Re: Spam from RCVD_IN_IADB (ISIPP/Surety Mail)

2014-02-17 Thread Joe Sniderman
On 02/17/2014 02:35 PM, Greg Troxel wrote:

> I have had a number of experiences complaining about spam from 
> whitelisted hosts, and (with the exception of hostkarma, which is not
> in the default ruleset) found many of my experiences to be
> unsatisfactory, to the point that they were escalated to publically
> discussing the issue.

Regarding this problem generally, yeah its an issue, especially with one
whitelist in particular, that is NOT the ISIPP/IADB.

Regarding ISIPP/IADB in particular, I'd be hard-pressed to call it a
whitelist. IMHO it would be more accurate to call it a combined
whitelist and blacklist... or a reputation list, or something.

For instance..

Per http://www.isipp.com/email-accreditation/list-of-codes/

A response of 127.3.100.100 means "The only email which comes from this
IP address is mailing list email, and that mailing list email is
entirely confirmed (double) opt-in"  I'd treat that response as a
whitelisting.

On the other hand, a response of 127.3.100.1 means "Scrapes addresses,
pure opt-out only" I'd tend to treat such a response as a blacklisting.

My understanding (which could be mistaken, and hopefully someone more
knowledgeable will chime in if I'm wrong) is that listees pay to be
listed, but they don't necessarily get to decide under what category.

Also, IIRC, by default only certain responses are treated by
spamassassin with negative points, certain other responses are treated
with adding postive pointage.

Now, with regards to the OP's spam sample, the IADB related tests that
fired were:
RCVD_IN_IADB_DK
In other words, sender uses DK or DKIM. Looks accurate to me.

RCVD_IN_IADB_DOPTIN_LT50
In other words, sender uses confirmed opt-in *LESS THAN HALF THE TIME*
Considering that the sender spammed the OP, this is probably accurate as
well.

RCVD_IN_IADB_LISTED
Ie, the sender is listed. Accurate by its very nature.

RCVD_IN_IADB_RDNS
Proper RDNS is set up. Again, looks to be accurate.

RCVD_IN_IADB_SENDERID
Uses sender ID. I didn't check, but wouldn't be surprised if this were true.

RCVD_IN_IADB_SPF
Since SPF_PASS also fired, this is probably accurate as well.

RCVD_IN_IADB_VOUCHED
AFAIK simply means that sender has been listed > 6 months, and its
practices are consistent with how its listed. Probably accurate.

Now, if they IP that sent the OP's spample were listed as using COI all
the time, then it would make sense to complain to SuretyMail about it so
the listing could be changed - but that is not how it is listed.

So, regarding ISIPP/IADB, I don't think the DNSxL operator is to blame
for any FNs, nor doing anything improper. Rather, I'd say maybe the
scoring defaults should be tweaked a little bit.

-- 
Joe Sniderman 


Re: How to get removed from spamcop?

2013-10-29 Thread Joe Sniderman
On 10/29/2013 12:19 PM, Benny Pedersen wrote:
> Marc Perkel skrev den 2013-10-28 22:06:
>> Just wondering if any real people are there or if it's totally
>> automated. They have several of our IP addresses listed and delisting
>> doesn't seem to work. We're a spam filtering company (Junk Email
>> Filter) and if we fail to block a spam it can appear we are the
>> source.
> 
> and ?, do you see your own logs who use spamcop.com as rbl ?
> 
> http://www.mywot.com/en/scorecard/spamcop.com
> 
> users of wot dont trust them

o rly:

https://www.mywot.com/en/scorecard/spamcop.net


-- 
Joe Sniderman 


Re: How to get removed from spamcop?

2013-10-28 Thread Joe Sniderman
On 10/28/2013 05:06 PM, Marc Perkel wrote:
> Just wondering if any real people are there or if it's totally 
> automated.

They have real people there.

> They have several of our IP addresses listed

Hmmm

> and delisting doesn't seem to work.

Strange

> We're a spam filtering company (Junk Email Filter) and if we fail to
> block a spam it can appear we are the source.

Are you positive that this is the cause of the listing, or just
speculating.  Also, do you only provide inbound filtering to your
customers, or outbound too?

If you only provide inbound, and your customers are rejecting mails
you've already accepted on their behalf (sounds like this may be the
case) do you then generate a bounce? Could some of those bounces be what
caused the listing in the first place?

Just throwing some ideas out there..


