Re: sa 32x-branch 'make test' fails @ t/spamc_optL.t (among others ...) on freebsd

2007-12-31 Thread Justin Mason
first of all, try setting the env var SPAMD_HOST to the IP address the jail can
use for localhost.  if that doesn't work open a bug -- but bear in mind that it
will probably only get attention from other jail users if the
local security policy
inhibits use of localhost, the typical answer would be well, fix the security
policy then!

--j.

On Dec 31, 2007 12:13 AM, snowcrash+sa [EMAIL PROTECTED] wrote:
 noting that

 (a) these errors have appeared before
 (b) you've some suspicion that it may be related to issue w/ solaris zones
 (c) y'all are goin' great-guns on -devel wrapping up bugs for 324

 should i open a bug on this? or is it something that'll get some
 attention anyway?

 thanks!




Re: SA 32x build not finding openssl headers on FreeBSD?

2007-12-31 Thread Justin Mason
some suggestions:

   cd /usr/local/build/spamassassin
   perl Makefile.PL \
PREFIX=/usr/local \
DATADIR=/usr/local/etc/SA/Dist \
CONFDIR=/usr/local/etc/SA/Local \
LOCALSTATEDIR=/usr/local/etc/SA/Updates \
ENABLE_SSL=yes

so far so good...

   cd /usr/local/build/spamassassin/spamc
   perl version.h.pl
   ./configure --enable-ssl
   cd ../

those should not be necessary.  Makefile.PL will call the spamc
configure script with the appropriate
args (including a few you're missing)...

--j.

   make
   make install

 kind of odd that the CFLAGS spec is req'd ... don't know whether
 that's expected behavior /or something that can/should be
 accommodated in the port.

 cheers!




Re: SA 32x build not finding openssl headers on FreeBSD?

2007-12-31 Thread snowcrash+sa
cd /usr/local/build/spamassassin/spamc
perl version.h.pl
./configure --enable-ssl
cd ../

 those should not be necessary.  Makefile.PL will call the spamc
 configure script with the appropriate
 args (including a few you're missing)...

admittedly, those are fairly-old-problem holdovers ... and i stand corrected.

with 'just',

 setenv LDFLAGS   -L/usr/local/lib
 setenv CPPFLAGS  -I/usr/local/include
 setenv CFLAGS$CPPFLAGS

 perl Makefile.PL \
  PREFIX=/usr/local \
  DATADIR=/usr/local/etc/SA/Dist \
  CONFDIR=/usr/local/etc/SA/Local \
  LOCALSTATEDIR=/usr/local/etc/SA/Updates \
  ENABLE_SSL=yes
 make install

i get,

  ls -al /usr/local/bin/spamc
-r-xr-xr-x  1 root  wheel  54578 Dec 31 07:03 /usr/local/bin/spamc*

  ldd /usr/local/bin/spamc
/usr/local/bin/spamc:
libssl.so.5 = /usr/local/lib/libssl.so.5 (0x80063b000)
libcrypto.so.5 = /usr/local/lib/libcrypto.so.5 (0x800784000)
libz.so.3 = /lib/libz.so.3 (0x800a1a000)
libc.so.6 = /lib/libc.so.6 (0x800b2e000)

i.e., for now, for me, just the CFLAGS == CPPFLAGS is req'd.

thanks.


Re: sa 32x-branch 'make test' fails @ t/spamc_optL.t (among others ...) on freebsd

2007-12-31 Thread snowcrash+sa
hi justin,

 first of all, try setting the env var SPAMD_HOST to the IP address the jail 
 can
 use for localhost.

ok.

tried that.  didn't help :-/

although, take a look at the test details @
http://issues.apache.org/SpamAssassin/attachment.cgi?id=4222action=edit

despite setting SPAMD_HOST, there's still a lot of 127.0.0.1 refs ...
and none to the IP I set.  the ENV var isn't picking up -- did i bork
that as well?

 if that doesn't work open a bug

done.  http://issues.apache.org/SpamAssassin/show_bug.cgi?id=5761

 but bear in mind that it will probably only get attention from other jail
 users

heh. understood. and, expected.

alas, i know it's wasted breath to argue that the prevalence of SA-(
everything else, for that matter)-in-jails/VMs is only going to
increase, and that this will not be an atypical use-case ... but, for
now, NIH-syndrome, i s'pose ;-)

thanks!

cheers.


