looking at its DNS characteristics (no 
reverse DNS, reverse DNS that doesn't resolve, or doesn't resolve back 
to the relay's IP, or reverse DNS that contains things that look like an 
ISP's client address).  The places I've been using it, and the people I 
hear about who are using it, have seen a high degree of success.


It can be downloaded from:

 http://people.ucsc.edu/~jrudd/spamassassin/Botnet.tar


As usual, feedback, statistics, bug reports, feature suggestions, are 
all welcome.


NOTE: This will be the last version I announce outside of the SA users 
mailing list.  I don't want to wear out the patience of the other list 
owners.  users@spamassassin.apache.org is where I'll make all further 
release announcements.



What's new in 0.6:


1) IP in Hostname bug fix (the same IP address octet could be matched 
twice.. which was a problem if the octet was 1, and the hostname had a 
sub-string like 101 in it)


2) pass_domains, clientwords, and serverwords weren't insensitive checks

3) typo fixed in botnet.txt

4) moved to Net::DNS (finally; and it's going to be needed for To Do 
item #3)


5) perl package is now named Mail::SpamAssassin::Plugin::Botnet

6) because clientwords and serverwords are meant to be _words_, they are 
now wrapped by (\b|\d) (both before and after the word/expression). 
This is to help avoid false positives where a clientword might have been 
a substring of a larger word that shouldn't have triggered the check 
(similarly for serverwords).


7) similarly, pass_domains now have a leading (\.|\A) added to them IF 
they don't already have \. or \A in front (but it will be added if the 
expression starts with . -- since this is a regular expression, that 
is assumed to mean any single character, so be careful).


8) added debug output for parse_config

9) added mta and relay to serverwords (used by classmates.com and/or 
reunion.com)


10) changed dsl to (a|s|d(yn)?)?dsl in clientwords (so, covers adsl, 
sdsl, ddsl, and dyndsl ... I've seen all of those except ddsl)


11) added res(net|ident(ial)?)? to clientwords (rr.com supposedly uses 
.res. in residential/customer IP hostnames, and .resnet. is common 
at universities for dorm IP addresses)


12) contemplating adding cpe and cust(omer)? to the controversial 
clientwords (I think cpe = customer (presence/provided/?) equipment)







To Do before 1.0:

1) prepend __ to sub-rules, only BOTNET proper should not have that

2) separate the SA routines from the core algorithms, so that the botnet 
checks can be used in other perl programs.  Include a script that takes 
an IP addr and answers where/how it passed/failed.


3) try to do a lookup on the sender's email address domain; if it points 
back to the relay's IP address (A record, or one of the MX records), 
then that's less likely to be a botnet.  Use this like 
BOTNET_SERVERWORDS -- just a counter to BOTNET_CLIENT.  What about SPF, 
too? (I think that was a suggestion in one of the alternate meta rules)


4) credits for help I've gotten from other people

5) get listed in the wiki




deny messageID

2006-12-07 Thread Jean-Paul Natola
I know this may sound weird but,

I have this message ( a valid one) that keeps coming in

The senders machine is off so I'm not really sure whats going on

Its been happening for about 36 hours now- its odd that this message is in
both the mainlog AND the rejectlog- 

My thought is if I deny that message the sending server may eventually give
up?

P=esmtp S=4528454 [EMAIL PROTECTED]
mainlog:2006-12-07 06:59:16 1GsHpH-000P5O-7p =
[EMAIL PROTECTED] H=pmx2.africaonline.co.tz [216.104.206.8]
P=esmtp S=4528454 [EMAIL PROTECTED]
mainlog:2006-12-07 12:08:28 1GsMeF-0002bN-3J =
[EMAIL PROTECTED] H=pmx2.africaonline.co.tz [216.104.206.8]
P=esmtp S=4528454 [EMAIL PROTECTED]
mainlog:2006-12-07 13:18:33 1GsNkS-0002m7-U5 =
[EMAIL PROTECTED] H=pmx2.africaonline.co.tz [216.104.206.8]
P=esmtp S=4528454 [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]
rejectlog:I Message-Id: [EMAIL PROTECTED]









Jean-Paul Natola
Network Administrator
Information Technology
Family Care International
588 Broadway Suite 503
New York, NY 10012
Phone:212-941-5300 xt 36
Fax:  212-941-5563
Mailto: [EMAIL PROTECTED]



Re: Rule update over DNS?

2006-12-07 Thread Jim Maul

Justin Mason wrote:

Jim Maul writes:

Kelson wrote:

Jason Haar wrote:

May I propose that sa-update should become merged into spamd? (or
daemonized)
Merging would be bad. There are plenty of us using methods other than 
spamd to call SpamAssassin.

I dont think anyone is using spamd to call SpamAssassin.


???

one over here ;)

--j.





oh?  Care to explain how spamd would call spamassassin? That would be a 
neat trick ;)


-Jim



our latest award!

2006-12-07 Thread Justin Mason
I think I noted this honour on the dev list a week or two ago -- but the
_physical_ award for 'Best Linux-based Anti-spam Solution' from the Linux
New Media Awards 2006 just turned up, and that warrants another post ;)

Take a look: http://taint.org/2006/12/07/140259a.html

w00t,

--j.


RE: New to Spamassassin

2006-12-07 Thread Jean-Paul Natola

I would like to know if it is possible to use spamassassin on one server to
filter mail and then deliver it to a seperate mail server on the network
running exchange, groupwise, etc?

YES

I use it to  filter my mail - then pass it to exchange-

But the server that has SA must have an MTA and since you are setting that up
you may as well throw CLAMAV on it too

My setup:

BSD server running

Exim-MTA
Clamav- AV
SA-



Re: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread John D. Hardin
On 7 Dec 2006 [EMAIL PROTECTED] wrote:

  
  On Wed, 6 Dec 2006, Kelly Jones wrote:
  
   Recently, someone connected our server, call it mx.xyz.com, and said
   HELO mx.xyz.com. Spamassassin didn't ding it for doing this.
  
  IMHO this is worthy of a 500 reject at the MTA level. There is NO
  legitimate reason for J. Random User out on the internet to claim his
  MTA is yours.
  
  I've posted milter-regex examples that do this here before.
  
