sa-updates failures since few days : failed to parse line URIBL_SBL_A

2011-12-12 Thread numberxiii

Hi

We encountered a problem with sa-update since the last week-end.
It fails with this error :
config: failed to parse line, skipping, in
/tmp/.spamassassin32504f7H7V4tmp/72_active.cf: uridnsblURIBL_SBL_A   
sbl.spamhaus.org.   A

May be it's related to :
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6696

Anybody has got the same error ?

I'm using spamassassin 3.3.1.

Regards

-- 
View this message in context: 
http://old.nabble.com/sa-updates-failures-since-few-days-%3A-failed-to-parse-line-URIBL_SBL_A-tp32958554p32958554.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: sa-updates failures since few days : failed to parse line URIBL_SBL_A

2011-12-12 Thread Kevin A. McGrail

On 12/12/2011 6:17 AM, numberxiii wrote:

Hi

We encountered a problem with sa-update since the last week-end.
It fails with this error :
config: failed to parse line, skipping, in
/tmp/.spamassassin32504f7H7V4tmp/72_active.cf: uridnsblURIBL_SBL_A
sbl.spamhaus.org.   A

May be it's related to :
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6696

Anybody has got the same error ?

I'm using spamassassin 3.3.1.

You are correct and it is related to 6696.  
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6720 is tracking 
this issue.


Regards,
KAM


DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread darxus
Tomorrow's sa-update will include disabling of the DNSWL rules.  If you
wish to locally enable them with the same scores which had previously been
default, use this:

score RCVD_IN_DNSWL_NONE -0.0001
score RCVD_IN_DNSWL_LOW -0.7
score RCVD_IN_DNSWL_MED -2.3
score RCVD_IN_DNSWL_HI -5

It was disabled because it is returning a value triggering RCVD_IN_DNSWL_HI
for all queries from DNS servers deemed abusive, causing false negatives in
SpamAssassin.  It was the only network test, enabled in SpamAssassin
by default, intentionally returning known incorrect values under any
circumstances.

It is recommended that you use a local, caching, non-forwarding DNS server
with SpamAssassin:  http://wiki.apache.org/spamassassin/CachingNameserver
This should prevent you from being considered abusive by DNSWL unless
you are actually doing multi-million queries per day, based on the list
DNSWL provided yesterday of who is currently categorized as abusive:

 * Google Public DNS servers (multi-million queries per 24 hours, no
   response from Google contacts)
 * Some big hosting provider resolvers: softlayer.com, dimenoc.com,
   theplanet.com, bluehost.com, dyndns.com, netline.net.uk (multi-million
   queries per 24 hours, no response/action from abuse@ and similar
   contacts)
 * Five single hosts with multi-million queries per 24 hours with no
   response/action from multiple contacts.

Problems have only been occurring when people use the above DNS Servers.

Relevant bug (and source of above list):
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6668

-- 
Begin at the beginning and go on till you come to the end; then stop.
- Lewis Carrol, Alice in Wonderland
http://www.ChaosReigns.com


Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Jeremy McSpadden
Thank you! I raised this question a few months ago and was in awe that it was 
enabled by default. It has caused quite a few issues that i've seen around the 
ML. They should return a different value than a negative score. Very bad design.

--
Jeremy McSpadden
Flux Labs, Inc
http://www.fluxlabs.nethttp://www.fluxlabs.net/
Endless Solutions
Office : 850-588-4626
Cell : 850-890-2543
Fax : 850-254-2955

On Dec 12, 2011, at 11:58 AM, 
dar...@chaosreigns.commailto:dar...@chaosreigns.com
 wrote:

Tomorrow's sa-update will include disabling of the DNSWL rules.  If you
wish to locally enable them with the same scores which had previously been
default, use this:

score RCVD_IN_DNSWL_NONE -0.0001
score RCVD_IN_DNSWL_LOW -0.7
score RCVD_IN_DNSWL_MED -2.3
score RCVD_IN_DNSWL_HI -5

It was disabled because it is returning a value triggering RCVD_IN_DNSWL_HI
for all queries from DNS servers deemed abusive, causing false negatives in
SpamAssassin.  It was the only network test, enabled in SpamAssassin
by default, intentionally returning known incorrect values under any
circumstances.

It is recommended that you use a local, caching, non-forwarding DNS server
with SpamAssassin:  http://wiki.apache.org/spamassassin/CachingNameserver
This should prevent you from being considered abusive by DNSWL unless
you are actually doing multi-million queries per day, based on the list
DNSWL provided yesterday of who is currently categorized as abusive:

* Google Public DNS servers (multi-million queries per 24 hours, no
 response from Google contacts)
* Some big hosting provider resolvers: softlayer.comhttp://softlayer.com, 
dimenoc.comhttp://dimenoc.com,
 theplanet.comhttp://theplanet.com, bluehost.comhttp://bluehost.com, 
dyndns.comhttp://dyndns.com, netline.net.ukhttp://netline.net.uk 
(multi-million
 queries per 24 hours, no response/action from abuse@ and similar
 contacts)
* Five single hosts with multi-million queries per 24 hours with no
 response/action from multiple contacts.

Problems have only been occurring when people use the above DNS Servers.