-- 
Joe Sniderman 


Re: SUBJ_ALL_CAPS

2013-08-20 Thread Joe Sniderman
On 08/20/2013 12:35 PM, Andrew Talbot wrote:
> Hey all -
> 
>  
> 
> Does anybody know how long the string needs to be to trigger SUBJ_ALL_CAPS?
> I know it has to be multi-word and over a certain length. Was wondering the
> specific length. Thanks in advance J 

IDK, but on an interesting side note, it appears your message did not
trigger the rule...

Subject: SUBJ_ALL_CAPS
X-ASF-Spam-Status: No, hits=1.5 required=10.0
tests=HTML_MESSAGE,RCVD_IN_DNSWL_LOW,SPF_PASS

Maybe a string of multiple words separated by underscores is not
considered multiword...

-- 
Joe Sniderman 


Re: Privacy Concerns and Implementing Corrective Proceedures To Combat Information Harvesting

2012-09-14 Thread Joe Sniderman
On 09/06/2012 12:40 AM, NMTUser X wrote:

> Would it be possible to send mail to myself encrypted in pgp/gpg, use a
> token at the beginning of the email with the correct email address (which
> is on the local network) have procmail or spamassassin parse all incoming
> messages, strip the headers, decrypt the message, and reinsert it into the
> mail spool to be forwarded to the correct person?

Possible? Sure.  Advisable? Maybe or maybe not.

Not sure I see what you are hoping to accomplish by doing so though..

If you want to keep the connection between your MUA and your MTA
encrypted, use TLS. If you don't trust CAs, create your own private CA.

Of course, none of this prevents spammers/list-brokers from obtaining
your address by means of dictionary attacks. Of course nor will
spamassassin (nor any filtering solution.)

> If so where do I begin to look?

> Could (gpgzip) attachments be preserved?

Probably.

> This would allow me to continue to use gpg I could ditch google and use ANY
> mail forwarding agent - even hushmail - and I could keep my professional
> life intact.

I'll take your word for it.

-- 
Joe Sniderman 


Re: Spamassassin detect my mails as spam

2012-02-24 Thread Joe Sniderman
On 02/24/2012 06:23 AM, Michelle Konzack wrote:
> In relation to the previous  poster  with  the  fetchmail  problem  (the
> receiver should hide fetchmail received header by adding "set invisible"
> in the "global" section) I have the probvlem, that receiving MTAs runing
> spamassassin consider my mails as spam du to the received headers...
> 
> Scenario:
> 
>   1)  My enterprise (exactly 5) has several internal subnets and  each
>   one is seperately protected by firewalls.
> 
>   2)  It is NOT possibel, to send mails to the internet trough 25/587
> 
>   3)  All mail must go via the INTRANET server which use a public relay
> 
> So, now if I send a mail it looks like
> 
>   a)  Workstation work1.intranet1.tamay-dogan.net (192.168.0.13)
>   b)  Intranet Server samba.intranet1.tamay-dogan.net (192.168.0.12)
> 
> now using auth-smtp (my fixed IP @office is 85.182.220.41  but  can  not
> have rDNS)
> 
>   c)  Public mail server mail.tamay-dogan.net (78.47.247.21)
>   d)  Receiving mail server

So far, so good.

> If now d) is runing spamassassin, thaen my messages are to 90% rejected.

Strange. What tests are firing?

> Is there a was to solv this?

Probably. First step is to find out what is causing it.

> Note:  I see, not all spamassassin setups rejecting my mails including
>my own one if it receive mails from others and same setup.

I'm not following..  Are you saying your SA setup is one of the setups
that does reject your mails, or are you saying your SA setup is one of
the setups that does not reject your mails?


FWIW, it looks as though the SA instance that apache is using in front
of the mailing list is *not* tagging your posts as spam:

X-ASF-Spam-Status: No, hits=-0.7 required=10.0
tests=RCVD_IN_DNSWL_LOW,SPF_PASS

HTH

-- 
Joe Sniderman 


Re: Getting high spam score for email server hosted on AWS instance

2012-02-09 Thread Joe Sniderman
On 02/10/2012 02:16 AM, Sharma, Ashish wrote:
> The cluster with which I am facing problem is different one.
> 
> The node for which I am getting high spam score has the following details:
> 
> cloudemail5.cpgtest.ostinet.net (184.72.247.145)

No other Received lines?


