Re: Bitcoin ransom mail

2019-12-10 Thread Giovanni Bechis
On 12/11/19 6:21 AM, KADAM, SIDDHESH wrote:
> Hi PFA...
> 
> On 12/11/2019 12:36 AM, Giovanni Bechis wrote:
>> On 12/10/19 7:49 PM, Michael Storz wrote:
>> [...]
>>> My copy hit
>>>
>>> BODY_SINGLE_WORD=1.347, HTML_IMAGE_ONLY_04=1.172, MPART_ALT_DIFF=0.79
>>>
>>> not enough to mark it as spammy.
>
FuzzyOcr + bayes is killing this kind of emails for me:

 5.0 FUZZY_OCR  BODY: Mail contains an image with common spam text
inside
[Words found:]
["cialis" in 2 lines]
[(2 word occurrences found)]

   Giovanni



Re: SA memory (Re: ".*" in body rules)

2019-12-10 Thread RW


> hmmm, the machine has 4G of RAM and SA now takes 4.5. 
> The check rund out of time but produces ~450K debug file.
> 
> This is where it hangs:
> 
> Dec 10 17:43:51.727 [9721] dbg: bayes: tokenized header: 211 tokens

What are the full counts if you put it through 'grep tokenized'




Re: Bitcoin ransom mail

2019-12-10 Thread Giovanni Bechis
On 12/10/19 7:49 PM, Michael Storz wrote:
[...]
> My copy hit
> 
> BODY_SINGLE_WORD=1.347, HTML_IMAGE_ONLY_04=1.172, MPART_ALT_DIFF=0.79
> 
> not enough to mark it as spammy.
> 
>
could you share a spample (as a pastebin uri or in private) ?

 Giovanni


Re: Bitcoin ransom mail

2019-12-10 Thread Michael Storz

Am 2019-12-10 19:03, schrieb Joseph Brennan:

A user here reported a new twist on the bitcoin ransom mail. New to
me, anyway.

From: Casper Mitten 
Sent: Monday, December 9, 2019 10:00 PM

The Subject was a single word, supposedly a password.

The message was a jpg picture of text.
Although it was in English, many vowels were accented special
characters.
The recipient was expected to scan a QR code in the picture to get the
bitcoin string!

I'm sending this purely for information. The user's report (as usual)
does not include headers so I don't know what scored. It must have hit
a rule for a message with no text and an image. There isn't much else
there.

--

Joseph Brennan
Lead, Email and Systems Applications



My copy hit

BODY_SINGLE_WORD=1.347, HTML_IMAGE_ONLY_04=1.172, MPART_ALT_DIFF=0.79

not enough to mark it as spammy.

Michael


Bitcoin ransom mail

2019-12-10 Thread Joseph Brennan
A user here reported a new twist on the bitcoin ransom mail. New to me,
anyway.

From: Casper Mitten 
Sent: Monday, December 9, 2019 10:00 PM

The Subject was a single word, supposedly a password.
The message was a jpg picture of text.
Although it was in English, many vowels were accented special characters.
The recipient was expected to scan a QR code in the picture to get the
bitcoin string!

I'm sending this purely for information. The user's report (as usual) does
not include headers so I don't know what scored. It must have hit a rule
for a message with no text and an image. There isn't much else there.


-- 
Joseph Brennan
Lead, Email and Systems Applications


Re: SA memory (Re: ".*" in body rules)

2019-12-10 Thread Matus UHLAR - fantomas

On Mon, Dec 09, 2019 at 10:54:00AM +0100, Matus UHLAR - fantomas wrote:

I'm afraid I can't provide clients' file.

I can only repeat:
- the mail is 20424329 bytes
- the mail contains single uuencoded .rar file inline.

-rw-rw-rw- 1 root root 14818832 Dec  9 10:50 'redacted.rar'

I have tried to run it again, it took about 20minutes to scan and memory
usage slowly increased up to:

 PID USER  PR  NIVIRTRESSHR S  %CPU  %MEM TIME+ COMMAND
1924 amavis20   0 3916332   2.8g   1468 D   1.0  72.2   3:08.08 spamassassin

note the "amavis" is the spamassassin command line client running under
amavis user to use amavis' bayes database:

amavis1924 24.8 72.9 3916332 2923964 ? D10:23   3:08 /usr/bin/perl 
-T -w /usr/bin/spamassassin -x

-rw--- 1 amavis amavis 10584064 Dec  9 10:45 bayes_seen
-rw--- 1 amavis amavis 10760192 Dec  9 10:45 bayes_toks

I have tried to attach the proces using strace, after a while it produced
output (only 2 rules hit), and exited.  I hope this didn't cause premature
exit of the SA client.


On 09.12.19 12:07, Henrik K wrote:

And what does running spamassassin debug directly from command line output?
Where does it hang?

spamassassin -t -D < message >/dev/null


hmmm, the machine has 4G of RAM and SA now takes 4.5. 
The check rund out of time but produces ~450K debug file.


This is where it hangs:

Dec 10 17:43:51.727 [9721] dbg: bayes: tokenized header: 211 tokens
Dec 10 17:50:16.111 [9721] info: check: exceeded time limit in 
Mail::SpamAssassin::Plugin::Check::_eval_tests_type11_prineg90_set3, skipping 
further tests

I guess it's just the slowness of bayes checking (haven't tried redis)

but It still doesn't explain why it takes that much RAM, does it?

I can try on machine with more RAM, hopefully it'll help.

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Silvester Stallone: Father of the RISC concept.


Re: txrep duplicated key with postgresql

2019-12-10 Thread Benny Pedersen

On 2019-12-09 22:52, Daniel J. Luke wrote:

I uploaded a patch for postgresql on
https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7218 a while ago -
but I haven't had time to clean it up into something that should be
included into a release.


added this patch, seem to solve it


It might serve as inspiration for someone else before I end up having
time to get to it, though.


indeed

now i just have to figure out why spamd gives diffrent results for dkim 
when fuglu runs in postfix prequeue setup, mybe mimedefang just works :/


hope for more begin using fuglu then thinks about better names for 
mimedefang with less wiki docs