Relevant bug (and source of above list):
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6668

--
Begin at the beginning and go on till you come to the end; then stop.
- Lewis Carrol, Alice in Wonderland
http://www.ChaosReigns.com




Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Daniel McDonald



On 12/12/11 12:03 PM, Jeremy McSpadden jer...@fluxlabs.net wrote:

 Thank you! I raised this question a few months ago and was in awe that it was
 enabled by default. It has caused quite a few issues that i've seen around the
 ML. They should return a different value than a negative score.

Can I ask you a fairly blunt question?

What action could they have taken that would have caused you to notice that
you were engaging in abusive miss-use of their service by continuing to
forward your requests through google?

I'm quite serious.  DNSBLs have this problem of never being able to get rid
of the queries from sources that appear to be abusive.  What can be done so
that a part-time admin will take notice and fix their equipment?  A log
message?  Special header in every e-mail?  Change the subject line to you
have Spamassassin integrated wrong!?  Or a visit from Guido and some of the
boys, trying to make an offer you can't refuse?

In this case, they moved you to action by causing your customers some grief.
That made you look into the issue, get guidance that you really need to run
a local recursive caching DNS server in order to get clear answers from
DNSBLs, and then I imagine you fixed the problem.  How else could they have
let you know?


-- 
Daniel J McDonald, CCIE # 2495, CISSP # 78281



 Very bad design. 
 
 
 On Dec 12, 2011, at 11:58 AM, dar...@chaosreigns.com
  wrote:
 
 Tomorrow's sa-update will include disabling of the DNSWL rules.  If you
 wish to locally enable them with the same scores which had previously been



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Jeremy McSpadden
I agree with what you are saying, but to enable a plugin out of the box; with 
no warning or instructions stating you need to run a local caching dns server 
in order to use this plugin successfully if your machine is using a dns server 
that may or may not be used and making millions of queries therefore banned 
which returns a score that is giving a negative score ... has no justification.


(sorry for the run on sentence)
--
Jeremy McSpadden
Flux Labs, Inc
http://www.fluxlabs.nethttp://www.fluxlabs.net/
Endless Solutions
Office : 850-588-4626
Cell : 850-890-2543
Fax : 850-254-2955

On Dec 12, 2011, at 12:35 PM, Daniel McDonald wrote:

Can I ask you a fairly blunt question?

What action could they have taken that would have caused you to notice that
you were engaging in abusive miss-use of their service by continuing to
forward your requests through google?

I'm quite serious.  DNSBLs have this problem of never being able to get rid
of the queries from sources that appear to be abusive.  What can be done so
that a part-time admin will take notice and fix their equipment?  A log
message?  Special header in every e-mail?  Change the subject line to you
have Spamassassin integrated wrong!?  Or a visit from Guido and some of the
boys, trying to make an offer you can't refuse?

In this case, they moved you to action by causing your customers some grief.
That made you look into the issue, get guidance that you really need to run
a local recursive caching DNS server in order to get clear answers from
DNSBLs, and then I imagine you fixed the problem.  How else could they have
let you know?


--
Daniel J McDonald, CCIE # 2495, CISSP # 78281



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Kevin A. McGrail

On 12/12/2011 1:35 PM, Daniel McDonald wrote:

Can I ask you a fairly blunt question?

What action could they have taken that would have caused you to notice that
you were engaging in abusive miss-use of their service by continuing to
forward your requests through google?

I'm quite serious.  DNSBLs have this problem of never being able to get rid
of the queries from sources that appear to be abusive.  What can be done so
that a part-time admin will take notice and fix their equipment?  A log
message?  Special header in every e-mail?  Change the subject line to you
have Spamassassin integrated wrong!?  Or a visit from Guido and some of the
boys, trying to make an offer you can't refuse?

In this case, they moved you to action by causing your customers some grief.
That made you look into the issue, get guidance that you really need to run
a local recursive caching DNS server in order to get clear answers from
DNSBLs, and then I imagine you fixed the problem.  How else could they have
let you know?
There is nothing an RBL admin can do to guarantee access to the admin of 
a downstream server. The use of DNS is purposefully done to provide a 
distributed network and purposefully giving wrong answers is DNS poisoning.


If you choose to run an RBL, you have to know you might need to 
blackhole requests from people that don't follow the access rules.  
Sending an incorrect answer to get someone's attention is akin to firing 
a few rounds through a window to get the attention of the window cleaner.


However, I would love to see RBLs get together and come up with a 
specific this is a non-answer answer that can be programatically 
used.  However, realize that many RBLs are designed to be implemented in 
FAR simpler situations than SA that can only deal with yes/no.


Regards,
KAM


Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Ted Mittelstaedt

I concur 100%.  Daniel is wrong.  The problem isn't
dnswl.org the problem is the person who made the decision in
SpamAssassin to have the default for the dnswl plugin ENABLED
by default.  That decision has been recognized to have been a
mistake which is why SA is making an update that will
turn it off by default.

This is not a blame the user for stupid configuration mistakes
problem this is a blame the software developer for a stupid
configuration mistake  And the software developer has
acknowledged it was a mistake.  So why people are calling
SA users abusive is beyond me.

Anyone who produces software understands that the users of
the software are not as knowledgeable about whatever it is
the software does - in a word, they are ignorant.  That is
why there are software developers and software users.
If the users knew as much as the developer did they could write their 
own software and they wouldn't need the developers.  Thus, the developer

has an obligation to be somewhat responsible in not putting
in defaults that shoot people in the foot.  If those users
want to enable things that shoot themselves in the foot that
is their affair.