-- 
Joe Sniderman 


Re: Getting high spam score for email server hosted on AWS instance

2012-02-08 Thread Joe Sniderman
On 02/08/2012 12:22 PM, Joe Sniderman typed hurriedly:

> IOW, 196.254.0.0/16 no longer matches as of 3.3

Well, I meant to type 169.254.0.0/16... but then.. obvious typo is obvious.


-- 
Joe Sniderman 


Re: Getting high spam score for email server hosted on AWS instance

2012-02-08 Thread Joe Sniderman
On 02/08/2012 08:57 AM, Michael Scheidell wrote:
> On 2/8/12 6:41 AM, Sharma, Ashish wrote:
>> Hi,
>>
>> I have a mail server setup on an AWS instance.
>>
>> When I am sending mails via this setup to a test spamassassin setup
>> that acts as an email receiver server, I am getting high spam scores
>> as follows:
>>
>> [FROM_LOCAL_HEX=0.331, HTML_IMAGE_ONLY_24=1.282,  HTML_MESSAGE=0.001,
>> RCVD_ILLEGAL_IP=3.399, T_REMOTE_IMAGE=0.01, T_RP_MATCHES_RCVD=-0.01]
>> autolearn=no
>>
>>
>> As can be seen, the highest contributor is "RCVD_ILLEGAL_IP=3.399"
> no, since the ip address in question is, by definition, an unroutable
> ip, and should never be seen in a received list
> (I am just guessing:
> 
> Received: from G9W0725.americas.hpqcorp.net ([169.254.8.28]) by

That should not be a problem in and of itself...

169.254.0.0/16 is intended for link-local.. (see RFCs 5735 and 3330)

It might or might not be less than ideal to use addresses in
169.254.0.0/16 for the communication between one machine and a smarthost
on a LAN, but far from illegal.

169.254.0.0/16 is also notably *not* mentioned in the wiki for
RCVD_ILLEGAL_IP:

http://wiki.apache.org/spamassassin/Rules/RCVD_ILLEGAL_IP

All that said, RCVD_ILLEGAL_IP _used to_ hit on IPs 169.254.0.0/16, but
AFAIK that changed with 3.3.

See also:
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6460

And:
http://svn.apache.org/viewvc/spamassassin/branches/3.3/rules/20_head_tests.cf?view=markup#l423

# must keep it in sync with
http://www.iana.org/assignments/ipv4-address-space/
header RCVD_ILLEGAL_IP X-Spam-Relays-Untrusted =~ /
(?:by|ip)=(?=\d+\.\d+\.\d+\.\d+
)(?:0|2(?:2[4-9]|[3-5]\d)|192\.0\.2|198\.51\.100|203\.0\.113)\./
describe RCVD_ILLEGAL_IP Received: contains illegal IP address

IOW, 196.254.0.0/16 no longer matches as of 3.3

> You have a microsoft cluster, where microsoft thought it would be a good
> idea to use 169.254.0.0/16 ip addresses?)

Its really not that horrible an idea..

> Bring this up with microsoft, have them 'fix' this.

Or better yet, the OP should bring it up with whoever is running the
test spamassassin instance and get them to upgrade it.

-- 
Joe Sniderman 


Re: Detecting serious domains

2011-11-18 Thread Joe Sniderman
On 11/17/2011 10:27 AM, Marc Perkel wrote:
> I'm exploring a variety of ideas to determine the difference between
> "serious" domains down to throw away domains used by spammers. The ideas
> I'm presenting here are not complete but are just a conversation starter.

I'd think domain age would be biggest indicator of *not* being a
throw-away domain. IIRC you already track that in your own dns lists..

> for example, if the sending domain has no MX records of its own it is
> more likely spam that if there are 3 or more MX records that resolve to
> multiple IPs over more than one network. Generally spam only domains are
> minimally configured, and highly configured domains are not spam only. I
> also think that NS records might indicate that a domain is serious or not.

Maybe. Keep in mind that a throw-away domain might be purchased through
a registrar that provides email hosting, and might appear to be nicely
configured. Perhaps in combination with age, this could be a semi-useful
indicator.. ie, new domain, only one (implicit) MX, decent chance of
being a throw away. old domain, probably not a throwaway, new domain,
nicely configured is hard to tell though...

There also are free email hosting options that involve multiple MXs..
Put yourself in spammy's shoes for a moment... if you had a throwaway
domain would you host the incoming email on your own servers, or on
gmail apps? I'd choose gmail in heartbeat. Then again plenty of legit
domains use gmail too, so in and of itself its not a sign of seriousness
nor of lack thereof.