Re: sa 32x-branch 'make test' fails @ t/spamc_optL.t (among others ...) on freebsd

2007-12-31 Thread Michael Parker


On Dec 31, 2007, at 10:23 AM, snowcrash+sa wrote:



but bear in mind that it will probably only get attention from  
other jail

users


heh. understood. and, expected.

alas, i know it's wasted breath to argue that the prevalence of SA-(
everything else, for that matter)-in-jails/VMs is only going to
increase, and that this will not be an atypical use-case ... but, for
now, NIH-syndrome, i s'pose ;-)



Not wasted breath as long as you'll accept:

Patches Welcome!

as a response :)

Michael


Re: sa 32x-branch 'make test' fails @ t/spamc_optL.t (among others ...) on freebsd

2007-12-31 Thread snowcrash+sa
 Not wasted breath as long as you'll accept:

 Patches Welcome!

 as a response :)

heh!  you have that reponse on auto dial, doncha?  come on, now --
fess up ;-) (p.s., i wasn't referring to those -- such as yourself --
already *on* the 'right' side of the argument)

yes. patches.  once a problem is understood as actually *being* a
problem. or just plain understood. which, in this case, it isn't.
works on OSX, doesn't on FreeBSD/JAIL.  no clue -- yet -- as to why.

and, might i suggest, soliciting  accepting such patches from a
first-timer (namely, atm, 'me'), is a questionable venture ... but
i'll happily 'spew-n-share' if/when/how i do!

cheers.


DDOS, Dictionary Attack... not sure what it is...

2007-12-31 Thread Mike Cisar
Hi All,

A bit off topic since the users are all unknown so the traffic never makes
it to my spamassassin.  But I am hoping that someone here may have seen the
same thing and have a solution for making the problem go-away :-)

I'm not sure whether it's supposed to be a DDOS attack, a dictionary attack,
bunch-o-bots or what.  Since about the 26th of Dec I've had one particular
mailserver that has been dealing with a constant stream of crap... all
emails to unknown users, all of the email addresses seem consistent (either
3 'syllables'... an uppercased 'syllable', a lowercased 'syllable' and
another uppercased 'syllable'... or 2 uppercased 'syllables').  They don't
seem to be coming from any consistent IP address (or region).  Problem is of
course that the mailserver's connections get tied up processing rejecting
this crap (and of course it's chewing up my transfer allocation bit by tiny
bit).

The addresses are similar to these...

IgnaciogalvestonBriggs@
DallasexhibitionAlvarado@
ReginaldFleming@

Even tried yanking the IP address off of the server over the holidays in the
hope that whatever it was would just give up.  No such luck, within a minute
of reactivating the IP to the server this morning the traffic was back to
full flow.

Cheers,
 Mike 












Re: sa 32x-branch 'make test' fails @ t/spamc_optL.t (among others ...) on freebsd

2007-12-31 Thread Justin Mason
On Dec 31, 2007 5:37 PM, snowcrash+sa [EMAIL PROTECTED] wrote:
  Not wasted breath as long as you'll accept:
 
  Patches Welcome!
 
  as a response :)

 heh!  you have that reponse on auto dial, doncha?  come on, now --
 fess up ;-) (p.s., i wasn't referring to those -- such as yourself --
 already *on* the 'right' side of the argument)

 yes. patches.  once a problem is understood as actually *being* a
 problem. or just plain understood. which, in this case, it isn't.
 works on OSX, doesn't on FreeBSD/JAIL.  no clue -- yet -- as to why.

 and, might i suggest, soliciting  accepting such patches from a
 first-timer (namely, atm, 'me'), is a questionable venture ... but
 i'll happily 'spew-n-share' if/when/how i do!

I should point out -- half of the attention from jail users comment has
to do with another issue -- only people with jails can effectively test
any potential fix.  That poses a big problem for developers testing.

--j.


Re: DDOS, Dictionary Attack... not sure what it is...