The SA developers understand this, I don't see why it's so difficult
a concept for others to grasp.

Ted

On 12/12/2011 10:48 AM, Jeremy McSpadden wrote:

I agree with what you are saying, but to enable a plugin out of the box;
with no warning or instructions stating you need to run a local caching
dns server in order to use this plugin successfully if your machine is
using a dns server that may or may not be used and making millions of
queries therefore banned which returns a score that is giving a
negative score ... has no justification.


(sorry for the run on sentence)
--
Jeremy McSpadden
Flux Labs, Inc
http://www.fluxlabs.net http://www.fluxlabs.net/
Endless Solutions
*Office*: 850-588-4626
*Cell*: 850-890-2543
*Fax* : 850-254-2955

On Dec 12, 2011, at 12:35 PM, Daniel McDonald wrote:


Can I ask you a fairly blunt question?

What action could they have taken that would have caused you to notice
that
you were engaging in abusive miss-use of their service by continuing to
forward your requests through google?

I'm quite serious. DNSBLs have this problem of never being able to get rid
of the queries from sources that appear to be abusive. What can be done so
that a part-time admin will take notice and fix their equipment? A log
message? Special header in every e-mail? Change the subject line to you
have Spamassassin integrated wrong!? Or a visit from Guido and some
of the
boys, trying to make an offer you can't refuse?

In this case, they moved you to action by causing your customers some
grief.
That made you look into the issue, get guidance that you really need
to run
a local recursive caching DNS server in order to get clear answers from
DNSBLs, and then I imagine you fixed the problem. How else could they have
let you know?


--
Daniel J McDonald, CCIE # 2495, CISSP # 78281






Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Karsten Bräckelmann
On Mon, 2011-12-12 at 11:50 -0800, Ted Mittelstaedt wrote:
 I concur 100%.  Daniel is wrong.  The problem isn't
 dnswl.org the problem is the person who made the decision in
 SpamAssassin to have the default for the dnswl plugin ENABLED

Please don't forget that this became an issue only after DNSWL policy
change. At the time the DNSWL rules have been enabled by default in SA,
there where no deliberately false listing responses.

 by default.  That decision has been recognized to have been a
 mistake which is why SA is making an update that will
 turn it off by default.

Not a mistake -- but a dangerous rule to ship in the face of the DNSWL
policy change.


 This is not a blame the user for stupid configuration mistakes
 problem this is a blame the software developer for a stupid
 configuration mistake  And the software developer has
 acknowledged it was a mistake.  So why people are calling
 SA users abusive is beyond me.

See above, not a mistake.

And I don't see anyone calling the users abusive. But the DNS servers.
Which is causing collateral damage to some users.


-- 
char *t=\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Ted Mittelstaedt

On 12/12/2011 12:24 PM, Karsten Bräckelmann wrote:

On Mon, 2011-12-12 at 11:50 -0800, Ted Mittelstaedt wrote:

I concur 100%.  Daniel is wrong.  The problem isn't
dnswl.org the problem is the person who made the decision in
SpamAssassin to have the default for the dnswl plugin ENABLED


Please don't forget that this became an issue only after DNSWL policy
change. At the time the DNSWL rules have been enabled by default in SA,
there where no deliberately false listing responses.



Not to belabor the point but according to the Internet Archive this 
DNSWL policy change happened in October 2010, that is when the

website was changed.

SA 3.3.2 shipped June 2011 so it seems that there should have been
sufficient time to change the default.


by default.  That decision has been recognized to have been a
mistake which is why SA is making an update that will
turn it off by default.


Not a mistake -- but a dangerous rule to ship in the face of the DNSWL
policy change.



SA users have been burned several times in the past by blacklist
providers who decided for whatever reason they were going to stop
offering service, and started handing out positive entries for
every query.  on defaults for any outside providers simply
aren't appropriate, and the SA developers should have known
this by now as a result of that happening.

Normally I would be the last person to defend DNSWL as I deplore
the FUD reasoning that they use - the claim that the existence of
IPv6 will make blacklists obsolete is a flat out lie, all that is
needed to be done is for a BL query plugin to parse the incoming
IP address and see if it's in the /64 or /56, rather than do an exact
match.  I also deplore this offer it free until people are dependent on 
it then charge the crap out of the commercial providers who you

have snared business model.  And I detest this guilty until your
prove yourself innocent by seeking our blessing rubbish.

So I had to really stretch to write what I wrote, as I would
love to blame DNSWL for it but in this case, they really are blameless.




This is not a blame the user for stupid configuration mistakes
problem this is a blame the software developer for a stupid
configuration mistake  And the software developer has
acknowledged it was a mistake.  So why people are calling
SA users abusive is beyond me.


See above, not a mistake.

And I don't see anyone calling the users abusive. But the DNS servers.
Which is causing collateral damage to some users.



This is a mailing list mainly for SA administrators, users of SA in
this context are the administrators that install it, not the end users
using SA-enabled mailservers.  And DNS servers don't just query for
no reason.

