Difference in spam score for seperate email machines with same version of Spamassassin

2010-11-28 Thread Sharma, Ashish
Hi,

I have two machines that contain spamassassin.

On first machine(this is an old installation, 2-3 months old ), I had installed 
Spamassassin(3.3.1) from rpmforge repository by using yum (followed 
http://wiki.centos.org/HowTos/Amavisd) , while on the second I had manually 
installed Spamassassin(3.3.1, 1 week old installation) by using spamassassin 
rpm.

Following are the spam headers of a same email that I send to both servers and 
I am getting different spam scores,
I want to know why?

First machine:(Spamassassin 3.3.1, old installation, 2-3 months old )

X-Spam-Status: No, score=5.269 tag=-999 tag2=6.9 kill=6.9 tests=[BAYES_50=0.8,
 DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,
 FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5,
 RAZOR2_CF_RANGE_E8_51_100=1.886, RAZOR2_CHECK=0.922,
 RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001,
 T_TO_NO_BRKTS_FREEMAIL=0.01, URIBL_JP_SURBL=1.25] autolearn=no

Second Machine:(Spamassassin 3.3.1, new installation, 1 week old )

X-Spam-Status: No, score=1.859 tag=-999 tag2=6.9 kill=6.9
 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,
 FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001,
 SPF_PASS=-0.001, T_TO_NO_BRKTS_FREEMAIL=0.01, URIBL_JP_SURBL=1.948]
 autolearn=no


As can be seen BAYES and RAZOR2 rules are not getting hit in new installation, 
but logs show the modules are getting loaded fine. 

Can anybody give me some idea of this kind of behavior?

Thanks in advance
Ashish Sharma


Re: Difference in spam score for seperate email machines with same version of Spamassassin

2010-11-28 Thread Benny Pedersen

On søn 28 nov 2010 12:22:55 CET, Sharma, Ashish wrote

Can anybody give me some idea of this kind of behavior?


its well dokumented that bayes needs training, if no training is done  
it takes time to autolearn it, ask same question in 90 days and  
problem might at that time be gone :)


if bayes at that time does not work lets take it from there

options to consider from your server is, do i need manuel training ?

spam evolves much in 90 days time, so unless you have 180 days of good  
coorpus to train from it will be pointless to help bayes do the right  
thing


--
xpoint http://www.unicom.com/pw/reply-to-harmful.html



RE: Difference in spam score for seperate email machines with same version of Spamassassin

2010-11-28 Thread Sharma, Ashish
Benny,

Thanks for the reply.

But what about the Razor2 rules not getting hit? Any suggestions on that?

Thanks
Ashish Sharma

-Original Message-
From: Benny Pedersen [mailto:m...@junc.org] 
Sent: Sunday, November 28, 2010 5:14 PM
To: users@spamassassin.apache.org
Subject: Re: Difference in spam score for seperate email machines with same 
version of Spamassassin

On søn 28 nov 2010 12:22:55 CET, Sharma, Ashish wrote
 Can anybody give me some idea of this kind of behavior?

its well dokumented that bayes needs training, if no training is done  
it takes time to autolearn it, ask same question in 90 days and  
problem might at that time be gone :)

if bayes at that time does not work lets take it from there

options to consider from your server is, do i need manuel training ?

spam evolves much in 90 days time, so unless you have 180 days of good  
coorpus to train from it will be pointless to help bayes do the right  
thing

-- 
xpoint http://www.unicom.com/pw/reply-to-harmful.html



RE: Difference in spam score for seperate email machines with same version of Spamassassin

2010-11-28 Thread Benny Pedersen

On søn 28 nov 2010 17:10:03 CET, Sharma, Ashish wrote


But what about the Razor2 rules not getting hit? Any suggestions on that?


no more then setup account so reporing works

--
xpoint http://www.unicom.com/pw/reply-to-harmful.html



RE: Difference in spam score for seperate email machines with same version of Spamassassin

2010-11-28 Thread Sharma, Ashish
Benny,

I am unable to understand, can you please explain what you just mentioned.

Maybe I am a newbie that's why I could not understand what you said.

