[OT] Odd spammer tactic?

2008-07-21 Thread Christopher Bort
This is really not a SpamAssassin issue, but since this list is 
populated by people who are interested in spammer behavior, I'm 
throwing it out for comment. If it's too far off topic, my 
apologies and I'll let it go at that.


At $DAYJOB I run a mail server and a name server for several 
domains, both our own and for clients. At home, I run a mail 
server and a name server for a couple of personal domains. The 
home name server is a slave for most of the domains hosted at 
$DAYJOB. The home mail server is _not_ configured to handle mail 
for any of the $DAYJOB domains and it is _not_ an MX for any of 
those domains. The only connection is that it is an NS for the 
$DAYJOB domains. These domains _do_ have $DAYJOB mail server as 
their MX.


For a while now, I've been seeing attempts to send mail to the 
home server for addresses in $DAYJOB domains. This is not a 
problem since the volume is low and they are being properly 
rejected as third-party relay attempts (authentication required 
- relay not permitted). However, the fact that someone is 
apparently trying to send mail to an NS instead of an existing 
MX has piqued my curiosity. It looks like it's all spam (the 
sender addresses tend to support that). So, has anyone else seen 
this sort of behavior and what could be the rationale for trying 
to deliver mail to an NS like this?


--
Christopher Bort
[EMAIL PROTECTED]
http://www.thehundredacre.net/



Re: [OT] Odd spammer tactic?

2008-07-21 Thread Christopher Bort

On 07/21/08 13:04, [EMAIL PROTECTED] (mouss) wrote:


Christopher Bort wrote:


For a while now, I've been seeing attempts to send mail to the 
home server for addresses in $DAYJOB domains. This is not a 
problem since the volume is low and they are being properly 
rejected as third-party relay attempts (authentication 
required - relay not permitted). However, the fact that 
someone is apparently trying to send mail to an NS instead of 
an existing MX has piqued my curiosity. It looks like it's all 
spam (the sender addresses tend to support that). So, has 
anyone else seen this sort of behavior and what could be the 
rationale for trying to deliver mail to an NS like this?


it's the same as port scans. they look for open relays. they don't
care if the host is an MX, an NS, a www or anything. they just connect
to the IP and try to relay. I've seen this on hosts that nobody
should have known about.


But they don't seem to be randomly looking for any open relay. 
If they were just looking for open relays, wouldn't you expect 
to see domains in the recipient addresses that have no 
connection whatsoever with the target machine? In all of the 
relay attempts I'm seeing on this mail server, the recipient 
addresses are in domains for which the server is an NS. I don't 
see any relay attempts where that is not true which implies, I 
think, that they do care that it's an NS. It seems like they're 
looking for hosts that will deliver|relay messages for specific 
domains, so why don't they just use the existing MX rather than 
trying an NS host with which there's no reasonable expectation 
that it will relay for the target domain? I suppose they could 
be looking for back doors, but that seems like it would be a 
very low probability undertaking.



On the other hand, I also see attempts to connect to A hosts (thus
ignoring MX definitions) and to old MXes. This is different as there
is no relay attempt.


The RFCs allow for A hosts to be tried in the absence of MX 
records, so there is some rationale for that, however weak it 
may be.


--
Christopher Bort
[EMAIL PROTECTED]
http://www.thehundredacre.net/



Re: [OT] Odd spammer tactic?

2008-07-21 Thread Christopher Bort

On 07/21/08 14:09, [EMAIL PROTECTED] (Bob Proulx) wrote:


Christopher Bort wrote:

In all of the relay attempts I'm seeing on this mail server, the
recipient addresses are in domains for which the server is an NS.


They are looking for any connection possible.  A nameserver is an
association.  They will hope that perhaps it allows mail.  Unlikely to
the extreme but not inconceivable.


I think, that they do care that it's an NS. It seems like they're
looking for hosts that will deliver|relay messages for specific
domains, so why don't they just use the existing MX rather than
trying an NS host with which there's no reasonable expectation that
it will relay for the target domain?


You are trying to apply logic to a situation to which no reason can be
applied.  Spammers do not operate with a sanity of reason and logic.
There is intelligence.  But bludgeoning others for their own gain only
makes sense to them and not to members of society.


True enough. I suppose it's a good thing that I'm not entirely 
able to think like a spammer.  ;-)



I suppose they could be looking for back doors, but that seems like
it would be a very low probability undertaking.