Ted








Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Ned Slider

On 12/12/11 19:50, Ted Mittelstaedt wrote:

I concur 100%. Daniel is wrong. The problem isn't
dnswl.org the problem is the person who made the decision in
SpamAssassin to have the default for the dnswl plugin ENABLED
by default. That decision has been recognized to have been a
mistake which is why SA is making an update that will
turn it off by default.

This is not a blame the user for stupid configuration mistakes
problem this is a blame the software developer for a stupid
configuration mistake And the software developer has
acknowledged it was a mistake. So why people are calling
SA users abusive is beyond me.

Anyone who produces software understands that the users of
the software are not as knowledgeable about whatever it is
the software does - in a word, they are ignorant. That is
why there are software developers and software users.
If the users knew as much as the developer did they could write their
own software and they wouldn't need the developers. Thus, the developer
has an obligation to be somewhat responsible in not putting
in defaults that shoot people in the foot. If those users
want to enable things that shoot themselves in the foot that
is their affair.

The SA developers understand this, I don't see why it's so difficult
a concept for others to grasp.

Ted


So does this mean SA should disable ALL network based tests by default 
as they all have the same potential to return false positives/negatives 
to get the attention of (abusive) sysadmins? About the only difference 
is dnswl.org got to hit folks with a -5 score whereas most others would 
have significantly less scoring impact available, but the potential 
threat is the same.


I can understand the decision if dnswl.org have requested SA disable 
lookups by default, but otherwise it's a last resort attempt to get the 
attention of someone after all other reasonable efforts to communicate 
the issue have failed. I personally don't think it unreasonable.


Either way, I appreciate the heads up here so we (SA users) may make the 
decision whether or not to re-enable dnswl.org on our own setups.






Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Kevin A. McGrail


So does this mean SA should disable ALL network based tests by default 
as they all have the same potential to return false 
positives/negatives to get the attention of (abusive) sysadmins? About 
the only difference is dnswl.org got to hit folks with a -5 score 
whereas most others would have significantly less scoring impact 
available, but the potential threat is the same.
In the past, the RBL errors I can think of were less RBL policy and more 
RBLs going under where things such as registrars took over DNS and 
returned answers for every query.


However, the stability of an RBL and their infrastructure is a major 
concern for the SA project to consider an RBL for inclusion for just 
these type of reasons.  There is a lot of debate concerning RBLs, their 
impact and their inclusion in SA.



I can understand the decision if dnswl.org have requested SA disable 
lookups by default, but otherwise it's a last resort attempt to get 
the attention of someone after all other reasonable efforts to 
communicate the issue have failed. I personally don't think it 
unreasonable.


Either way, I appreciate the heads up here so we (SA users) may make 
the decision whether or not to re-enable dnswl.org on our own setups.


As an aside, DNSWL most likely disagrees with disabling the rules by 
default in SA.  However, it was an SA decision to do so in light of 
complaints of the rule misfiring on purpose due to over-quota policies 
for DNSWL.


Regards,
KAM


Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Karsten Bräckelmann
On Mon, 2011-12-12 at 13:01 -0800, Ted Mittelstaedt wrote:
 On 12/12/2011 12:24 PM, Karsten Bräckelmann wrote:

  Please don't forget that this became an issue only after DNSWL policy
  change. At the time the DNSWL rules have been enabled by default in SA,
  there where no deliberately false listing responses.
 
 Not to belabor the point but according to the Internet Archive this 
 DNSWL policy change happened in October 2010, that is when the
 website was changed.

Back in Oct 2010 the policy has been changed, introducing the free usage
limits and a subscription offer. However, the policy was enforced by
blocking requests of abusive hosts only. Harmless, and will not result
in FPs.

The policy change we're discussing -- serving FP listings to excessive
over-limit abusers -- was established just recently, Oct 17, 2011.

If you want to see for yourself, please have a look at the DNSWL news,
linked from their main site.


 SA 3.3.2 shipped June 2011 so it seems that there should have been
 sufficient time to change the default.

See above, off by one year.

While the team arguably didn't react appropriately to the initial
heads-up by Darxus just a few weeks ago, I stand to what I said.


  And I don't see anyone calling the users abusive. But the DNS servers.
  Which is causing collateral damage to some users.
 
 This is a mailing list mainly for SA administrators, users of SA in
 this context are the administrators that install it, not the end users

I did not say, neither imply anything else. With no word did I refer to
end-users or clients -- frankly, in context the interpretation of
users as users of SA, people running the product is the only one
that makes sense. And is generally to be assumed in this place anyway.
But thanks for stating the obvious.

 using SA-enabled mailservers.  And DNS servers don't just query for
 no reason.

DNS servers don't query for no reason, but because the admin chose to
use it.

Again, I stand to what I said. I have not seen anyone blaming users.


-- 
char *t=\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: error on SA learning.

2011-12-12 Thread Karsten Bräckelmann
Obviously intended for the list, rather than me only.

On Sun, 2011-12-11 at 12:52 -0600, Sergio wrote:
 Thank you all, I have fixed it.
 
 It was certainly an error in NetAddr-IP.
 
 Sergio
 
 2011/12/11 Karsten Bräckelmann guent...@rudersport.de
 On Sun, 2011-12-11 at 07:16 -0600, Sergio wrote:
  netset: cannot include 0:0:0:0:0:0:0:1/128 as it has already been
 included
 
 
 Bug 6681. Certain NetAddr-IP Perl module versions are broken, avoid
 versions 4.045 to 4.054.