  --
 
 if you have outside users sending through your mta, you need to
 allow them almost any garbage in the helo string. So the helo
 check should be run at mail or rcpt time - users are authenticated
 then

In my case that doesn't apply. The first think I do in my milter-regex
set is skip the rest of the file for locally-originated messages.
Extending that to include skipping messages from authenticated senders
would be logical.

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  The fetters imposed on liberty at home have ever been forged out
  of the weapons provided for defense against real, pretended, or
  imaginary dangers from abroad.   -- James Madison, 1799
---
 8 days until Bill of Rights day



Re: Rule update over DNS?

2006-12-07 Thread Justin Mason

Jim Maul writes:
 Justin Mason wrote:
  Jim Maul writes:
  Kelson wrote:
  Jason Haar wrote:
  May I propose that sa-update should become merged into spamd? (or
  daemonized)
  Merging would be bad. There are plenty of us using methods other than 
  spamd to call SpamAssassin.
  I dont think anyone is using spamd to call SpamAssassin.
  
  ???
  
  one over here ;)
 
 oh?  Care to explain how spamd would call spamassassin? That would be a 
 neat trick ;)

ah, I see where you're going!  Although in fact, you could say it's a
valid way to put it -- after all, spamd is just a script which calls the
Mail::SpamAssassin modules. ;)

--j.


Re: New to Spamassassin

2006-12-07 Thread Rick Macdougall

Development wrote:
I would like to know if it is possible to use spamassassin on one server 
to filter mail and then deliver it to a seperate mail server on the 
network running exchange, groupwise, etc?


Hi,

Easiest way is to setup a Unix based MTA (I prefer the Qmail/Simscan 
setup, but what ever you are comfortable with will work) to accept mail 
as the primary MX, scan it and then forward it on to the Internal server.


We do this quite a lot for our clients.

Regards,

Rick



Re: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread Ben O'Hara

On 12/7/06, Kelly Jones [EMAIL PROTECTED] wrote:

Spamassassin has lots of tests for fake HELOs. If someone says HELO
hotmail.com, but aren't connecting from a Hotmail IP address, they
get dinged (spam score is increased).

Recently, someone connected our server, call it mx.xyz.com, and said
HELO mx.xyz.com. Spamassassin didn't ding it for doing this.

Is there a ruleset that does this? I realize xyz.com couldn't be
hardcoded (otherwise, it'd be a different ruleset for everyone), but
is there a generic ruleset that uses a function call or something to
figure out your MX server (or the name of the machine spamassassin is
running on) and then ding someone HELO'ing as that?



Do it at the MTA level, in exim

acl_check_helo:
 deny  condition = ${if or{ { eq{$sender_helo_name}{$interface_address}} \
{  eq{$sender_helo_name}{$primary_hostname}} \
} {yes}{no}}
   message = REJECTED: Fake HELO/EHLO: $sender_helo_name - That's our addre
ss!
 accept


--
We're just a Bunch Of Regular Guys, a collective group that's trying
to understand and assimilate technology. We feel that resistance to
new ideas and technology is unwise and ultimately futile.




--
A Scientist will earn a living by taking a really difficult problem
and spends many years solving it, an engineer earns a living by
finding really difficult problems and side stepping them


Re: ***SPAM*** SpamAssassin dns timeouts... why?!

2006-12-07 Thread Richard D Alloway

On Thu, 7 Dec 2006, Jeff Chan wrote:


On Wednesday, December 6, 2006, 2:19:11 PM, Richard Alloway wrote:

Any idea what could be wrong?  I'm rapidly running out of ways to try to
increase performance here.


Net::DNS uses the first server in your resolv.conf .  Make sure
that server works, is local, etc.


Hi Jeff!

The first server is 192.168.1.1, which is my dedicated, local caching/RBL 
nameserver.  It works and is not overtaxed and the network connecting the mail 
servers to the nameserver is solid (100Mbps FDX).


-Rich


RE: our latest award!

2006-12-07 Thread Sietse van Zanen
Nah, that's overdone.

The linux-based' is waaay too much said... :-)

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Sent: Thursday, December 07, 2006 7:43 PM
To: users@spamassassin.apache.org
Subject: our latest award!

I think I noted this honour on the dev list a week or two ago -- but the
_physical_ award for 'Best Linux-based Anti-spam Solution' from the
Linux
New Media Awards 2006 just turned up, and that warrants another post ;)

Take a look: http://taint.org/2006/12/07/140259a.html

w00t,

--j.


Re: Rule update over DNS?

2006-12-07 Thread Daryl C. W. O'Shea

Jim Maul wrote:

oh?  Care to explain how spamd would call spamassassin? That would be a 
neat trick ;)


Neat, but really simple with the plugin interface. :)


Re: What is the correct way of whitelisting local mail?

2006-12-07 Thread Robert S

Determine what is passing messages to SA and tell it to not do that
with locally-sources messages. If you use procmail to launch spamc
this is pretty easy to do.


I use procmail.  I could do this in /etc/procmailrc:

:0fw: spamassassin.lock
*  256000
* ! From: .*mydomain.com
| /usr/bin/spamc

.. but presumably this would fail to scan messages with forged headers
that claim to come from my network.


RE: Spam: New to Spamassassin

2006-12-07 Thread Darren Cockburn
Absolutely!

 

All you have to do is set up your spamassassin email server as a
smarthost (gateway) email server then forward all scanned email to your
exchange or groupwise server.

 

- Darren.

 



From: Development [mailto:[EMAIL PROTECTED] 
Sent: Thursday, December 07, 2006 1:28 PM
To: users@spamassassin.apache.org
Subject: Spam: New to Spamassassin

 

I would like to know if it is possible to use spamassassin on one server
to filter mail and then deliver it to a seperate mail server on the
network running exchange, groupwise, etc?



Re: Recognizing Sendmail's authentication -- patch included (WAS: How is LOCAL_AUTH_RCVD used?)

2006-12-07 Thread Jo Rhett


On Dec 5, 2006, at 4:17 PM, Daryl C. W. O'Shea wrote:

Jo Rhett wrote:
While you are fixing bugs related to authentication, any chance  
you'll fix the SPF plugin to skip checks on authenticated  
delivery?  Or have an option to enable this behavior?
Or do you want a patch from me?  It'll take me a lot longer than  
you, since I'll spend hours just tracing down the data structures


I know for sure that if there are no external relays detected there  
will be no SPF checks.  There might be checks done (read I'm almost  
certain there is) if all the relays are trusted, but one or more of  
them are external.