2007-12-31 Thread Bookworm

Mike Cisar wrote:

Hi All,

A bit off topic since the users are all unknown so the traffic never makes
it to my spamassassin.  But I am hoping that someone here may have seen the
same thing and have a solution for making the problem go-away :-)

I'm not sure whether it's supposed to be a DDOS attack, a dictionary attack,
bunch-o-bots or what.  Since about the 26th of Dec I've had one particular
mailserver that has been dealing with a constant stream of crap... all
emails to unknown users, all of the email addresses seem consistent (either
3 'syllables'... an uppercased 'syllable', a lowercased 'syllable' and
another uppercased 'syllable'... or 2 uppercased 'syllables').  They don't
seem to be coming from any consistent IP address (or region).  Problem is of
course that the mailserver's connections get tied up processing rejecting
this crap (and of course it's chewing up my transfer allocation bit by tiny
bit).

The addresses are similar to these...

IgnaciogalvestonBriggs@
DallasexhibitionAlvarado@
ReginaldFleming@

Even tried yanking the IP address off of the server over the holidays in the
hope that whatever it was would just give up.  No such luck, within a minute
of reactivating the IP to the server this morning the traffic was back to
full flow.
  
I don't know that it will really help, but I know that on the qmail 
servers that I've been building, John Simpson wrote a patch that looks 
for that.  It's called validrcptto.   It looks for users existing on the 
system before accepting any emails (using a cdb file format), and 
rejects those instantly that don't exist.For situations like yours, 
it has a 'strikes' rule that you can enable.


That is, if a specific IP address tries sending to bad users more than X 
number of times, it then blocks that IP address from connecting at all 
for a set period of time. 

Whatever your MTA might be, there may be similar functionality that you 
can build into the SMTPD process, or at least, that you can put in FRONT 
of the SMTPD process.


Good luck with it!



Re: sa 32x-branch 'make test' fails @ t/spamc_optL.t (among others ...) on freebsd

2007-12-31 Thread snowcrash+sa
 I should point out -- half of the attention from jail users comment has
 to do with another issue -- only people with jails can effectively test
 any potential fix.  That poses a big problem for developers testing.

i think syndey's seeing it in/on non-jail osx, as well  cref: the bug.

cheers.


Re: DDOS, Dictionary Attack... not sure what it is...

2007-12-31 Thread John D. Hardin
On Mon, 31 Dec 2007, Mike Cisar wrote:

 Even tried yanking the IP address off of the server over the
 holidays in the hope that whatever it was would just give up.  No
 such luck, within a minute of reactivating the IP to the server
 this morning the traffic was back to full flow.

Tarpit 'em.

http://sourceforge.net/projects/labrea

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  Users mistake widespread adoption of Microsoft Office as the
  development of a standard document format.
---
 145 days until the Mars Phoenix lander arrives at Mars



RE: DDOS, Dictionary Attack... not sure what it is...

2007-12-31 Thread Mike Cisar
  I'm not sure whether it's supposed to be a DDOS attack, a dictionary
 attack,
  bunch-o-bots or what.  Since about the 26th of Dec I've had one
 particular
  mailserver that has been dealing with a constant stream of crap...

 That is, if a specific IP address tries sending to bad users more than
 X
 number of times, it then blocks that IP address from connecting at all
 for a set period of time.

That was my first thought, unfortunately I don't seem to get any more than 1
or 2 attempts from any given IP address (probably due to my server dropping
the connection based on some existing configuration I have in place).  But
the same will then happen from another IP, in a different part of the world,
addressed to a different but similar non-existing address... and so on, and
so on.  I haven't counted, but based on the flow, I'd estimate I've seen
about 1000 distinct IP's... that is what leads me to believe it's some sort
of distributed attack.  There are some repeat recipients, from different
IP's at different times.  Like a whole bunch of little zombies all working
off of the same list.

Cheers,
 Mike 



Re: DDOS, Dictionary Attack... not sure what it is...

2007-12-31 Thread Joseph Brennan


Mike Cisar [EMAIL PROTECTED] wrote:


They don't seem to be coming from any
consistent IP address (or region).  Problem is of course that the
mailserver's connections get tied up processing rejecting this crap (and
of course it's chewing up my transfer allocation bit by tiny bit).

The addresses are similar to these...