Thanks
Ashish Sharma

-Original Message-
From: Benny Pedersen [mailto:m...@junc.org] 
Sent: Sunday, November 28, 2010 10:28 PM
To: users@spamassassin.apache.org
Subject: RE: Difference in spam score for seperate email machines with same 
version of Spamassassin

On søn 28 nov 2010 17:10:03 CET, Sharma, Ashish wrote

 But what about the Razor2 rules not getting hit? Any suggestions on that?

no more then setup account so reporing works

-- 
xpoint http://www.unicom.com/pw/reply-to-harmful.html



RE: Difference in spam score for seperate email machines with same version of Spamassassin

2010-11-28 Thread Benny Pedersen

On søn 28 nov 2010 18:02:36 CET, Sharma, Ashish wrote

Maybe I am a newbie that's why I could not understand what you said.


man razor-admin

razor-admin -discover
razor-admin -register
razor-admin -create

read more examples in man page

if unsure what to do dont do anything, its like postfix main.cf that  
are filled with default errors when postconf -d is good


makeing main.cf empty solves it for postfix

so the more one configure the more error one do :=)

--
xpoint http://www.unicom.com/pw/reply-to-harmful.html



Re: Difference in spam score for seperate email machines with same version of Spamassassin

2010-11-28 Thread Gary V
On 11/28/10, Benny Pedersen wrote:
 On søn 28 nov 2010 18:02:36 CET, Sharma, Ashish wrote
 Maybe I am a newbie that's why I could not understand what you said.

 man razor-admin

 razor-admin -discover
 razor-admin -register
 razor-admin -create

 read more examples in man page

 if unsure what to do dont do anything, its like postfix main.cf that
 are filled with default errors when postconf -d is good

 makeing main.cf empty solves it for postfix

 so the more one configure the more error one do :=)

 --

Since you are using amavisd-new and the home directory of the amavis
user is /var/amavis:

yum install perl-Razor-Agent

su amavis -c 'razor-admin -create'
su amavis -c 'razor-admin -create'
su amavis -c 'razor-admin -register'

# disable razor logging (set debuglevel = 0 in
/var/amavis/.razor/razor-agent.conf)
sed -i 's/= 3/= 0/' /var/amavis/.razor/razor-agent.conf

-- 
Gary V


Phishing Attack: An Open Letter to the Anti-Spam and Mailbox Operator Community By Matt Blumberg CEO Chairman, Return Path

2010-11-28 Thread Neil Schwartzman
I’m sure many of you are familiar with the targeted ESP phishing attack that 
has been ongoing for almost a year now and has led to multiple known ESP system 
breaches. Return Path was recently a victim of this same attack. So far, we 
have three blog posts on our client/marketer blog about this – you can read 
them here from November 24, November 25, and November 26. 

http://www.returnpath.net/blog/intheknow/2010/11/security-alert-phishing-attack-aimed-at-esps
http://www.returnpath.net/blog/intheknow/2010/11/security-alert-update-on-esp-phishing-attack
http://www.returnpath.net/blog/intheknow/2010/11/security-alert-phishing-attack-update


In short, a relatively small list of our clients’ email addresses was taken 
from us, meaning those addresses are now the targets of the phishing campaign 
that are intended to compromise those client systems.

To be sure, many of those addresses have been targets of this campaign and 
others like it for months prior to the attack on the Return Path system, since 
this campaign is specifically seeking out and attacking the email marketing and 
ESP community. But we are assuming, and behaving as if, any fresh campaigns are 
likely somehow linked to the data breach on our end.

Data was taken from us, and that security hole is now closed. However, some of 
our clients that are being attacked send mail from IP addresses that are 
Certified by Return Path. Since we jumped on this issue on the Wednesday before 
Thanksgiving, we have identified two sending system compromises of two of our 
clients. Our monitoring caught these compromises, and the compromised IPs have 
been removed from the Certified list.

As you might expect, investigating a data breach of this kind takes a 
tremendous amount of post-hoc forensic work, so it’s taken us a little while to 
get our arms around exactly what happened. That part isn’t particularly 
interesting. Here’s what those two compromises looked like, what we’ve done 
about them, what we’re doing to monitor more aggressively for future 
compromises, and what we’d like to ask of you.

[more]

http://www.returnpath.net/blog/received/2010/11/phishing-attack-an-open-letter-to-the-anti-spam-and-mailbox-operator-community/

--
Neil Schwartzman
Senior Director
Security Strategy, Receiver Services

Tel: (303) 999-3217
AIM: returnpathcanuk
http://www.returnpath.net/blog/received/

Help the poor help themselves. Fund a small business with micro-loans at  
http://www.kiva.org/team/returnpath