I can show you extensive logs of SPF checks against me, submitting  
authenticated mail for my own domain to my relayhost using SA :-)   I  
guess my host is considered external, but it is also TRUSTED so in my  
opinion the logic should be fixed to handle this.


Your other email about this didn't include the necessary debug info  
to confirm the bug as you reported it.
If you'd like me to look at it, I'd need a full debug output,  
including the complete message headers, of a message that exhibits  
the bug.


Here it is again, first the received headers then the entire, very  
verbose debug including SA startup


From: [EMAIL PROTECTED]
Subject:testing SPF relay
Date:   December 7, 2006 12:38:32 PM PST
To:   [EMAIL PROTECTED]
Return-Path:[EMAIL PROTECTED]
	Received: 	from triceratops.lizardarts.com ([unix socket]) by  
triceratops.lizardarts.com (Cyrus v2.3.7) with LMTPA; Thu, 07 Dec  
2006 12:38:40 -0800
	Received: 	from [10.66.240.106] (public-wireless.sv.svcolo.com  
[64.13.135.30]) (authenticated bits=0) by triceratops.lizardarts.com  
(8.13.8/8.13.8) with ESMTP id kB7Kcc5v015458 for  
[EMAIL PROTECTED]; Thu, 7 Dec 2006 12:38:38 -0800 (PST)  
(envelope-from [EMAIL PROTECTED])

Mime-Version:   1.0 (Apple Message framework v752.2)
Content-Transfer-Encoding:  7bit
Message-Id: [EMAIL PROTECTED]
Content-Type:   text/plain; charset=US-ASCII; delsp=yes; format=flowed
X-Mailer:   Apple Mail (2.752.2)
	X-Spam-Status: 	No, score=-3.776 tagged_above=-999 required=4 tests= 
[ALL_TRUSTED=-1.44, AWL=4.164, LOCAL_AUTH_RCVD=-10, SPF_FAIL=3.5]

X-Spam-Level:   
X-Spam-Score:   -3.776
X-Virus-Scanned:amavisd-new at netconsonance.com

[15504] dbg: logger: adding facilities: all
[15504] dbg: logger: logging level is DBG
[15504] dbg: generic: SpamAssassin version 3.1.7
[15504] dbg: config: score set 0 chosen.
[15504] dbg: util: running in taint mode? yes
[15504] dbg: util: taint mode: deleting unsafe environment variables,  
resetting PATH

[15504] dbg: util: PATH included '/usr/local/sbin', keeping
[15504] dbg: util: PATH included '/usr/local/bin', keeping
[15504] dbg: util: PATH included '/usr/sbin', keeping
[15504] dbg: util: PATH included '/sbin', keeping
[15504] dbg: util: PATH included '/usr/bin', keeping
[15504] dbg: util: PATH included '/bin', keeping
[15504] dbg: util: final PATH set to: /usr/local/sbin:/usr/local/bin:/ 
usr/sbin:/sbin:/usr/bin:/bin

[15504] dbg: message:  MIME PARSER START 
[15504] dbg: message: main message type: text/plain
[15504] dbg: message: parsing normal part
[15504] dbg: message: added part, type: text/plain
[15504] dbg: message:  MIME PARSER END 
[15504] dbg: dns: is Net::DNS::Resolver available? yes
[15504] dbg: dns: Net::DNS version: 0.58
[15504] dbg: ignore: test message to precompile patterns and load  
modules
[15504] dbg: config: using /usr/local/etc/mail/spamassassin for  
site rules pre files

[15504] dbg: config: read file /usr/local/etc/mail/spamassassin/init.pre
[15504] dbg: config: read file /usr/local/etc/mail/spamassassin/v310.pre
[15504] dbg: config: read file /usr/local/etc/mail/spamassassin/v312.pre
[15504] dbg: config: using /var/lib/spamassassin/3.001007 for sys  
rules pre files
[15504] dbg: config: read file /var/lib/spamassassin/3.001007/ 
updates_spamassassin_org.pre
[15504] dbg: config: using /var/lib/spamassassin/3.001007 for  
default rules dir
[15504] dbg: config: read file /var/lib/spamassassin/ 
3.001007/70_sare_adult_cf_sare_sa-update_dostech_net.cf
[15504] dbg: config: read file /var/lib/spamassassin/ 
3.001007/70_sare_evilnum0_cf_sare_sa-update_dostech_net.cf
[15504] dbg: config: read file /var/lib/spamassassin/ 
3.001007/70_sare_evilnum1_cf_sare_sa-update_dostech_net.cf
[15504] dbg: config: read file /var/lib/spamassassin/ 
3.001007/70_sare_evilnum2_cf_sare_sa-update_dostech_net.cf
[15504] dbg: config: read file /var/lib/spamassassin/ 
3.001007/70_sare_genlsubj_cf_sare_sa-update_dostech_net.cf
[15504] dbg: config: read file /var/lib/spamassassin/ 
3.001007/70_sare_genlsubj_eng_cf_sare_sa-update_dostech_net.cf
[15504] dbg: config: read file /var/lib/spamassassin/ 
3.001007/70_sare_header_cf_sare_sa-update_dostech_net.cf
[15504] dbg: config: read file /var/lib/spamassassin/ 

blacklist messagID ?

2006-12-07 Thread Jean-Paul Natola
Apparently a remote server is having issues-
It keeps sending this message here-

[EMAIL PROTECTED]

Can I blacklist a message without blacklisting the sender?









Jean-Paul Natola
Network Administrator
Information Technology
Family Care International
588 Broadway Suite 503
New York, NY 10012
Phone:212-941-5300 xt 36
Fax:  212-941-5563
Mailto: [EMAIL PROTECTED]



Re: blacklist messagID ?

2006-12-07 Thread Adam Lanier
On Thu, 2006-12-07 at 16:00 -0500, Jean-Paul Natola wrote:
 Apparently a remote server is having issues-
 It keeps sending this message here-
 
 [EMAIL PROTECTED]
 
 Can I blacklist a message without blacklisting the sender?

Is the sending host someone that you care about receiving messages from?

If not (and maybe even if you do), block the host from connecting to you
and contact the postmaster at that domain, have them remove the
offending message from their queue.



signature.asc
Description: This is a digitally signed message part


RE: blacklist messagID ?

