Re: Would anyone be interested in a SA enhancing service?

2017-09-22 Thread Luis E. Muñoz


Mark,

This certainly does not add confidence in the "techniques no one else is 
using":


```
⋮
  supp...@junkemailfilter.com
host darwin.ctyme.com [184.105.182.171]
SMTP error from remote mail server after end of data:
550-FAKE-REJECT - TLD-FROM [click] is blocked - X=darwin
⋮
```

Best regards

-lem

On 22 Sep 2017, at 8:40, Marc Perkel wrote:

This is something I'm thinking about doing - providing a service that 
integrates into SA as a plug in and communicates with my servers to 
return a useful score enhancer.


If there is interest my initial demo test will be just stuffing the 
subject line into a IP/port and returning a number where positive is 
spam and negative is ham. This would just be a proof of concept.


The next level would be sending the message headers and eventually - 
the full message.


Would need someone to write a simple plugin - not a perl guy - but how 
hard can that be? Would eventually need to be encrypted though.


Starting with just the subject won't return a result all the time. 
Many request will return a 0 if it can't figure it out. If it does 
return a result that is significantly away from 0 it's probably right. 
And it is more likely to return a result from ham than spam confirming 
good email as good. Obviously - using the header and then the whole 
message will be more accurate.


I'm using new techniques no one else is using.

So - any interest?

--
Marc Perkel - Sales/Support
supp...@junkemailfilter.com
http://www.junkemailfilter.com
Junk Email Filter dot com
415-992-3400


Re: Would anyone be interested in a SA enhancing service?

2017-09-22 Thread Luis E. Muñoz

On 22 Sep 2017, at 10:43, John Hardin wrote:

He was only proposing the subject. Essentially it sounds like a 
subjectBL service.


In the same message he said

"The next level would be sending the message headers and eventually - 
the full message."


Best regards

-lem


Re: URI parser problems

2017-12-05 Thread Luis E. Muñoz

On 5 Dec 2017, at 14:59, John Hardin wrote:

How often would we see a valid registered domain name like "x.info" 
for example?


This is not as rare as you would think. Those names are more expensive, 
but not insanely so.


https://uniregistry.link/premium-domain-names/

Best regards

-lem


Re: IADB whitelist - again

2018-03-01 Thread Luis E. Muñoz

On 1 Mar 2018, at 10:29, Sebastian Arcus wrote:

I know I have brought up this issue on this list before, and sorry for 
the persistence, but having 7 different rules adding scores for the 
IADB whitelist still seems either ridiculous, or outright suspect:


(Disclaimer, I have inner visibility into IADB and its processes)

I'm sorry, but it only seems "ridiculous" if you don't know how IADB 
works. Hopefully the details below will be helpful to assuage your 
worries.



-0.2 RCVD_IN_IADB_RDNS  RBL: IADB: Sender has reverse DNS record
 [199.127.240.84 listed in iadb.isipp.com]
-0.1 RCVD_IN_IADB_SPF   RBL: IADB: Sender publishes SPF record
-0.1 RCVD_IN_IADB_OPTIN RBL: IADB: All mailing list mail is opt-in
-0.0 RCVD_IN_IADB_SENDERID  RBL: IADB: Sender publishes Sender ID 
record

-0.0 RCVD_IN_IADB_LISTEDRBL: Participates in the IADB system
-0.1 RCVD_IN_IADB_DKRBL: IADB: Sender publishes Domain Keys 
record
-0.1 RCVD_IN_IADB_VOUCHED   RBL: ISIPP IADB lists as vouched-for 
sender


It really raises some very uncomfortable questions regarding the 
impartiality of SA and/or its anti-spam capabilities.


IADB provides a number of "signals" associated with the (vetted) 
practices of senders participating in its certification program. The 
purpose of the DNS data is to allow receivers to use those signals to 
augment their local anti-spam systems or to tweak the rules that are 
applied for filtering.


Claiming that IADB is an "anti-spam" resource is inaccurate, as this is 
not its intended purpose.