Spammers base their existence upon extremely low probabilities
multiplied by very large numbers of messages.


True again. Your comments essentially reflect my own assessment, 
but I was curious enough about it to bring it up on a list like 
this one to see if I was missing some twist that would make an 
iota of sense, but I guess not. I'll let it go now.  8^)  Even 
though there's no actual problem, it's still a low grade 
irritant to me that someone out there is stupid enough to bang 
their head against this wall.


--
Christopher Bort
[EMAIL PROTECTED]
http://www.thehundredacre.net/



VBounce FPs

2008-06-30 Thread Christopher Bort
Neither of the two messages at http://pastebin.com/m76e8b461 
are bounce messages. They're both legitimate messages from the 
CommuniGate Pro mailing list, yet they both hit 
ANY_BOUNCE_MESSAGE and BOUNCE_MESSAGE. Comments?


--
Christopher Bort
[EMAIL PROTECTED]
http://www.thehundredacre.net/



Re: VBounce FPs

2008-06-30 Thread Christopher Bort

On 06/30/08 10:46, [EMAIL PROTECTED] (Matus UHLAR - fantomas) wrote:


On 30.06.08 09:55, Christopher Bort wrote:
Neither of the two messages at http://pastebin.com/m76e8b461 
are bounce messages. They're both legitimate messages from the 
CommuniGate Pro mailing list, yet they both hit 
ANY_BOUNCE_MESSAGE and BOUNCE_MESSAGE. Comments?


The From: is set to postmaster whcih is a generic catch-all. The envelope
from may be set to the same:

From [EMAIL PROTECTED] Mon Jun 30 06:45:22 2008
Return-Path: [EMAIL PROTECTED]
Reply-To: CommuniGate Pro Discussions [EMAIL PROTECTED]
Sender: CommuniGate Pro Discussions [EMAIL PROTECTED]
To: CommuniGate Pro Discussions [EMAIL PROTECTED]
From: Postmaster [EMAIL PROTECTED]

...all possible addresses but From are set to
[EMAIL PROTECTED] and envelope from. This of needs fixing but
I'd say the admin of the machine should allow CommuniGate Pro set
proper envelope from address...


Thanks for your response, Matus. I've passed it along to the 
CGate Pro list's admin address, for what it's worth.  8^)


--
Christopher Bort
[EMAIL PROTECTED]
http://www.thehundredacre.net/



Re: VBounce FP

2008-05-19 Thread Christopher Bort

On 05/19/08 03:53, [EMAIL PROTECTED] (Justin Mason) wrote:


Christopher Bort writes:

On 05/17/08 01:11, [EMAIL PROTECTED] (Justin Mason) wrote:


Stefan Jakobs writes:

On Friday 16 May 2008 20:45, Christopher Bort wrote:

The message at http://pastebin.com/m42c297fd[1] hit
ANY_BOUNCE_MESSAGE and BOUNCE_MESSAGE despite the host that sent
it (mailgw02.wolfnettech.com) being listed in my
whitelist_bounce_relays. What might I have (?:missed|not
understood) about VBounce?


Christopher --

what are your whitelist_bounce_relays, trusted_networks and
internal_networks set to?


whitelist_bounce_relays mail.homes-magazine.com
whitelist_bounce_relays mailgw02.wolfnettech.com
whitelist_bounce_relays levit.reacheach1.com
whitelist_bounce_relays smtp*.blackberry.com
whitelist_bounce_relays *.tcsn.net

trusted_networks66.224.197.128/27
internal_networks   66.224.197.156
internal_networks   66.224.197.130


the sample doesn't fire those rules.  I presume it's incomplete --
it seems to be missing hte bounced message part, which is key!


Yes. As stated in my original message, pastebin blocked the 
complete message as spam, so I posted it without the bounced 
message part.



Can you share a complete sample that displays the problem?


Attached.

--
Christopher Bort
[EMAIL PROTECTED]
http://www.thehundredacre.net/


Undelivered_Mail_Returned_to_Sender
Description: Binary data


Re: VBounce FP

2008-05-19 Thread Christopher Bort

On 05/19/08 15:16, [EMAIL PROTECTED] (Justin Mason) wrote:


Can you share a complete sample that displays the problem?