IgnaciogalvestonBriggs@
DallasexhibitionAlvarado@
ReginaldFleming@



I see them here too (columbia.edu).  Sometimes the sender domain does
not exist, and otherwise the recipient is no good.  There are not many
that get as far as a milter, but here are some.  Looks like gambling.

Example 1: Rejected for a one-word HELO (i.e. it had no dots).  Its
subject was Single-hand blackjack..

Example 2: Sender host was in Spamhaus.  Come see what it means to be
a VIP.

Example 3: Another Spamhaus catch.  Get your bonus and walk the red
carpet to winnings and fun.

Note in passing, envelope senders =~ /[A-Z][a-z]+[A-Z][a-z]\@/  seem
to be quite rare, other than spam.  I don't know what is in the header
From: since I can't find any reported to us.

The unknown senders and recipients should be a fast rejection.  You can
stop at MAIL or RCPT.  You can't get better than that unless you can
reject by sender IP, which is not practical with a botnet.


Joseph Brennan
Columbia University Information Technology



RE: DDOS, Dictionary Attack... not sure what it is...

2007-12-31 Thread Joseph Brennan



--On Monday, December 31, 2007 4:00 PM -0700 Mike Cisar 
[EMAIL PROTECTED] wrote:



I haven't counted, but based on the flow, I'd estimate I've seen
about 1000 distinct IP's... that is what leads me to believe it's some
sort of distributed attack.  There are some repeat recipients, from
different IP's at different times.  Like a whole bunch of little zombies
all working off of the same list.



That's what a spam botnet looks like.  There are usually a few hundred
thousand hosts working the same list.  If you have not seen this many
times before, lucky you.

Joseph Brennan
Columbia University Information Technology





Re: DDOS, Dictionary Attack... not sure what it is...

2007-12-31 Thread mouss
John D. Hardin wrote:
 On Mon, 31 Dec 2007, Mike Cisar wrote:

   
 Even tried yanking the IP address off of the server over the
 holidays in the hope that whatever it was would just give up.  No
 such luck, within a minute of reactivating the IP to the server
 this morning the traffic was back to full flow.
 

 Tarpit 'em.

 http://sourceforge.net/projects/labrea
   

Tarpitting may not be the right answer, because they have a lot more
resources than us (greetpause seems to work, if you use an asynchronous
server or proxy, i.e. one which can do other things while sleeping).

you can reduce the load by having your server drop the connection when
it rejects the mail, using 421 code.
depending on the server, it may be possible to do this at connection
time using zen.spamhaus.org (which lists many zombies).

It may also be good to reduce the timeout when the server is under attack.






Re: DDOS, Dictionary Attack... not sure what it is...

2007-12-31 Thread Matthias Schmidt
Happy New Year everyone :-)

Am/On Tue, 1 Jan 2008 04:20:42 +0100 schrieb/wrote mouss:

John D. Hardin wrote:
 On Mon, 31 Dec 2007, Mike Cisar wrote:


 Even tried yanking the IP address off of the server over the
 holidays in the hope that whatever it was would just give up.  No
 such luck, within a minute of reactivating the IP to the server
 this morning the traffic was back to full flow.


 Tarpit 'em.

 http://sourceforge.net/projects/labrea


Tarpitting may not be the right answer, because they have a lot more
resources than us (greetpause seems to work, if you use an asynchronous
server or proxy, i.e. one which can do other things while sleeping).

you can reduce the load by having your server drop the connection when
it rejects the mail, using 421 code.
depending on the server, it may be possible to do this at connection
time using zen.spamhaus.org (which lists many zombies).

It may also be good to reduce the timeout when the server is under attack.

but could this not also cause loosing legitimate email?

my server was also under attack 2 or 3 month ago.
I tried the same thing as the op (listing ips in the fw etc), but these
things didn't help at all.

Most of the mails (90%) were already dropped, because the ip didn't
resolve (cannot find your hostname), the next 9.9% were caught by
blacklists and only a very little number was rejected, because of
unknown user name.
One possibility might be to do the ip-check already through a hardware-
firewall.

But one actually can't do anything against the traffic coming to one's
indoor.

best wishes to everybody (not to the spamsenders of course ;-) for 2008

Matthias