-- 
char *t=\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread jdow

On 2011/12/12 14:35, Karsten Bräckelmann wrote:

On Mon, 2011-12-12 at 13:01 -0800, Ted Mittelstaedt wrote:

On 12/12/2011 12:24 PM, Karsten Bräckelmann wrote:



Please don't forget that this became an issue only after DNSWL policy
change. At the time the DNSWL rules have been enabled by default in SA,
there where no deliberately false listing responses.


Not to belabor the point but according to the Internet Archive this
DNSWL policy change happened in October 2010, that is when the
website was changed.


Back in Oct 2010 the policy has been changed, introducing the free usage
limits and a subscription offer. However, the policy was enforced by
blocking requests of abusive hosts only. Harmless, and will not result
in FPs.

The policy change we're discussing -- serving FP listings to excessive
over-limit abusers -- was established just recently, Oct 17, 2011.

If you want to see for yourself, please have a look at the DNSWL news,
linked from their main site.



SA 3.3.2 shipped June 2011 so it seems that there should have been
sufficient time to change the default.


See above, off by one year.

While the team arguably didn't react appropriately to the initial
heads-up by Darxus just a few weeks ago, I stand to what I said.



And I don't see anyone calling the users abusive. But the DNS servers.
Which is causing collateral damage to some users.


This is a mailing list mainly for SA administrators, users of SA in
this context are the administrators that install it, not the end users


I did not say, neither imply anything else. With no word did I refer to
end-users or clients -- frankly, in context the interpretation of
users as users of SA, people running the product is the only one
that makes sense. And is generally to be assumed in this place anyway.
But thanks for stating the obvious.


using SA-enabled mailservers.  And DNS servers don't just query for
no reason.


DNS servers don't query for no reason, but because the admin chose to
use it.

Again, I stand to what I said. I have not seen anyone blaming users.


Hm, their limit is 100,000 queries. LKML can probably account for about
that many queries per month for one user. Add in Fedora and spam and I am
pretty sure two users could overrun their limits.

{^_^}


Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Karsten Bräckelmann
On Mon, 2011-12-12 at 15:42 -0800, jdow wrote:
 Hm, their limit is 100,000 queries. LKML can probably account for about
 that many queries per month for one user. Add in Fedora and spam and I am
 pretty sure two users could overrun their limits.

100,000 queries per *day*, not month.

Plus, using a *caching* DNS server, no matter how much mail the LKML
list-server emits a day, it's just a few queries to the DNSWL mirrors.
And guess what, the second subscriber does not add any additional
queries.

*sigh*


-- 
char *t=\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Ted Mittelstaedt

On 12/12/2011 2:35 PM, Karsten Bräckelmann wrote:

On Mon, 2011-12-12 at 13:01 -0800, Ted Mittelstaedt wrote:

On 12/12/2011 12:24 PM, Karsten Bräckelmann wrote:



Please don't forget that this became an issue only after DNSWL policy
change. At the time the DNSWL rules have been enabled by default in SA,
there where no deliberately false listing responses.


Not to belabor the point but according to the Internet Archive this
DNSWL policy change happened in October 2010, that is when the
website was changed.


Back in Oct 2010 the policy has been changed, introducing the free usage
limits and a subscription offer. However, the policy was enforced by
blocking requests of abusive hosts only. Harmless, and will not result
in FPs.

The policy change we're discussing -- serving FP listings to excessive
over-limit abusers -- was established just recently, Oct 17, 2011.

If you want to see for yourself, please have a look at the DNSWL news,
linked from their main site.



The text regarding high-use queries appeared on the website in
October 2010.  Whether or not it's enforced by serving FP's to
excessive users is beside the point -
high-query users lost the right to use DNS as soon as that text
appeared.  In other words the behavior of the whitelist at that
time changed from everyone use us, please, commercial or
otherwise, the same way to some of you use us this way and others use 
us that way  Knowing that SA was being used by both groups which

the whitelist was expecting different behavior from should have been
enough to turn off access to that list in the default config of SA.

it's no different than MAPS access -OK for some, not OK for others,
that too is defaulted to off.

The serving FPs is tangential.  It has the action
of forcing behavior in SA that a year earlier would have been the 
sensible thing to do.


Ted





SA 3.3.2 shipped June 2011 so it seems that there should have been
sufficient time to change the default.


See above, off by one year.

While the team arguably didn't react appropriately to the initial
heads-up by Darxus just a few weeks ago, I stand to what I said.



And I don't see anyone calling the users abusive. But the DNS servers.
Which is causing collateral damage to some users.


This is a mailing list mainly for SA administrators, users of SA in
this context are the administrators that install it, not the end users


I did not say, neither imply anything else. With no word did I refer to
end-users or clients -- frankly, in context the interpretation of
users as users of SA, people running the product is the only one
that makes sense. And is generally to be assumed in this place anyway.
But thanks for stating the obvious.


using SA-enabled mailservers.  And DNS servers don't just query for
no reason.


DNS servers don't query for no reason, but because the admin chose to
use it.

Again, I stand to what I said. I have not seen anyone blaming users.






Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Karsten Bräckelmann
On Mon, 2011-12-12 at 16:04 -0800, Ted Mittelstaedt wrote:
 The text regarding high-use queries appeared on the website in
 October 2010.  Whether or not it's enforced by serving FP's to
 excessive users is beside the point -

No, it is not. It is precisely the point, and the reason for disabling
DNSWL by default.

 high-query users lost the right to use DNS as soon as that text
 appeared.  In other words the behavior of the whitelist at that
 time changed from everyone use us, please, commercial or
 otherwise, the same way to some of you use us this way and others use 
 us that way  Knowing that SA was being used by both groups which
 the whitelist was expecting different behavior from should have been
 enough to turn off access to that list in the default config of SA.

No. SA should be usable out-of-the-box with best possible performance
for the majority of users.

Plus, sites processing way above 100,000 messages a day do have the
admin power and knowledge to take care of these. The majority of smaller
sites does not.


 The serving FPs is tangential.

Again, no. It is the very reason to pull DNSWL by default. It is the
core of the decision.


-- 
char *t=\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Benny Pedersen

On Mon, 12 Dec 2011 18:48:07 +, Jeremy McSpadden wrote:

I agree with what you are saying, but to enable a plugin out of
the box; with no warning or instructions stating you need to run a
local caching dns server in order to use this plugin successfully if
your machine is using a dns server that may or may not be used and
making millions of queries therefore banned which returns a score
that is giving a negative score ... has no justification.


its the same for all dnsbl/dnswl, admins need to know what to do ?

make another bugreport on bugzilla ?




Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Ted Mittelstaedt

On 12/12/2011 4:27 PM, Karsten Bräckelmann wrote:

On Mon, 2011-12-12 at 16:04 -0800, Ted Mittelstaedt wrote:

The text regarding high-use queries appeared on the website in
October 2010.  Whether or not it's enforced by serving FP's to
excessive users is beside the point -


No, it is not. It is precisely the point, and the reason for disabling
DNSWL by default.


high-query users lost the right to use DNS as soon as that text
appeared.  In other words the behavior of the whitelist at that
time changed from everyone use us, please, commercial or
otherwise, the same way to some of you use us this way and others use
us that way  Knowing that SA was being used by both groups which
the whitelist was expecting different behavior from should have been
enough to turn off access to that list in the default config of SA.


No. SA should be usable out-of-the-box with best possible performance
for the majority of users.

Plus, sites processing way above 100,000 messages a day do have the
admin power and knowledge to take care of these. The majority of smaller
sites does not.



The serving FPs is tangential.


Again, no. It is the very reason to pull DNSWL by default. It is the
core of the decision.



then why is DNSWL the only one that had access turned on by default 
originally?


Ted






Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Ted Mittelstaedt

On 12/12/2011 4:02 PM, Karsten Bräckelmann wrote:

On Mon, 2011-12-12 at 15:42 -0800, jdow wrote:

Hm, their limit is 100,000 queries. LKML can probably account for about
that many queries per month for one user. Add in Fedora and spam and I am
pretty sure two users could overrun their limits.


100,000 queries per *day*, not month.

Plus, using a *caching* DNS server, no matter how much mail the LKML
list-server emits a day, it's just a few queries to the DNSWL mirrors.
And guess what, the second subscriber does not add any additional
queries.

*sigh*



Most likely 90% of the ISPs and corporations out there who wanted
to use the DNSWL and did this would experience no problems.

But the text on the website is extremely hand-wavy.

They state you must purchase a subscription if your selling anti-spam
services.  This is pretty unambiguous.

They also state if you do more than 100,000 queries per day on the
public nameservers you must purchase a subscription, this is also
pretty unambiguous.

But what is ambiguous is that they state that non-commercial use is OK,
but they don't state that commercial use must require a subscription,
and they don't define commercial or non-commercial use.

So if I run a profit making ISP that offers spam-filtering as a free
ad-on, I am not selling anti-spam services - or am it?  Since the
free add-on is a value-add, even though I may say it's free in the
marketing, in truth I really am selling anti-spam services.

And if I'm a commercial company with 200 employees and I run my own
caching nameserver then what?  I'm not non-commercial so my use isn't
non-commercial.

The TOS is basically structured so that the maintainers can pick
and choose what users need to be designated as need to get money from
and what users don't.

And the more explicit TOS here:

http://www.dnswl.org/license

is no less ambiguous.  It defines users then talks about commercial
vendors of dnswl data - but commercial vendors of dnswl data isn't
defined precisely and the implication overlaps the more precise 
definition of user.


Now yeah I've been around and I get what they are driving at, I
think most people reading do.

But our I get what they are driving at has absolutely no legal weight
and this is my problem with the DNSWL, it's why I don't use it.

feeping creaturism comes to mind here.  They suck you in for free
and once your dependent on them they yank the rug out and change
terms then want money.  I hate when companies do that.  I have
a whole library of software programs that are versions released just
prior to the commercial version. (and of course exist on no archive
site today) and now the service providers are playing that game.

When Unisys started charging for the GIF patent it triggered the
abandonment of GIF and replacement by PNG and just about the time that
this was completed the GIF patent expired, making PNG pointless
except as a statement by the community along the lines of
what you did is so unforgivable we are going to spend thousands of
hours making sure your patent is gonna be screwed

But it's OK for list providers to play this game, eh?  Just not Unisys?