Regarding NS records, yeah there are some nameservers that seem to only
host bad domains, others that seem to only (or mostly) host good
domains, and then a whole bunch that host all kinds of domains.
Nameserver reputation might be a good track to follow IMHO.

If you're trying to predict how serious a newly registered domain is,
I'd look at the nameservers, and the whois.

Private registration, cheap registrar, cheap dns, brand new domain,
probably bad news until more info is available

Proper whois info, expensive registrar, expensive dns and/or dns with a
good reputation, brand new domain, far less suspicious.

Proper whois info, cheap registrar, expensive dns and/or dns with a good
a reputation, brand new domain, somewhere in the middle.

I'm just thinking "outloud" here, does this sound sensible to you?

> I think the serious scale could be a useful factor in SA. It doesn't
> determine if it's spam or ham in itself. Yahoo is a serious domain and
> there's lost of spam. Serious domains should not be blacklisted for
> example. We could also look for consistency. Bad RDNS from a serious
> domain might be a spam indicator.
> 
> There might be other methods of detecting serious domains. If they are
> using expensive services. Spammers would not have their dns hosted with
> Ultra DNS, or use the expensive registrars, or other services that are
> expensive.

Well, spammers might well use UltraDNS and/or expensive registrars, but
probably would only do so for their domains which they intend on keeping
long term, rather than ones they intend to throw away.

> Also - thinking we should slowly mine the whois database and provide
> some sort of DNS based lookup of whois information to be able to
> determine the registrar of a domain, the domain age, or other info that
> would be useful in determining that the domain is serious or not.

That is nothing new. Spam eating monkey AFAIK has some zones which tell
about privitized whois, age of registration, etc. You also have a zone
if I'm not mistaken that approximates how long ago a domain was first
seen (by your users) in email.  Some of the SORBS zones can also be used
in tandem with each other to extrapolate similar info.  Senderbase also
keeps tabs on history of domains as well as IPs..

Question becomes how to use the data in a way to approximate the
"seriousness" of the domain, and then how to use the approximated domain
"seriousness" to improve filtering. Two separate questions if you ask me.

> Who thinks I'm onto something?

I think you *might* be on to something, or might not.

Here's another thought off the top of my head: looking at nameservers
and calculating average age of domains hosted on the nameservers, as
well as the average length of time that the domains hosted on the
nameservers have been on those specific nameservers...

-- 
Joe Sniderman 


Re: Rule to match X-Spam-Flag

2011-06-09 Thread Joe Sniderman
On 06/09/2011 11:06 AM, Mark Martinec wrote:
> Benny,
> 
>>> As a workaround, you may add some header rewrite rule to your MTA
>>> which could rewrite a X-Spam-Flag to something else, like
>>> X-X-Spam-Flag.
>>
>> will not give invalid dkim ?
> 
> No, unless the X-Spam-Flag were signed, which is unlikely.

Even so, one could add (instead of rewriting) an X-X-Spam-Flag or
X-Original-Spam-Flag or whatever, while leaving the X-Spam-Flag intact
and in place. That way, even if for some reason the X-Spam-Flag were
signed, DKIM would be unaffected.  Or one could perform DKIM
verification first [1], then re-write the header, then pass the mail to
spamassassin.

[1] using opendkim or dkim-filter or whatever. not sure if spamassassin
will use that result or perform its own verification, but either way if
the goal is to tag, so what if spamassassin also sees a DKIM failure. if
humans want to know that it passed for whatever reason, the
authentication-results header would still be there.

-- 
Joe Sniderman 


Re: Yahoo sent 5.5x as much spam as any other legit provider in April

2011-05-11 Thread Joe Sniderman
On 05/11/2011 04:35 PM, Michael Scheidell wrote:

> if someone sends an email to 175 people, once they hit 'x' number in the
> first email attempt, we send '4xx too many emails'

> ie:
> ehlo *.yahoo.com
> mail from: 
> rcpt to: 
> 250 ok
> rcpt to: 
> 250 ok
> [skip to 100].
> rcpt to: 
> 4xx too many

We do something similar, except that the maximum number of recipients
per envelope we set at 1.  The second and all subsequent get a 4yz error
during RCPT. We perform this after greylisting, ie:

 ...
 RCPT TO:
 451 4.7.1 Greylisting in action
 RCPT TO:
 451 4.7.1 Greylisting in action

 ..some time later...
 RCPT TO:
 250 ok
 RCPT TO:
 451 4.7.1 One at a time please
 DATA

 ..after another retry..
 RCPT TO:
 250 ok
 DATA

Rationale being that content filtering during DATA can be customized on
a per recipient basis, without having to generate bounces after the fact
nor resorting to dropping emails silently.