Rather, IADB allows for more precise filtering. Something that is also 
indirectly achieved, is that complaints sent to IADB's administration 
are escalated, researched and tracked until resolution, which can (and 
has!) include termination of the accreditation in the IADB.


And by the way, this message is definitely unsolicited, and in now way 
we gave any sort of permission or consent to this company or its 
"affiliates" to email us - so the whole "All mailing list mail is 
opt-in" is nonsense.


Then by all means, include ab...@isipp.com in your complaint -- They'll 
follow up with their customer and if applicable revoke their IADB 
membership. This is no different from an ESP sending to an "imported" 
email address. A complaint would be more helpful than this posting, as 
it would provide for more data to track the actual campaign that caused 
the issue, again, much like in the case of an ESP.


From memory, I haven't seen a single complaint against the organization 
199.127.240.84 is accredited under in more than two years.


And why have "Sender has reverse DNS record" and "Sender publishes SPF 
record" as separate IADB rules - when SA itself already checks for 
these? Isn't this just a glaring way of pumping up SA scores for the 
IADB subscribers?


In this case the IADB is confirming that at the time of their customer's 
accreditation, he claimed that his IP address should always have a valid 
rDNS and be covered by a valid SPF record. I happen to know of receivers 
that use lack of SPF/rDNS + these IADB records to bounce email.


As I'm sure it was mentioned before, the default scores are (or try to 
be) a balance useful for general cases. I've been running with defaults 
for these particular rules for years with no ill effect.


Best regards

-lem


Re: Can't Get Removed From List

2018-03-01 Thread Luis E. Muñoz

On 1 Mar 2018, at 11:54, Miles Fidelman wrote:
[...] and sometimes turn on VERP to narrow things down to an 
individual. It's all made so much worse by morons who confuse the 
"spam" button with their "delete" key when using webmail from a big 
provider. Sigh...)


Out of curiosity, why turn off VERP? Having it on all the time makes it 
much easier to deal with bounces.


Best regards

-lem


Re: IADB whitelist - again

2018-03-02 Thread Luis E. Muñoz

On 2 Mar 2018, at 0:48, Sebastian Arcus wrote:

But why does SA have to expose a rule for each and every code IADB 
provides?


So that users can implement their own policies if desired? So that 
different rules can have a more granular effect on the inbound email 
flow, without this being a simply binary affair (present, not present)? 
More reasons come to mind, but it all boils down to exposing all the 
available information to the users in order for them to make better 
decisions.


As I mentioned in one of my prior responses, I personally know of 
operations that use that data granularity to their advantage.


SA is an antispam solution, IADB is a facilitator for the marketing 
industry (in spite of their continuous protestations on this list). 
The goals of the two are not the same. Surely SA can decide by itself 
what is really useful from a spam filtering point of view - not churn 
out whatever it gets passed by marketing whitelists? SA uses other 
whitelists (some may I say a lot more useful than IADB), and it only 
exposes one or two rules for each.


I doubt IADB is in a position to dictate to anyone how to use (or not) 
the data it provides. Not SA, not anybody else. Participants in IADB 
(listees and users) voluntarily act so. As someone else in this thread 
pointed out, IADB provides a useful ham signal.


I think the goals of both are fairly aligned. An antispam solution is 
not good if it blocks wanted email. IADB is conveying information about 
the stated policies / practices of the sending organization. Assisted 
with this information, SA can take better decisions about specific 
pieces of email.


Also, there is RCVD_IN_IADB_DOPTIN, so RCVD_IN_IADB_OPTIN may be 
"someone somehow gave us your name somewhere" (i.e. "single opt-in") 
rather than "we confirmed you actually want to receive our garbage" 
("double opt-in").


So effectively pretty useless, as if you ever made the mistake of 
forgetting to untick the "receive email from our carefully selected 
partners" in the past, you will never be able to take that consent 
back as your email address gets passed from entity to entity. Consent 
to be emailed marketing material is a joke - and SA shouldn't be a 
facilitator - otherwise its value as a spam filter is gone.