Ted







Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Karsten Bräckelmann
On Mon, 2011-12-12 at 16:39 -0800, Ted Mittelstaedt wrote:
 Most likely 90% of the ISPs and corporations out there who wanted
 to use the DNSWL and did this would experience no problems.
 
 But the text on the website is extremely hand-wavy.
[...]

Now we seriously moved off-topic...


-- 
char *t=\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Kevin A. McGrail


But it's OK for list providers to play this game, eh?  Just not Unisys? 


This is a discussion better suited to DNSWL's mailing lists than SA as 
we've disabled the rules.  Overall, though, DNSWL has been good members 
of the anti-spam community and have supported running their tests for a 
long time.


So I'm not going to give them a ton of grief because they haven't dotted 
every i or crossed every t.


If you don't like the terms of the list provider, don't use them.  It's 
pretty simple.


regards,
KAM



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Benny Pedersen

On Mon, 12 Dec 2011 21:24:12 +0100, Karsten Bräckelmann wrote:

And I don't see anyone calling the users abusive. But the DNS 
servers.

Which is causing collateral damage to some users.


and there is other dnseval rules that could make false possitive on 
shared dns servers aswell, might be time to enable dnssec ? :=)





Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Karsten Bräckelmann
On Mon, 2011-12-12 at 16:37 -0800, Ted Mittelstaedt wrote:
 then why is DNSWL the only one that had access turned on by default 
 originally?

Sorry, I don't understand what you're asking or referring to.

But then again, we're getting quite off-topic. And frankly, all this
arguing is mildly annoying. Might as well move on, and do something more
productive.


-- 
char *t=\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Benny Pedersen

On Mon, 12 Dec 2011 19:49:58 -0500, Kevin A. McGrail wrote:

If you don't like the terms of the list provider, don't use them.
It's pretty simple.


make the bug report invalid / wont-fix then ?

i dont get it :/




Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Kevin A. McGrail

On 12/12/2011 8:22 PM, Benny Pedersen wrote:

On Mon, 12 Dec 2011 19:49:58 -0500, Kevin A. McGrail wrote:

If you don't like the terms of the list provider, don't use them.
It's pretty simple.


make the bug report invalid / wont-fix then ?

i dont get it :/

What bug are you talking about?

For DNSWL, 6718 is a dupe and 6668 is considered resolved with the 
changing of the DNSWL scores to 0 which will be effective in the next 
sa-update.


Fwd: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Sergio
(Public apologies to Karste, wrote him instead of the list, mmm... I need
to remember to write to the list and not just do a Reply.)

What is the best way to dissable DNSWL manually?
(in case I don't want to wait until tomorrow)

Regards,

Sergio


Re: Fwd: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Kevin A. McGrail

On 12/12/2011 8:35 PM, Sergio wrote:

(in case I don't want to wait until tomorrow)
What is the best way to dissable DNSWL manually?


Add this to your local.cf and reload spamd (if you use that):

score RCVD_IN_DNSWL_NONE 0
score RCVD_IN_DNSWL_LOW 0
score RCVD_IN_DNSWL_MED 0
score RCVD_IN_DNSWL_HI 0

regards,
KAM



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Benny Pedersen

On Mon, 12 Dec 2011 20:29:07 -0500, Kevin A. McGrail wrote:


For DNSWL, 6718 is a dupe and 6668 is considered resolved with the
changing of the DNSWL scores to 0 which will be effective in the next
sa-update.


DNSWL is scaned in deep received, but none have reporteed this :(

dont know if others dns whitelists do this in default :(

#6718 should have being resolved wont-fix
#6668 agree on comment #1, the rest is just fuss imho



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Kevin A. McGrail

On 12/12/2011 8:58 PM, Benny Pedersen wrote:

On Mon, 12 Dec 2011 20:29:07 -0500, Kevin A. McGrail wrote:


For DNSWL, 6718 is a dupe and 6668 is considered resolved with the
changing of the DNSWL scores to 0 which will be effective in the next
sa-update.


DNSWL is scaned in deep received, but none have reporteed this :(
DNSWL for SA is implemented with first-trusted on all the tests in SA I 
found.   I don't see any deep-header parsing.



#6718 should have being resolved wont-fix

No, it was a duplicate complaint.  Marking it a duplicate was accurate IMO.

#6668 agree on comment #1, the rest is just fuss imho

As I wrote comment 1, I have to agree it was brilliant ;-)

regards,
KAM


Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Benny Pedersen

On Mon, 12 Dec 2011 21:12:56 -0500, Kevin A. McGrail wrote:


DNSWL is scaned in deep received, but none have reporteed this :(

DNSWL for SA is implemented with first-trusted on all the tests in SA
I found.   I don't see any deep-header parsing.


if its was we all need to use trusted_networks even more, its 
firstuntrusted, not first hop ;/


whitelists should be fitsthop only, no ?


#6718 should have being resolved wont-fix
No, it was a duplicate complaint.  Marking it a duplicate was 
accurate IMO.


spamassassin is not a book of howto setup dns servers or is it now ?


#6668 agree on comment #1, the rest is just fuss imho

As I wrote comment 1, I have to agree it was brilliant ;-)


atleast some have humor in this month :-)



Re: Fwd: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Karsten Bräckelmann
On Mon, 2011-12-12 at 20:37 -0500, Kevin A. McGrail wrote:
 On 12/12/2011 8:35 PM, Sergio wrote:
  (in case I don't want to wait until tomorrow)
  What is the best way to dissable DNSWL manually?
 