2006-12-07 Thread Jean-Paul Natola

Subject: Re: blacklist messagID ?

On Thu, 2006-12-07 at 16:00 -0500, Jean-Paul Natola wrote:
 Apparently a remote server is having issues-
 It keeps sending this message here-
 
 [EMAIL PROTECTED]
 
 Can I blacklist a message without blacklisting the sender?

Is the sending host someone that you care about receiving messages from?

If not (and maybe even if you do), block the host from connecting to you
and contact the postmaster at that domain, have them remove the
offending message from their queue.

The sender is an employee ours that works in one of our field offices ( in
Africa ) very , very difficult to get any support from the ISP-


I will try to see if I can get anywhere with them


Re: What is the correct way of whitelisting local mail?

2006-12-07 Thread John D. Hardin
On Fri, 8 Dec 2006, Robert S wrote:

  Determine what is passing messages to SA and tell it to not do that
  with locally-sources messages. If you use procmail to launch spamc
  this is pretty easy to do.
 
 I use procmail.  I could do this in /etc/procmailrc:
 
 :0fw: spamassassin.lock
 *  256000
 * ! From: .*mydomain.com
 | /usr/bin/spamc
 
 .. but presumably this would fail to scan messages with forged
 headers that claim to come from my network.

That's why you should check the Received: header your MTA added to see
whether it came from a local network host, or was an authenticated
user.

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  The fetters imposed on liberty at home have ever been forged out
  of the weapons provided for defense against real, pretended, or
  imaginary dangers from abroad.   -- James Madison, 1799
---
 8 days until Bill of Rights day



Re: blacklist messagID ?

2006-12-07 Thread John D. Hardin
On Thu, 7 Dec 2006, Jean-Paul Natola wrote:

 Apparently a remote server is having issues-
 It keeps sending this message here-
 
 [EMAIL PROTECTED]
 
 Can I blacklist a message without blacklisting the sender?

Sure. Write a rule for that message-ID header and give it a score of
1000 or so (adding insult to injury).

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  The fetters imposed on liberty at home have ever been forged out
  of the weapons provided for defense against real, pretended, or
  imaginary dangers from abroad.   -- James Madison, 1799
---
 8 days until Bill of Rights day



RE: blacklist messagID ?

2006-12-07 Thread Jean-Paul Natola


 Apparently a remote server is having issues-
 It keeps sending this message here-
 
 [EMAIL PROTECTED]
 
 Can I blacklist a message without blacklisting the sender?

Sure. Write a rule for that message-ID header and give it a score of
1000 or so (adding insult to injury).

I'm not exactly well versed, scratch that , I DO NOT KNOW how to write rules
:(

Any help please?


RE: blacklist messagID ?

2006-12-07 Thread John D. Hardin
On Thu, 7 Dec 2006, Jean-Paul Natola wrote:

  Apparently a remote server is having issues-
  It keeps sending this message here-
  
  [EMAIL PROTECTED]
  
  Can I blacklist a message without blacklisting the sender?
 
 Sure. Write a rule for that message-ID header and give it a score of
 1000 or so (adding insult to injury).
 
 I'm not exactly well versed, scratch that , I DO NOT KNOW how to write rules
 :(
 
 Any help please?

header TMP_MSGID_01 Message-ID =~
   /[EMAIL PROTECTED]/
score  TMP_MSGID_01 1000

Put that in your /etc/mail/spamassassin/local.cf and restart the
spamassassin daemon.

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  The fetters imposed on liberty at home have ever been forged out
  of the weapons provided for defense against real, pretended, or
  imaginary dangers from abroad.   -- James Madison, 1799
---
 8 days until Bill of Rights day



Google open relay?

2006-12-07 Thread Steven Stern
I've been getting lots of these get out of debt messages. It looks 
like the last stop before getting here is a gmail server.  Could they 
have an open relay?


Received: from ccim-mx2.cciminstitute.com ([10.0.2.10]) by 
ccim-exchange.cciminstitute.com with Microsoft SMTPSVC(6.0.3790.1830);
 Thu, 7 Dec 2006 16:17:53 -0600
Received: from py-out-1112.google.com (py-out-1112.google.com [64.233.166.183])
by ccim-mx2.cciminstitute.com (8.13.8/8.13.6) with ESMTP id 
kB7MHojp020673
for x; Thu, 7 Dec 2006 16:17:50 -0600
Received: by py-out-1112.google.com with SMTP id f31so317551pyh
   for x; Thu, 07 Dec 2006 14:17:46 -0800 (PST)
Received: by 10.35.99.17 with SMTP id b17mr4277287pym.1165529866966;
   Thu, 07 Dec 2006 14:17:46 -0800 (PST)
Received: by 10.35.99.17 with SMTP id b17mr4277286pym.1165529866955;
   Thu, 07 Dec 2006 14:17:46 -0800 (PST)
Received: from shawcable.net (S0106000ea6a66e9b.vc.shawcable.net [24.81.32.62])
   by mx.google.com with SMTP id j7si945230nzd.2006.12.07.14.17.34;
   Thu, 07 Dec 2006 14:17:46 -0800 (PST)
Received-SPF: pass (google.com: domain of [EMAIL PROTECTED] designates 
24.81.32.62 as permitted sender)
Message-ID: [EMAIL PROTECTED]
Date: Thu, 07 Dec 2006 19:10:30 -0400
Reply-To: spring freeman [EMAIL PROTECTED]
From: spring freeman [EMAIL PROTECTED]
MIME-Version: 1.0
To: Lawanna x
Cc: Laci x
Subject: TotallyCardDebtFree Overnight




How can I learn a mail which how many score it got from each my rules?

2006-12-07 Thread Halid Faith
I use spamassassin3.1.7

I go through some mails.
I see a mail in /var/log/spamd.log as below
Wed Dec  6 13:33:49 2006 [4484] info: spamd: result: Y 15 -
EXTRA_MPART_TYPE,FRONTPAGE,HTML_MESSAGE,INVALID_DATE,MIME_BOUND_NEXTPART
,MIME_QP_LONG_LINE,MSGID_MULTIPLE_AT,SARE_GIF_ATTACH,SARE_OBFUGIRLS,SUBJ_ALL
_CAPS,SUBJ_ILLEGAL_CHARS,TW_IY,UNPARSEABLE_RELAY,UPPERCA
SE_25_50
scantime=0.6,size=36790,[EMAIL PROTECTED],uid=1001,required_score=15.0,rhost=
localhost,raddr=127.0.0.1,rport=50832,mi
d=[EMAIL PROTECTED]@domain.com,autolearn=no


Yet, I can't understand which my rule, how many score gave that mail.
How can I learn a mail which how many score it got from each my rules?
is there a command for it ?