I fail to see how SA is acting as a facilitator in this case. SA ships 
with rules that look up all the available information about a piece of 
email and then, hands this information to a set of rules that decide 
what should happen to that email. You're objecting to the scores being 
applied to those rules because you received one email that you believe 
doesn't align with the results of one of those rules and want to drop 
those rules from the distribution.


What would happen if the email you wanted came from a mail server listed 
in Spamhaus? Would you then argue for removing rules using Spamhaus from 
SA altogether?


I would urge you to follow the advice of other list members and actually 
report the misclassified spam so that involved parties can take action.


The scores appear hardcoded (50_scores.cf) vs. from masscheck 
(72_scores.cf) so they may be *very* stale.


In that case maybe at least some of the rules should be removed then


In this case it seems to me that you already have a desired outcome and 
will grasp at any shred of argument to justify it.


Best regards

-lem


Re: IADB whitelist - again

2018-03-05 Thread Luis E. Muñoz

On 3 Mar 2018, at 3:54, Noel Butler wrote:


On 03/03/2018 11:40, John Hardin wrote:


On Sat, 3 Mar 2018, Noel Butler wrote:

On 03/03/2018 04:40, John Hardin wrote:

On Fri, 2 Mar 2018, Sebastian Arcus wrote:

-0.2 RCVD_IN_IADB_RDNS  RBL: IADB: Sender has reverse DNS record
[199.127.240.84 listed in iadb.isipp.com]
-0.1 RCVD_IN_IADB_SPF   RBL: IADB: Sender publishes SPF record
-0.1 RCVD_IN_IADB_OPTIN RBL: IADB: All mailing list mail is 
opt-in
-0.0 RCVD_IN_IADB_SENDERID  RBL: IADB: Sender publishes Sender ID 
record

-0.0 RCVD_IN_IADB_LISTEDRBL: Participates in the IADB system
-0.1 RCVD_IN_IADB_DKRBL: IADB: Sender publishes Domain Keys 
record
-0.1 RCVD_IN_IADB_VOUCHED   RBL: ISIPP IADB lists as vouched-for 
sender


I am concerned when the default settings in SA effectively facilitate 
marketing companies to stuff my Inbox full of junk.

-0.6 points makes the difference?

Perhaps the default scores need to be reviewed, but simply having the
rules isn't problematic.


Have to agree with him, it can make all the difference in some cases,
I'd prefer to see the rules stay, but all at score 0
-0.001 surely... 0 = disabled = breaks dependencies.


I would argue that the current scores work very well for default 
installs. Likely, many users of SA lack the skills and data required to 
optimize their setups, so they benefit from receiving an install that 
will work well enough out of the box.



That would be acceptable :)


I disagree. Knee-jerk changes to rule scores based on a single report 
that contradicts what others are seeing is detrimental to the stability 
of SA. I'm either responsible or consult for filters that process ~10 
million messages per day at a few corporate organizations where SA is 
used extensively in both the inbound and outbound. Not a particularly 
large number nor more than a few samples. Yet in all those cases I keep 
the default IADB scores in place as they work well with our rule sets. 
The only message that was marked as spam and triggered one of the IADB 
rules in my archive was sent by an ex-customer of the IADB.


Based on my data, I'm seeing more false positives from other rules -- 
yet I'm not proposing to change the default SA configuration because of 
this. I understand that factors such as geography or my user base change 
effectiveness.


Some rules are more or less effective due to bias 
https://esmtp.email/blog/2017/09/06/blacklist-bias/


At some point I did consider using the IADB rules as part of a metarule, 
but that proved not more useful than leaving the rules as they were, so 
I chalked that as a learning exercise and moved on.



(I usually disable all whitelists anyway, especially those scoring
influentially)


And this is sound advice to anyone with the skills to tune their SA 
installation according to their specific needs. However this is probably 
not so true for people that installs SA and leaves the default 
configuration in place. Be it the one that SA ships or the one their 
preferred linux distribution provides.


Best regards

-lem


Re: [Offtopic] List From and Reply-To

2018-05-30 Thread Luis E. Muñoz

On 30 May 2018, at 13:54, Bill Cole wrote:


On 30 May 2018, at 14:51 (-0400), Grant Taylor wrote:

Since Qualcom transferred the Eudora IP to the Computer History 
Museum and open sourced the source code, I expect that we will be 
seeing movement there in.  I think I've seen some references to 
projects to resurrect the code base within days of the announcement.