 Add this to your local.cf and reload spamd (if you use that):
 
 score RCVD_IN_DNSWL_NONE 0
 score RCVD_IN_DNSWL_LOW 0
 score RCVD_IN_DNSWL_MED 0
 score RCVD_IN_DNSWL_HI 0

Oh, hello there, pet-peeve! You, too, forgot to eliminate the actual DNS
querying rule.

While the above works as advertised to disable the rules, preventing it
from FP hits, it does not prevent the DNS queries. For that, you got to
meta out the non-scoring sub-rule all of those above depend on.


Canonical instructions.

Identify your system's default configuration directory. A brave 'man
spamassassin' is your friend. Go there.

Grep for the DNSBL rules (or better yet, a brief sub-pattern) you want
to disable. Ignore the noise like score and description, and identify
the actual (sub-)rules.

Score the rules you want to disable with 0. AND meta out their sub-rule
dependencies, to actually get rid of the DNS queries.

  meta __DNSBL_FOO  0

Do NOT do that where you found the rules, but in your site-specific conf
dir. The mysterious thingy commonly referred to as 'local.cf'.

Just in case other rules might depend on the rules you want to disable
(again, a brave grep is your friend), also meta'ing out the rules in
question instead of scoring it zero is the better approach. No warnings
about dependencies with zero score.


Rules with a zero score are disabled, as a side-effect. Using meta rules
with a logical 0 is the exact definition of *disabling* a rule. By
overwriting whatever the rule does, with a you will never be true
logic evaluation of 0.


-- 
char *t=\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Karsten Bräckelmann
On Tue, 2011-12-13 at 03:25 +0100, Benny Pedersen wrote:
 On Mon, 12 Dec 2011 21:12:56 -0500, Kevin A. McGrail wrote:
 
   DNSWL is scaned in deep received, but none have reporteed this :(

No, it is not. Never was.

  DNSWL for SA is implemented with first-trusted on all the tests in SA
  I found.   I don't see any deep-header parsing.

Yep.

 if its was we all need to use trusted_networks even more, its 
 firstuntrusted, not first hop ;/
 
 whitelists should be fitsthop only, no ?

First *hop*? No. That's commonly some sender internal machine in the
case of spam. And a no-brainer to forge for spam.


   #6718 should have being resolved wont-fix
  No, it was a duplicate complaint.  Marking it a duplicate was 
  accurate IMO.

Indeed. A duplicate. No question at all.

 spamassassin is not a book of howto setup dns servers or is it now ?

Correct, it isn't. But it greatly benefits, and in quite some cases
requires setting one up.

Well, and an SMTP server or other glue software. SA ain't a book of
howto setup those either, is it? AKA, once again, I cannot follow you,
Benny. ;)


I highly welcome everyone to pay attention to the Subject. Then, after
writing whatever one feels to vent, and *before* sending, to carefully
and consciously re-read the Subject again.


-- 
char *t=\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: DNSWL will be disabled by default as of tomorrow

2011-12-12 Thread Dave Warren

On 12/12/2011 5:27 PM, Karsten Bräckelmann wrote:

No. SA should be usable out-of-the-box with best possible performance
for the majority of users.


Perhaps a better long-term solution would be to validate DNS lists 
before using them?


One possible implementation would be to test to ensure that 127.0.0.1 is 
not listed, and 127.0.0.2 is listed (with the testing criteria being 
configurable, but this is a starting point that will work for most lists).


If a list is down or unresponsive for any reason, discards requests or 
blanks their zone file, the test entry would fail and SA would know to 
not use the list. Similarly, 127.0.0.1 should never be listed for any 
DNSBL that I'm aware of, and so when a list moves to a list-the-world 
configuration, this entry would spot it.


--
Dave Warren, CEO
Hire A Hit Consulting Services
http://ca.linkedin.com/in/davejwarren



Re: Using ZMI_GERMAN ruleset

2011-12-12 Thread Michael Monnerie
On Montag, 31. Oktober 2011 Axb wrote:
 tried it and dumped due to low hit rate
 
 stuff like
 
 body ZMIde_JOBSEARCH6 /Dank sehr grossen Angagement, aber auch
 der  Umsetzung verschiedener Inovationen, konnte unsere Firma schon
 nach vier Jahren auf die internationalen Ebene hinaufsteigen/
 
 is not efficient

Its efficient in terms of filtering only spam with zero false 
positives, which is top priority for this ruleset. And you picked a 
very old and very long rule. Most rules nowadays are just one or even 
only part of a sentence, and it prooves very efficient. Stuff like the 
__ZMIde_JOBEARN1-28 rules move false positives to 0, and I'm constantly 
adding stuff.

I've now tried to remove all old cruft, that means single-line rules. 
Rulesize went from 350KB to 296KB, that should save some RAM and CPU.

-- 
mit freundlichen Grüssen,
Michael Monnerie, Ing. BSc

it-management Internet Services: Protéger
http://proteger.at [gesprochen: Prot-e-schee]
Tel: +43 660 / 415 6531


signature.asc
Description: This is a digitally signed message part.