Re: How can I learn a mail which how many score it got from each my rules?

2006-12-07 Thread John D. Hardin
On Fri, 8 Dec 2006, Halid Faith wrote:

 I go through some mails.
 I see a mail in /var/log/spamd.log as below
 Wed Dec  6 13:33:49 2006 [4484] info: spamd: result: Y 15 -
 EXTRA_MPART_TYPE,FRONTPAGE,HTML_MESSAGE,INVALID_DATE,MIME_BOUND_NEXTPART
 ,MIME_QP_LONG_LINE,MSGID_MULTIPLE_AT,SARE_GIF_ATTACH,SARE_OBFUGIRLS,SUBJ_ALL
 _CAPS,SUBJ_ILLEGAL_CHARS,TW_IY,UNPARSEABLE_RELAY,UPPERCASE_25_50
 
 Yet, I can't understand which my rule, how many score gave that mail.
 How can I learn a mail which how many score it got from each my rules?
 is there a command for it ?

The per-rule scoring details are probably in a header of the message;
look there, assuming the message hasn't been discarded.

If you look at a spam message and don't see a header with per-rule
scores, then add report_safe 0 to your config file and restart the
daemon.

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  ...to announce there must be no criticism of the President or to
  stand by the President right or wrong is not only unpatriotic and
  servile, but is morally treasonous to the American public.
  -- Theodore Roosevelt, 1918
---
 8 days until Bill of Rights day



RE: How can I learn a mail which how many score it got from each my rules?

2006-12-07 Thread Larry Rosenman
Halid Faith wrote:
 I use spamassassin3.1.7
 
 I go through some mails.
 I see a mail in /var/log/spamd.log as below Wed Dec  6 13:33:49 2006
 [4484] info: spamd: result: Y 15 -
 EXTRA_MPART_TYPE,FRONTPAGE,HTML_MESSAGE,INVALID_DATE,MIME_BOUND_NEXTPART

,MIME_QP_LONG_LINE,MSGID_MULTIPLE_AT,SARE_GIF_ATTACH,SARE_OBFUGIRLS,SUBJ_ALL
 _CAPS,SUBJ_ILLEGAL_CHARS,TW_IY,UNPARSEABLE_RELAY,UPPERCA  
 SE_25_50

scantime=0.6,size=36790,[EMAIL PROTECTED],uid=1001,required_score=15.0,rhost=
 localhost,raddr=127.0.0.1,rport=50832,mi
 d=[EMAIL PROTECTED]@domain.com,autolearn=no
 
 
 Yet, I can't understand which my rule, how many score gave that mail.
 How can I learn a mail which how many score it got from each my rules?
 is there a command for it ?

In your user_prefs, add the following:
report _TESTSSCORES( )_

That shows the tests *AND* the scores:

X-LERCTR-Spam-Report: (-108.6 points, 5.0 required)
BAYES_00=-2.599 DK_POLICY_SIGNSOME=0.001 SPF_PASS=-0.001
UPPERCASE_25_50=0 USER_IN_WHITELIST=-100 USER_IN_WHITELIST_TO=-6

-- 
Larry Rosenman http://www.lerctr.org/~ler
Phone: +1 512-248-2683 E-Mail: ler@lerctr.org
US Mail: 430 Valona Loop, Round Rock, TX 78681-3893



Re: Google open relay?

2006-12-07 Thread John D. Hardin
On Thu, 7 Dec 2006, Steven Stern wrote:

 I've been getting lots of these get out of debt messages. It
 looks like the last stop before getting here is a gmail server.  
 Could they have an open relay?

Have you notified [EMAIL PROTECTED]?

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  ...to announce there must be no criticism of the President or to
  stand by the President right or wrong is not only unpatriotic and
  servile, but is morally treasonous to the American public.
  -- Theodore Roosevelt, 1918
---
 8 days until Bill of Rights day



How do I know if DCC is running and working?

2006-12-07 Thread Vernon Webb
Subject says it all. How can I tell if DDC is running and working on my system?

Thanks


Re: Google open relay?

2006-12-07 Thread Steven Stern

John D. Hardin wrote:

On Thu, 7 Dec 2006, Steven Stern wrote:

  

I've been getting lots of these get out of debt messages. It
looks like the last stop before getting here is a gmail server.  
Could they have an open relay?



Have you notified [EMAIL PROTECTED]?

  

You betcha!  And also reported through spamcop.


Re: Google open relay?

2006-12-07 Thread Evan Platt

At 02:52 PM 12/7/2006, you wrote:


Have you notified [EMAIL PROTECTED]?



You're kidding right?

I've given up on e-mailing google about blogspot pages, or anything 
else. They could care less.





Re: Help with understanding a rule

2006-12-07 Thread Loren Wilton

Yes, you are probably right. But: there must be a reason why the
rule no_real_name exists?


Yes.  It successfully HELPS to detect spam.  It is not, on its own, a good 
method to detect spam.  That is why it normally has a low score.




And if there is a rule (written or not)
that From: headers should contain a real name, I want to follow it.


There is no requirement that I know of in any RFC that a to address 
contain a comment containing the recipient's real address.  There ARE 
specifications on how to include the real name if someone chooses to do it.


While there is no requirement in any RFC that this be done, MOST mail 
clients will install a real name from the local address book when sending 
mail to a recipient.  At one time at least, there was a much greater chance 
that this would happen on ham than on spam.  Whether that is still true I 
don't know.


SA rules are not intended to enforce RFC compliance.  They are not limited 
to checking for deviations from what an RFC says.  They are not limited to 
only testing for those things required by some RFC.  SA rules are desinged 
to detect spam.  They do this by looking for common patterns in spam (and 
sometimes in ham) and attempting to separate the two.  Spammers are not 
required to violate RFCs, although they often do.  Normal users do not 
always comply with RFCs, though they usually do.  Thus, checking for RFC 
compliance is not necessarily a good way to separate ham and spam.  Looking 
for common patterns that show up IS a good way.