I wouldn't bet on a successful reanimation of the Eudora corpse for 
MacOS. My understanding from its developers at the time Qualcomm 
killed it in favor of re-skinning TBird (which also fizzled) is that 
the code was unmaintainable and required essentially a full rewrite to 
keep working on MacOS X given the ongoing rot in the Carbon APIs.


Also, IIRC, messages were kept in mbox-like files. That would certainly 
not scale well.


Best regards

-lem


Re: [Offtopic] List From and Reply-To

2018-05-30 Thread Luis E. Muñoz

On 30 May 2018, at 14:30, Bill Cole wrote:

And if you can imagine this, both Thunderbird and MailMate choke on 
large mailboxes *even more* than Mail.app does.



I haven't had MM "choke" on large mailboxes in recent years. I wish 
Benny would just declare a 2.0 release to make it clear that MM today 
is much more solid than it was in 2015.


To further the point, one of the mailboxes I manage on this box has 95K+ 
messages. Apple Mail would choke to dead on this one. MM seems happy. I 
would give it another try as this is precisely the reason why I switched 
~2 years ago.


Best regards

-lem


Re: List From and Reply-To

2018-06-01 Thread Luis E. Muñoz

On 1 Jun 2018, at 5:12, @lbutlr wrote:


On 30 May 2018, at 15:34, Luis E. Muñoz  wrote:
To further the point, one of the mailboxes I manage on this box has 
95K+ messages. Apple Mail would choke to dead on this one.


Not at all. I have folders in mail.app with more than twice that 
number of messages.


Perhaps you were lucky. Those "chokes" where my main reason to move to 
MailMate. YMWV I suppose.


Best regards

-lem


Re: Help with own RBL

2018-07-25 Thread Luis E. Muñoz

On 23 Jul 2018, at 23:40, Pedro David Marco wrote:

On Tuesday, July 24, 2018, 12:07:52 AM GMT+2, David B Funk 
 wrote:

What kind of 'calculations with that IP' ?



Thanks Dave... calculations are complex and done with a an external 
script that reads some files parsing them...


Depending on how you intend your service to work, you could be creating 
a trap for your users. Feel free to fill the gaps in my understanding of 
what you intend, as after all I'm only working with the little you have 
shared in this thread so far.


Normally, content scanners / MTAs will perform their DNS queries from 
behind a caching name server. The idea is that once a response to a 
particular question is known, that information can be kept around and 
reused at a much faster rate. This is (and has been) the recommended 
architecture since forever, with minor variations on where / how many 
caching name servers to deploy.


On 23 Jul 2018, at 13:49, Pedro David Marco wrote:
i am planning to run my own RBL with a nameserver, that when queried 
for an IP that is not in its database, does some calculations with 
that IP and replies accordingly [⋯]


This means that the caching name server that is querying you will have 
to wait for _most_ answers. Without a way to know how long that process 
will take, it's possible that DNS clients will retry their questions, 
caching name server will as well and the whole thing becomes a tarpit 
that ends up wasting DNS resolver resources and generally slowing down 
mail delivery. Under that scenario, I would not recommend usage of the 
service you propose, but again feel free to any gaps in the above 
reasoning.


The reason that in the traditional DNS list model you do all your 
calculations in advance and produce a zone is precisely to ensure that 
your service can respond quickly. Also note that DNS is designed to 
aggressively cache responses, so that repeated queries can be satisfied 
from a nearby cache. Wildcard DNS records could be leveraged to some 
extent, so as to have better control over caching of results.


There are variations to the DNS list architecture that include pushing 
dynamic updates to keep the zone data updated as more / newer data is 
available. This could work for your use case -- you could consume a 
query log from your authoritative DNS servers, perform the required 
calculations and then push the updated response when the results are 
available. In the meantime, the DNS server would return NXDOMAIN (or 
perhaps something else if wildcard records are an option).


