Re: Deceiving phishing

2014-02-07 Thread Olivier Nicole
  I was considering, instead of plainly dropping the phishing emails, why
  not deceiving it: having automatic replys with invalid informations.
 
  I guess that people who launch phishing campaings get few answers, but
  the answers they get are correct, the username and password match. What
  would happen if they gey thousands of answers that are mostly incorrect?
  They would have to waste time and resources to check every answer.
 
 Phishing campaigns don't usually expect a reply, they want you to fill 
 in your data into a web form on either a dedicated or exploted web site.

By reply I don't mean mail reply, but automatically filling their web
form with garbage.

Bests,

Olivier


Re: Deceiving phishing

2014-02-07 Thread Axb

On 02/07/2014 09:03 AM, Olivier Nicole wrote:

I was considering, instead of plainly dropping the phishing
emails, why not deceiving it: having automatic replys with
invalid informations.

I guess that people who launch phishing campaings get few
answers, but the answers they get are correct, the username and
password match. What would happen if they gey thousands of
answers that are mostly incorrect? They would have to waste time
and resources to check every answer.


Phishing campaigns don't usually expect a reply, they want you to
fill in your data into a web form on either a dedicated or exploted
web site.


By reply I don't mean mail reply, but automatically filling their
web form with garbage.



Don't underestimate the talent behind phishes. Although their msgs
sometimes are so badly translated between languages they've become fun 
to read, the backend remains effective. Enough ppl still fall for

them.

They can easily discern from garbage and usefull data,programatically,
and in the worst of cases, there's LOTS of cheap  Cloud Based Manpower
On Demand to do it for them.







Re: regexp for SMTP AUTH

2014-02-07 Thread Matus UHLAR - fantomas

header MY_AUTH ALL =~ /\(authenticated
bits=\d+\)\s+by\s+myserver.mydomain.at/



On 31.01.14 16:58, Rainer Fügenstein wrote:

thanks. looks plausible, but doesn't work, unfortunately. I figured out
that rules matching the first line work, but rules for lines 2+ never
match, regardless of \n \s etc.



On Thu, 6 Feb 2014, Matus UHLAR - fantomas wrote:

isn't this the first Received: header? spamd may not receive it when MTA
first transfers message to SA and THEN adds the Received: header...
e.g. milter behaves like this


On 06.02.14 13:52, David B Funk wrote:

Any worthwhile milter for SA needs to syntesize a Received: header to mimic
what the MTA will add to the processed message. Problem can be with the accuracy
of that syntesized header. If the milter author didn't know to check the auth
status of the message s/he may not have added a representation of it to the
header passed on to SA thus SA had no way to know that the message was authed.
(seem to remember this exact issue with an early incarnation of
'spamass-milter' ).


This was the point. If the line that should be matched with the rule is the
first one, AND the check is done before MTA adds Received: line (which is
case when the milter is used), this is an issue of the intermediate program
that feeds mail to spamassassin.

Now, Rainer, can you confirm this is the case?
--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Support bacteria - they're the only culture some people have. 


Re: Who wants to trade data?

2014-02-07 Thread Benny Pedersen

On 2014-02-06 23:41, Marc Perkel wrote:

I have 700,000 IP addresses of hackers trying to send email using
stolen authentication. Anyone interested?

http://ipadmin.junkemailfilter.com/auth-hack.txt


q: how many is listed in spamhaus pbl ?
q: is dnswl filtered out ?

or is the list just auth fooled users ?

if there dns service is unstable how can you verify its not stolen ?

q: would you provide the list for xtables_addons geoip in csv formated 
list ?


this could then be used to create A0 country codes or another that is 
not used in geoip


the last question is here since it would be lowmem and not hard to do 
:=)


Re: Who wants to trade data?

2014-02-07 Thread Benny Pedersen

On 2014-02-07 01:33, Noel Butler wrote:

else we'd have seen a url in one of his posts
advertising it, therefore can be considered UCE


agree if its free to download its not spam, i just think its the grey 
zone here


Re: Who wants to trade data?

2014-02-07 Thread Neil Schwartzman
On Feb 7, 2014, at 6:08 AM, Benny Pedersen m...@junc.eu wrote:

 On 2014-02-07 01:33, Noel Butler wrote:
 else we'd have seen a url in one of his posts
 advertising it, therefore can be considered UCE
 
 agree if its free to download its not spam, i just think its the grey zone 
 here


Sorry, no. The cost of a payload isn’t relevant to the determination is 
something is spam. Spam is unsolicited and (generally) bulk. I am offered 
‘free’ subscriptions to things all the time, by spam. 