   Loren



Trying to catch spoofed ToCc

2006-12-07 Thread Jason Oriente

 In my mail setup, it is gospel that (ignoring BCC and mailing lists)
 the full email address in the Delivered-To will match an email address
 in the ToCc.  
 Example below.
 
 Return-Path: [EMAIL PROTECTED]
 Delivered-To: [EMAIL PROTECTED]
 Received: from mx01.domain.ext (unknown [172.16.0.149])
 by localdelivery01 (Postfix) with ESMTP id EB9CA921E8C57
 for [EMAIL PROTECTED]; Mon, 27 Nov 2006 19:36:46 -0500 (EST)
 From: [EMAIL PROTECTED]
 To: Jason [EMAIL PROTECTED]
 Cc: Jason [EMAIL PROTECTED]
 Subject: Testing
 
 I have created a matching rule to statically qualify the validity of a
 domain (below).
 #-
 ---
 header  __HEAD_01_01   Delivered-To =~  /[EMAIL PROTECTED]/i
 header  __HEAD_01_02   ToCc !~  /[EMAIL PROTECTED]/i
 #-
 ---
 metaHEAD_01(__HEAD_01_01  __HEAD_01_02)
 score   HEAD_015.0
 #-
 ---
 
 I host hundreds of domains, so I cannot create static rules for each.
 My goal is to have a rule, much like the one above, but will qualify
 the entire email address from the Delivered-To to the ToCc.  No match
 equals a score.
 
 Any insight would be much appreciated.
 
 
 Thank you,
 Jason
 


Re: Spamassassin doesn't ding sender for saying HELO i-am-you

2006-12-07 Thread Loren Wilton
Having it set up automagically is a great idea.  But it is worth considering 
as a config option IMO.  After all, it is already necessary in many cases to 
config trusted_networks and internal_networks.  So it isn't like SA will 
always run optimally without some local user input.


I'd simply suggest a config option or two that would contain the helo string 
and possibly ip address.  If they aren't configured, the rule will never 
fire.  If they are configured, then it would do some good.


   Loren



Re: Google open relay?

2006-12-07 Thread David B Funk
On Thu, 7 Dec 2006, Steven Stern wrote:

 John D. Hardin wrote:
  On Thu, 7 Dec 2006, Steven Stern wrote:
 
  I've been getting lots of these get out of debt messages. It
  looks like the last stop before getting here is a gmail server.
  Could they have an open relay?
 
  Have you notified [EMAIL PROTECTED]?
 
 You betcha!  And also reported through spamcop.

Ony problem with reporting it thru spamcop is that they will very
industriously drill down thru the Received: chain, breeze right
thru all the Google entries, latch onto that shawcable.net IP
and only send a report to them (IE not bother Google at all).

This is a good thing in that they try very hard to not cause collateral
damage and only send reports to the real culprits, but the down-side
is that potential 'enablers' don't get notified too.

If you buy into the spamcop premium service one of the things that
you gain is the ability to modify their report and add such notices.
Best to send it directly to Google's abuse address.

Dave

-- 
Dave Funk  University of Iowa
dbfunk (at) engineering.uiowa.eduCollege of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include std_disclaimer.h
Better is not better, 'standard' is better. B{


Re: forwarding email

2006-12-07 Thread aubreyL

Jonas Eckerman wrote:

This really would be more on topic on the MIMEDefang list, but here goes...

You have a small but significant typo in your code:

  

if ($hits = req) {



You forgot the $ in $req.

The effect of the above comparison is that all mail that scores above 0 (zero) 
are considered spam.

Regards
/Jonas
  
omg  .how embarrassing.  I'll go through my spamdrop now, and must 
be left alone for hours.  Thanks Jonas.


-=Aubrey=-


Re: Trying to catch spoofed ToCc

2006-12-07 Thread Loren Wilton
Trying to catch spoofed ToCcNasty to do without using a plugin or eval rule, 
but it can be done.
The following is off the top of my head, and I almost guarantee it won't work 
correctly without testing and some minor tweak somewhere.  But you can try it 
and/or fool with it if you like.

header __SENT_TO_MEALL ~= 
/\n(?i:Delivered-To):\s+([^\n]+)\n.{0,300}\n(?i:To|Cc):[^\n]+\b\1\b/
meta NOT_SENT_TO_ME!__SENT_TO_ME

You can give that a try, but I warn you you may have to fiddle with it for half 
an hour to get it to work right.  Or maybe it will work now.

Loren

  - Original Message - 
  From: Jason Oriente 
  To: users@spamassassin.apache.org 
  Sent: Thursday, December 07, 2006 3:04 PM
  Subject: Trying to catch spoofed ToCc




  In my mail setup, it is gospel that (ignoring BCC and mailing lists) the full 
email address in the Delivered-To will match an email address in the ToCc.  

  Example below. 

  Return-Path: [EMAIL PROTECTED] 
  Delivered-To: [EMAIL PROTECTED] 
  Received: from mx01.domain.ext (unknown [172.16.0.149]) 
  by localdelivery01 (Postfix) with ESMTP id EB9CA921E8C57 
  for [EMAIL PROTECTED]; Mon, 27 Nov 2006 19:36:46 -0500 (EST) 
  From: [EMAIL PROTECTED] 
  To: Jason [EMAIL PROTECTED] 
  Cc: Jason [EMAIL PROTECTED] 
  Subject: Testing 

  I have created a matching rule to statically qualify the validity of a domain 
(below). 
  
#
 
  header  __HEAD_01_01   Delivered-To =~  /[EMAIL PROTECTED]/i 
  header  __HEAD_01_02   ToCc !~  /[EMAIL PROTECTED]/i 
  
#
 
  metaHEAD_01(__HEAD_01_01  __HEAD_01_02) 
  score   HEAD_015.0 
  
#
 

  I host hundreds of domains, so I cannot create static rules for each.  My 
goal is to have a rule, much like the one above, but will qualify the entire 
email address from the Delivered-To to the ToCc.  No match equals a score.

  Any insight would be much appreciated. 



  Thank you, 
  Jason 


Re: Botnet 0.6 plugin for Spam Assassin availabile

2006-12-07 Thread Michael Schaap

John Rudd wrote:


The next version of the Botnet plugin for Spam Assassin is ready.  The 
install instructions are in the Botnet.txt file, and in the INSTALL file.