Attached.


Thanks -- it looks like a bug.  I've opened 
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=5912 for it.


Thank you, I look forward to its resolution.  8^)

--
Christopher Bort
[EMAIL PROTECTED]
http://www.thehundredacre.net/



Re: VBounce FP

2008-05-18 Thread Christopher Bort
On 05/17/08 01:11, [EMAIL PROTECTED] (Justin Mason) wrote:

 Stefan Jakobs writes:
  On Friday 16 May 2008 20:45, Christopher Bort wrote:
   The message at http://pastebin.com/m42c297fd[1] hit
   ANY_BOUNCE_MESSAGE and BOUNCE_MESSAGE despite the host that sent
   it (mailgw02.wolfnettech.com) being listed in my
   whitelist_bounce_relays. What might I have (?:missed|not
   understood) about VBounce?
 
 Christopher --
 
 what are your whitelist_bounce_relays, trusted_networks and
 internal_networks set to?

whitelist_bounce_relays mail.homes-magazine.com
whitelist_bounce_relays mailgw02.wolfnettech.com
whitelist_bounce_relays levit.reacheach1.com
whitelist_bounce_relays smtp*.blackberry.com
whitelist_bounce_relays *.tcsn.net

trusted_networks66.224.197.128/27
internal_networks   66.224.197.156
internal_networks   66.224.197.130

-- 
Christopher Bort
[EMAIL PROTECTED]
http://www.thehundredacre.net/



VBounce FP

2008-05-16 Thread Christopher Bort
The message at http://pastebin.com/m42c297fd[1] hit 
ANY_BOUNCE_MESSAGE and BOUNCE_MESSAGE despite the host that sent 
it (mailgw02.wolfnettech.com) being listed in my 
whitelist_bounce_relays. What might I have (?:missed|not 
understood) about VBounce?



[1] The portion of the message that shows the original (bounced) 
message was blocked by pastebin as spam, so I've posted just the 
headers and body of the bounce message.


--
Christopher Bort
[EMAIL PROTECTED]
http://www.thehundredacre.net/



Re: No URIBL after upgrade to 3.2.4

2008-02-07 Thread Christopher Bort

On 02/04/08 16:33, [EMAIL PROTECTED] (Daryl C. W. O'Shea) wrote:


Christopher Bort wrote:
I have recently upgraded a SpamAssassin installation from 
3.2.1 to 3.2.4. Since then URIBL hits have dropped to nearly 
zero, where before there were several hundred per day. 
Immediately after the upgrade, there were a handful of hits on 
URIBL_BLACK, but I have not seen any at all in the last few 
days. No configs have been changed with the upgrade, but 
sa_update is run nightly via cron.


Run a message that you expect an URIBL hit on through spamassassin -D
and look at the debug output to find out what is going on.


Curious. A message that was run through SA by my mail server's 
helper without hits on any URIBL or RAZOR2 rules gets hits on 
multiple URIBL and RAZOR2 rules when fed to spamassassin -D 
manually. I will look into the possibility that the server's 
helper program is either misconfigured or is doing something 
wrong. Whatever it is doesn't seem terribly consistent at this 
point, though, because I continue to get plenty of RAZOR2 hits 
and a small handful of URIBL hits. At any rate, it warrants 
further investigation...


Thank you for your help.

--
Christopher Bort
[EMAIL PROTECTED]
http://www.thehundredacre.net/



No URIBL after upgrade to 3.2.4

2008-02-04 Thread Christopher Bort
I have recently upgraded a SpamAssassin installation from 3.2.1 to 
3.2.4. Since then URIBL hits have dropped to nearly zero, where before 
there were several hundred per day. Immediately after the upgrade, there 
were a handful of hits on URIBL_BLACK, but I have not seen any at all in 
the last few days. No configs have been changed with the upgrade, but 
sa_update is run nightly via cron. The upgrade was done with CPAN, after 
first making sure that all relevant Perl modules were up to date. Google 
doesn't show me anything about problems with URIBL and SA 3.2.4, so I'm 
inclined to think there's a problem with my particular installation. 

I'm getting hits on Razor rules, so other network checks are working, 
and I do have 'loadplugin Mail::SpamAssassin::Plugin::URIDNSBL' in my 
init.pre. I'm not sure where to look next and I'd be grateful to be 
pointed in the right direction.