That said, i think someone offering anti-spam data to an anti-spam list is 
*collegial*, not spam, and the fact that it is free is even more collegial.




Re: New expensive Regexps

2014-02-07 Thread Torge Husfeldt

Am 07.02.2014 07:09, schrieb Axb:

On 02/07/2014 03:04 AM, Kevin A. McGrail wrote:

On 2/6/2014 8:32 PM, Dave Warren wrote:

On 2014-02-06 17:17, John Hardin wrote:

On Thu, 6 Feb 2014, Kevin A. McGrail wrote:


I've discussed it with Alex a bit but one of my next ideas for the
Rules QA process is the following:

- we measure and report on metrics for the rules that are promoted
such as rank (existing), computational expense, time spent on rule.


I assume meta rules would combine the expense of their components?

Sounds interesting!



How about if one or more components were called more by more than one
meta-rule? It's perhaps not entirely fair to divide it evenly, since
that might imply that removing the metarule would kill off that CPU
usage.

Without triple checking the code, my 99.9% belief is Rules are cached.
Calling them multiple times does not trigger a re-check.


duplicate rules only get loaded once, it only costs time/cpu cycles 
so the fewer duplicates we have the faster we start a spamd or load 
rules when running spamasassin.


see begimning of output when during spamassassin --lint -D rules



Hi list,

I hope I triggered a constructive and useful discussion here.
In between I realized my data was skewed and I wanted to apologize for that.
The peak in load happened when I rolled out the rule-set which was 
running fine on one machine to the whole cluster of 4.
I immediately blamed it on the upstream changes (sa-update) which I 
recklessly incorporated last minute.
It turns out that I would have run into the same problems with the 
thoroughly tested ruleset without the updates.
The reason is that the load-balancing used in this scenario is dynamic 
and not round-robin as I assumed, so the other servers took the load of 
the one being tested :(


That being said, it would obviously be a great improvement if I could 
assess the impact of a specific ruleset before I start using it on live 
data (~40M/d).



--
Torge Husfeldt

Senior Anti-Abuse Engineer
Zentrales Abuse-Department (11 GMX Web.de)

11 Internet AG | Brauerstraße 50 | 76135 Karlsruhe | Germany
Phone: +49 721 91374-4795 | Fax: +49 721 91374-2982
E-Mail: torge.husfe...@1und1.de | Web: www.1und1.de

Hauptsitz Montabaur, Amtsgericht Montabaur, HRB 6484

Vorstand: Ralph Dommermuth, Frank Einhellinger, Robert Hoffmann, Andreas 
Hofmann, Markus Huhn, Hans-Henning Kettler, Uwe Lamnek, Jan Oetjen, Christian 
Würst
Aufsichtsratsvorsitzender: Michael Scheeren

Member of United Internet

Diese E-Mail kann vertrauliche und/oder gesetzlich geschützte Informationen 
enthalten. Wenn Sie nicht der bestimmungsgemäße Adressat sind oder diese E-Mail 
irrtümlich erhalten haben, unterrichten Sie bitte den Absender und vernichten 
Sie diese E-Mail. Anderen als dem bestimmungsgemäßen Adressaten ist untersagt, 
diese E-Mail zu speichern, weiterzuleiten oder ihren Inhalt auf welche Weise 
auch immer zu verwenden.

This E-Mail may contain confidential and/or privileged information. If you are 
not the intended recipient of this E-Mail, you are hereby notified that saving, 
distribution or use of the content of this E-Mail in any way is prohibited. If 
you have received this E-Mail in error, please notify the sender and delete the 
E-Mail.



Re[2]: regexp for SMTP AUTH

2014-02-07 Thread Rainer Fügenstein

MUf This was the point. If the line that should be matched with the rule is the
MUf first one, AND the check is done before MTA adds Received: line (which is
MUf case when the milter is used), this is an issue of the intermediate program
MUf that feeds mail to spamassassin.

MUf Now, Rainer, can you confirm this is the case?

what I can tell is the following:
- spamass-milter 0.3.1 is in use. this seems to be the most current
version.
- if I understand this conversation correctly: the line

 Received: from [192.168.5.238] (xyz.example.com [90.217.201.80])

has already been passed to spamassassin (or been virtually created
when the regex rules are applied, but the following lines

 (authenticated bits=0)
 by myserver.mydomain.at (8.13.8/8.13.8) with ESMTP id s0VEsVIv028654
 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO)

haven't. does this make sense? is this how SA is implemented?

I'll enable spamass-milter debug output and see if I can make any
sense of it.


cu


--- NOT sent from an iPhone