Great work!



To Do before 1.0:

(...)



There's another thing that would be really nice to have.  You know how 
the DNS rules' descriptions specify what actually matches?  e.g.:


 3.9 RCVD_IN_XBLRBL: Received via a relay in Spamhaus XBL
[12.34.56.789 listed in sbl-xbl.spamhaus.org]
 1.6 URIBL_SBL  Contains an URL listed in the SBL blocklist
[URIs: example.com]

It would be great if Botnet could do something similar, like:

 2.0 BOTNET The submitting mail server looks like part 
of a Botnet

[ip=12.34.56.789 rdns=dhcp12.34.example.org]


Regards,

 - Michael


Re: Trying to catch spoofed ToCc

2006-12-07 Thread Mike Pepe

Loren Wilton wrote:

Nasty to do without using a plugin or eval rule, but it can be done.
The following is off the top of my head, and I almost guarantee it won't 
work correctly without testing and some minor tweak somewhere.  But you 
can try it and/or fool with it if you like.
 
header __SENT_TO_MEALL ~= 
/\n(?i:Delivered-To):\s+([^\n]+)\n.{0,300}\n(?i:To|Cc):[^\n]+\b\1\b/

meta NOT_SENT_TO_ME!__SENT_TO_ME
 
You can give that a try, but I warn you you may have to fiddle with it 
for half an hour to get it to work right.  Or maybe it will work now.
 
Loren


That looks pretty good, but I think that sort of user-specific action 
might be best done in the user's procmail file-


(Well, assuming of course that that the user is using procmail!)

but something like

# if it's not to or cc me at this point, it's probably spam

:0
* !^(To|Cc).*{my email address}
possibly-spam

Towards the very end of the procmail script does the trick.

-Mike


Re: Score=x+5

2006-12-07 Thread Mark Martinec
On Thursday December 7 2006 18:21, Fred T wrote:
  -0.0 P0F_UNIX   OS fingerprint BSD/Solaris/HP-UX/Tru64
 I'm curious about P0F_UNIX could you share this rule with me?  And any
 similar fingerprint rules?  Thanks!

The rules are quite straightforward (see below) - just matching
on inserted header field, which can be inserted by amavisd-new
(or some other sw component like milter or policy daemon or SA plugin),
based of results from p0f ( http://lcamtuf.coredump.cx/p0f.shtml ).

See release notes, p0f support was introduced with version 2.4.0:
  http://www.ijs.si/software/amavisd/release-notes.txt


Here is my current set:

header L_P0F_WXP   X-Amavis-OS-Fingerprint =~ /^Windows XP(?![^(]*\b2000 SP)/
score  L_P0F_WXP   3.0
header L_P0F_W X-Amavis-OS-Fingerprint =~ /^Windows(?! XP)/
score  L_P0F_W 1.7
header L_P0F_UNKN  X-Amavis-OS-Fingerprint =~ /^UNKNOWN/
score  L_P0F_UNKN  0.8
header L_P0F_Unix  X-Amavis-OS-Fingerprint =~ 
/^((Free|Open|Net)BSD|Solaris|HP-UX|Tru64)/
score  L_P0F_Unix  -1.0
header L_P0F_Linux X-Amavis-OS-Fingerprint =~ /^Linux/
score  L_P0F_Linux -0.1

plus a couple to slightly favour network proximity,
which works well in my environment, but may not work
so well elsewhare:

header L_P0F_D1234 X-Amavis-OS-Fingerprint =~ /\bdistance [1-4](?![0-9])/
header L_P0F_D5X-Amavis-OS-Fingerprint =~ /\bdistance 5(?![0-9])/
header L_P0F_D6X-Amavis-OS-Fingerprint =~ /\bdistance 6(?![0-9])/
header L_P0F_D7X-Amavis-OS-Fingerprint =~ /\bdistance 7(?![0-9])/
header L_P0F_D8X-Amavis-OS-Fingerprint =~ /\bdistance 8(?![0-9])/
header L_P0F_D9X-Amavis-OS-Fingerprint =~ /\bdistance 9(?![0-9])/
header L_P0F_D10   X-Amavis-OS-Fingerprint =~ /\bdistance 10(?![0-9])/
header L_P0F_D11   X-Amavis-OS-Fingerprint =~ /\bdistance 11(?![0-9])/
score  L_P0F_D1234 -0.5
score  L_P0F_D5-0.5
score  L_P0F_D6-0.5
score  L_P0F_D7-0.5
score  L_P0F_D8-0.5
score  L_P0F_D9-0.5
score  L_P0F_D10   -0.3
score  L_P0F_D11   -0.3

  Mark


Re: Google open relay?

2006-12-07 Thread Steven Stern
David B Funk wrote:
 On Thu, 7 Dec 2006, Steven Stern wrote:
 
 John D. Hardin wrote:
 On Thu, 7 Dec 2006, Steven Stern wrote:

 I've been getting lots of these get out of debt messages. It
 looks like the last stop before getting here is a gmail server.
 Could they have an open relay?
 Have you notified [EMAIL PROTECTED]?

 You betcha!  And also reported through spamcop.
 
 Ony problem with reporting it thru spamcop is that they will very
 industriously drill down thru the Received: chain, breeze right
 thru all the Google entries, latch onto that shawcable.net IP
 and only send a report to them (IE not bother Google at all).
 
 This is a good thing in that they try very hard to not cause collateral
 damage and only send reports to the real culprits, but the down-side
 is that potential 'enablers' don't get notified too.
 
 If you buy into the spamcop premium service one of the things that
 you gain is the ability to modify their report and add such notices.
 Best to send it directly to Google's abuse address.
 
 Dave
 

Spamcop sent a report to both shawcable and [EMAIL PROTECTED]  I paid
spamcop $25 several years ago for 25MB of reports (however that's
measured) and I still have 8.3MB left in my pool.

-- 

  Steve


Re: Botnet 0.6 plugin for Spam Assassin availabile

2006-12-07 Thread John Rudd

Michael Schaap wrote:

John Rudd wrote:


The next version of the Botnet plugin for Spam Assassin is ready.  The 
install instructions are in the Botnet.txt file, and in the INSTALL file.




Great work!



To Do before 1.0:

(...)



