Re: MSBL Email Blocklist (EBL) SA usage query

2017-11-24 Thread Andreas Schamanek

> Upgrade SA and that should fix it. 

My servers run Debian 8 with SA 3.4.0 + perl 5.20. I still get

Nov 24 06:47:41.209 [12603] warn: Use of uninitialized value in regexp
compilation at /etc/spamassassin/HashBL.pm line 52.

Is 3.4.1 the minimum?

-- 
-- Andreas

:-)



Re: spamcop spamassassin reporting

2013-07-20 Thread AndreaS Schamanek
Giles Coochey wrote:
> Is there a current issue with reporting to spamcop?

I had problems, too. Though, in my case I just got a warning message on the
Spamcop web interface saying that messages sent to me were bouncing with
"5.1.0 - Unknown address error" which was very probably due to problems on
Spamcop's side. I don't know more, though.

-- 
-- Andreas




--
View this message in context: 
http://spamassassin.1065346.n5.nabble.com/spamcop-spamassassin-reporting-tp105878p105885.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.


Re: Spam via whitelists

2013-07-03 Thread AndreaS Schamanek
Matthias Leisi wrote
> On Tue, Jul 2, 2013 at 7:09 PM, Andreas Schamanek
> <

> schamane@.ac

> > wrote:
> 
>> 2) ... mail servers (tu-graz.ac.at and ethz.ch are 2 examples) who
>> forward their former users' mail to external addresses without prior
>> filtering. ... They are whitelisted (in this case by JMF-WHITE and
>> DNSWL_MED)
>> which (would) lead to false negatives. Moreover, it renders our
>> statistical analyses useless for their IPs.
> 
> Put such sources in SA's trusted_networks. This also ensures that
> blacklists (and whitelists) are applied to the IPs delivering to these
> forwarding systems.

Thanks, I didn't think about adding these sources to trusted_networks.
It works (mostly), however it fixes only the SA part of the problem. I still
think that spam must not be sent, ever. And that whitelists shouldn't list
relaying IPs :/

Anyway, using trusted_networks I found that it doesn't work fully unless I
manage to list their complete mail infrastructure. I didn't know that IPs
from trusted_networks can actually be subject to evals. For instance:

  trusted_networks 82.130.75.186 82.130.99.26 129.132.202.4 129.132.183.133

still checks (and whitelists) 82.130.75.186 in case of

Received: from tuvok.kom.tuwien.ac.at (tuvok.kom.tuwien.ac.at
[192.35.241.66])
by mail.fam.tuwien.ac.at (8.14.3/8.14.3/Debian-9.4) with ...
Received: from edge20.ethz.ch (edge20.ethz.ch [82.130.99.26])
by tuvok.kom.tuwien.ac.at (8.14.5/8.14.5) with ...
Received: from CAS10.d.ethz.ch (172.31.38.210) by edge20.ethz.ch
  (82.130.99.26) with Microsoft SMTP Server ...
Received: from edge10.ethz.ch (82.130.75.186) by CAS10.d.ethz.ch
  (172.31.38.210) with Microsoft SMTP Server ...
Received: from phil4.ethz.ch (129.132.183.133) by edge10.ethz.ch
  (82.130.75.186) with Microsoft SMTP Server ...
Received: from [65.59.210.13] (helo=mail2.soforum.com)  by phil4.ethz.ch
with
  esmtp (Exim 4.69) ...

Only if I also add 172.31.38.210 (private address from a reserved block) it
works as I expected it.

Looks like I will use trusted_networks to save some CPU cycles but I'll also
keep my meta rules.

-- 
-- Andreas




--
View this message in context: 
http://spamassassin.1065346.n5.nabble.com/Spam-via-whitelists-tp105635p105643.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.


Spam via whitelists

2013-07-02 Thread Andreas Schamanek

Hi SA fellows,

I sometimes disagree with whitelists such as DNSWL_MED, 
chaosreigns.com/iprep/ or JMF-WHITE. There are 2 main issues:

1) Less often recently, but I did see freemail MTA IPs from Google, 
Yahoo! and other big players showing up on whitelists. Considering the 
amount of spam coming in from the networks of Google and Yahoo! I 
definitely do not want their IPs on whitelists, ever.

2) What's currently more annoying are colleagues of mine operating 
large mail servers (tu-graz.ac.at and ethz.ch are 2 examples) who 
forward their former users' mail to external addresses without prior 
filtering. Thus, we see spam coming from their (otherwise) trustworthy 
network. They are whitelisted (in this case by JMF-WHITE and DNSWL_MED)
which (would) lead to false negatives. Moreover, it renders our 
statistical analyses useless for their IPs.

There might be legal requirements explaining why they do forward spam. 
However, I still don't agree with the whitelists, then.

For now, there are not that many cases, so I can work around them 
manually. Basically, I am using

header __AS_FROM_2BIG   Received =~ /\.(obsmtp|google|mac|yahoo)\.com/
header __AS_FROM_WHITE  Received =~ /\.(tu-graz\.ac\.at|ethz\.ch)/
meta  AS_DNSWL_NEUTRAL  (RCVD_IN_DNSWL_MED && (__AS_FROM_2BIG || 
__AS_FROM_WHITE))
meta  AS_IPREP_NEUTRAL  (RCVD_IN_IPREPDNS_100 && (__AS_FROM_2BIG || 
__AS_FROM_WHITE))
meta  AS_JMFW_NEUTRAL   (RCVD_IN_JMF_W && (__AS_FROM_2BIG || __AS_FROM_WHITE))

Any better ideas? Should I file complaints? Simply report my 
colleagues MTAs? 

-- 
-- Andreas

   :-)