> RFC'S seem to indicate that they should send a data command next and
> send the email to be delivered to the first 99, then try the next 51 on
> the next highest mx.

Or in our case, the first one, and retry for the next 149, get one more
out, retry for the next 148, and so on.  We do greylist, and Yahoo gets
a rather long default greylisting and very short AWL.

> doesn't happen on yahoo.com
> they drop the connection, and try again at next highest mx, then on mx4,
> bounce the email back to sender with the last mx's ip in the error
> message and the 4xx too many

Interesting. My experience has been that Yahoo does retry at the same MX
but will not go to the next MX in response to 4yx errors. (OTOH if the
connection times out they do go on the next MX)

-- 
Joe Sniderman 



Re: Yahoo sent 5.5x as much spam as any other legit provider in April

2011-05-11 Thread Joe Sniderman
On 05/11/2011 04:19 PM, dar...@chaosreigns.com wrote:
> I bet it's largely related to the fact that yahoo is apparently the only
> freemail provider that doesn't require you to have a previously existing
> email address.

Yahoo does not require an existing address.
Hotmail/MSN/Live does not require an existing address.
AOL/AIM does not require an existing address.
Gmail does not require an existing address. [1][2]
Mail.com does not require an existing address.
...
It seems GMX.com *does* require an existing address.  This appears to be
the exception rather than the rule.

> I also suspect that, for this reason, google.com would send less spam
> if they didn't allow yahoo addresses as the pre-existing address.

*If* Gmail were to require an existing address, prohibiting Yahoo
addresses *might* make sense.

[1] This seems to depend on the IP address used to sign up for the
google account. When signing up through a TOR exit node (at least at the
time that I tried it, which was > 1yr ago) Gmail asked for either a
cellphone number for text confirmation, or an existing email address.
Yahoo did not differentiate between TOR exit nodes and non-TOR IPs.

[2] Google apps accounts however do seem to require a preexisting email
address, however gmail addresses are accepted for that purpose.

-- 
Joe Sniderman 


Re: whitelist ip in trusted network

2011-05-06 Thread Joe Sniderman
On 05/06/2011 08:38 PM, Rajesh M wrote:
> hi
> 
> i wish to whitelist a few client's server's static ip in the spamassasin
> trusted network
> 
> i am entering a line like this in local.cf file.
> 
> trusted_networks xxx.yyy.zzz.ppp
> 
> if i do this then the email from this server ip should be given a negative
> score but it does not seem to work

No, it effects how SpamAssassin regards Received lines added by those
IPs. (ie, it causes SpamAssassin to trust that the Received line is not
forged)

You also might want to have a peek at:
http://wiki.apache.org/spamassassin/TrustedRelays
and
http://wiki.apache.org/spamassassin/TrustPath

> spamassassin does not work for any ip that i put here, even those ips of

does not work?

> my other servers are not trusted.

> It seems that spamassassin is simply not
> even looking at the trusted network ips ie it is disabled due to some
> reason

Or it could be that you are expecting trusted networks to act as a
whitelist, which is not its function.

> could you please help.

Perhaps easiest way: make a local dns whitelist of IPs to which you feel
your setup should apply a negative score, and then add some nice net
rules to go along with it.

Also, you might want to have a look at:
whitelist_from_rcvd , which is documented here:
http://spamassassin.apache.org/full/3.1.x/doc/Mail_SpamAssassin_Conf.html#whitelist_and_blacklist_options

Short version: Say your client is example.com and uses mail.example.com,
you could do:
whitelist_from_rcvd *@example.com mail.example.com

to give negative points to mail from example.com that you receive from
mail.example.com.

HTH.

-- 
Joe Sniderman 


Re: spamass-milter - mailing list

2011-01-25 Thread Joe Sniderman
On 01/25/2011 02:29 PM, JKL wrote:
> Hi there,
> 
> Is there a mailing list specifically for problems arising from
> spamass-milter?

There is a spamass-milter mailing list, yes:
http://lists.nongnu.org/mailman/listinfo/spamass-milt-list

HTH

-- 
Joe Sniderman