There's another thing that would be really nice to have.  You know how 
the DNS rules' descriptions specify what actually matches?  e.g.:


 3.9 RCVD_IN_XBLRBL: Received via a relay in Spamhaus XBL
[12.34.56.789 listed in sbl-xbl.spamhaus.org]
 1.6 URIBL_SBL  Contains an URL listed in the SBL blocklist
[URIs: example.com]

It would be great if Botnet could do something similar, like:

 2.0 BOTNET The submitting mail server looks like part 
of a Botnet

[ip=12.34.56.789 rdns=dhcp12.34.example.org]



Any tips on how to do that? :-}


RE: blacklist messagID ?

2006-12-07 Thread Jean-Paul Natola




On Thu, 7 Dec 2006, Jean-Paul Natola wrote:

  Apparently a remote server is having issues-
  It keeps sending this message here-
 
  [EMAIL PROTECTED]
 
  Can I blacklist a message without blacklisting the sender?

 Sure. Write a rule for that message-ID header and give it a score of
 1000 or so (adding insult to injury).

 I'm not exactly well versed, scratch that , I DO NOT KNOW how to write
rules
 :(

 Any help please?

header TMP_MSGID_01 Message-ID =~
 /[EMAIL PROTECTED]/
score  TMP_MSGID_01 1000

Put that in your /etc/mail/spamassassin/local.cf and restart the
spamassassin daemon.



Is there a way to discard the message? since he  is one our employees,  the
bounce message generated by exim  will go back to him (our server) - so he
(the sending user ) will wind up with the bounce message every hour wouldnt
he?-

 

 

 



Re: Botnet 0.6 plugin for Spam Assassin availabile

2006-12-07 Thread Michael Schaap

John Rudd wrote:


It would be great if Botnet could do something similar, like:

 2.0 BOTNET The submitting mail server looks like part 
of a Botnet

[ip=12.34.56.789 rdns=dhcp12.34.example.org]



Any tips on how to do that? :-}



Well, I had a look, and the good news: it's rather simple to add such a 
line: just use something like:


$pms-test_log(ip=$ip, rdns=$rdns);

The bad news, of course, is that BOTNET is a meta rule, so you can't do 
this for that rule.  You can still do so for the individual rules, but 
as those are going away, that won't help much...


 - Michael


Re: spam

2006-12-07 Thread Chris
On Tuesday 05 December 2006 3:31 pm, Rosenbaum, Larry M. wrote:
 Has anybody come up with a rule for these yet?  I tried the following:

 body ORNL_B0RKEN1 /^\d{3,5}\n{1,3}$/s
 describe ORNL_B0RKEN1 B0rken spamware, message just contains a short
 number
 scoreORNL_B0RKEN1 1

I believe I've posted before that these type spams are picked up quite well on 
my home box with these rules:

Content analysis details:   (13.6 points, 5.0 required)

 pts rule name              description
 -- --
 2.6 HELO_DYNAMIC_DIALIN    Relay HELO'd using suspicious hostname
                            (T-Dialin)
 0.0 BOTNET_CLIENTWORDS     Hostname contains client-like substrings
 0.0 BOTNET_IPINHOSTNAME    Hostname contains its own IP address
 5.0 BAYES_99               BODY: Bayesian spam probability is 99 to 100%
                            [score: 1.]
 0.0 BOTNET_CLIENT          Hostname looks like a client hostname
 5.0 BOTNET                 Any Botnet rule hit
 1.0 SAGREY                 Adds 1.0 to spam from first-time senders

Content analysis details:   (15.2 points, 5.0 required)

 pts rule name              description
 -- --
 4.2 HELO_DYNAMIC_IPADDR    Relay HELO'd using suspicious hostname (IP addr
                            1)
 0.0 BOTNET_IPINHOSTNAME    Hostname contains its own IP address
 5.0 BAYES_99               BODY: Bayesian spam probability is 99 to 100%
                            [score: 0.9955]
 0.0 BOTNET_CLIENT          Hostname looks like a client hostname
 5.0 BOTNET                 Any Botnet rule hit
 1.0 SAGREY                 Adds 1.0 to spam from first-time senders

Content analysis details:   (12.8 points, 5.0 required)

 pts rule name              description
 -- --
 2.6 HELO_DYNAMIC_DIALIN    Relay HELO'd using suspicious hostname
                            (T-Dialin)
 0.0 BOTNET_CLIENTWORDS     Hostname contains client-like substrings
 0.0 BOTNET_IPINHOSTNAME    Hostname contains its own IP address
 4.2 BAYES_95               BODY: Bayesian spam probability is 95 to 99%
                            [score: 0.9865]
 0.0 BOTNET_CLIENT          Hostname looks like a client hostname
 5.0 BOTNET                 Any Botnet rule hit
 1.0 SAGREY                 Adds 1.0 to spam from first-time senders

These are from earlier this month, looks like the Botnet plug-in and a good 
bayes database are your best bet.

-- 
Chris


pgpPZafdzdlRT.pgp
Description: PGP signature


Re: Botnet 0.6 plugin for Spam Assassin availabile

2006-12-07 Thread John Rudd

Michael Schaap wrote:

John Rudd wrote:


It would be great if Botnet could do something similar, like:

 2.0 BOTNET The submitting mail server looks like 
part of a Botnet

[ip=12.34.56.789 rdns=dhcp12.34.example.org]



Any tips on how to do that? :-}



Well, I had a look, and the good news: it's rather simple to add such a 
line: just use something like:


$pms-test_log(ip=$ip, rdns=$rdns);

The bad news, of course, is that BOTNET is a meta rule, so you can't do 
this for that rule.  You can still do so for the individual rules, but 
as those are going away, that won't help much...





Hm.  They're not going away, as much as they're not going to show up in 
the test list anymore.  But that might be, for this purpose, the same 
thing.  I'll see how I might be able to handle that.


(ideally, a Meta rule would take the test logs for its non-visible 
sub-rules, and display them with itself)



If I can't make anything reasonable happen there, then maybe I'll have 
to choose one of:


1) keep the rules around as visible rules
2) go back to the original style I had of one rule that has config 
options for turning the different tests on/off.  Then it would state in 
its log what the IP address was, what RDNS it found, and which rules 
were triggered.
3) some hybrid: BOTNET becomes a rule like #2, but the individual rules 
stick around ... just with a score of 0.  Then you can pick between 
calling one big rule, or disabling the big rule and only calling the 
piece-meal rules.






  1   2   >