Without knowing more about these calculations you intend to perform, 
this dynamic update approach would seem like a workable plan which might 
or might not fall within your expertise.


In a distant past I built something like what you're describing although 
for a very different purpose. I ended up writing a name server in Perl 
(https://metacpan.org/release/Net-DNS-Method). This won't come near the 
required performance or behavior for a public facing DNS list with any 
sort of meaningful usage. Also consider that your DNS traffic will only 
go up, because if your DNS list gets mentioned around, people is going 
to add it to their configuration and forget about it.


So, while this is likely not an ideal forum for this topic, I don't mind 
beating this horse for a little while.


Best regards

-lem



Re: Spam rule for HTTP/HTTPS request to sender's root domain

2019-02-28 Thread Luis E. Muñoz

On 28 Feb 2019, at 11:53, Mike Marynowski wrote:

There are many ways to determine what the root domain is. One way is 
analyzing the DNS response from the query to realize it's actually a 
root domain, or you can just grab the ICANN TLD list and use that to 
make a determination.


What I'm probably going to do now that I'm building this as a cached 
DNS service is just walk up the subdomains until I hit the root domain 
and if any of them have a website then it's fine.


This is more complicated than it seems. I have the t-shirt to prove it.

I suggest you look at the Mozilla Public Suffix List at 
https://publicsuffix.org/ — it was created for different purposes, 
but I believe it maps well enough to my understanding of your use case. 
You'll be able to pad the gaps using a custom list.


Best regards

-lem


Re: Bug or feature? ;-)

2019-03-25 Thread Luis E. Muñoz

On 25 Mar 2019, at 13:02, David B Funk wrote:

For example, I've seen increasing amounts of spam which contain cloud 
based URLs in the body of the message (worthless for URIBL filtering) 
which may also contain URLs in the headers that are specific to the 
spammer source (thus viable targets for URIBL filters).


A blanket prohibition against header URI mining would miss out on that 
data.


+1


Re: Two types of new spam

2020-01-05 Thread Luis E. Muñoz

On 3 Jan 2020, at 8:02, Kris Deugau wrote:

I have a local rule adding a couple of points for anything coming 
direct-to-MX from any Amazon compute node, period.

⋮
Reality has intruded and there are in fact static IP assignments in 
the .compute.amazonaws.com tree (as well as ISP customers of ours who 
have websites with webforms on AWS, which send mail to their ISP 
mailbox - or sometimes their domain mailbox that's hosted with us) - 
otherwise I'd have scored the rule a lot higher.


AWS offers the option to customize the PTR for elastic IPs. I very 
rarely see spam coming in from AWS ranges, having non-default PTRs. I 
use this to dial back my scoring a bit.


Best regards

-lem


Re: IMPORTANT NOTICE FOR PEOPLE RUNNING TRUNK re: [Bug 7826] Improve language around whitelist/blacklist and master/slave

2020-07-10 Thread Luis E. Muñoz


I am having a hard time reconciling the statements below.

On 10 Jul 2020, at 13:21, Bill Cole wrote:
We have no way of knowing how many people have thought less of SA 
because of terminology or whether any of those people might have 
otherwise become involved enough in the project to be contributors. 
[⋯]


[⋯] We cannot do much for the bigger Real Problems that intersect 
with ours tangentially, [⋯] Changing a few labels in the code is 
something we CAN do.


If ASF or the SA Project does not know "how many people have thought 
less of SA" – and I venture to say, doesn't know if _any_ people has 
– then deciding to engage in an activity that by your own admission 
does nothing for the "real problems" just because you can, makes little 
sense.


This effort is simply wasting resources – and judging from recent 
events, breaking code – to gain what? To claim that ASF or the SA 
Project are somewhat sensitive because they changed a term that has been 
in use for 20+ years, but still has no non-whites or women or whatever 
the demographic de jure is in the board?


I lived in a country where we allowed politics to interfere with 
technology. Things did not end well for either.


Best regards

-lem





Re: IMPORTANT NOTICE FOR PEOPLE RUNNING TRUNK re: [Bug 7826] Improve language around whitelist/blacklist and master/slave

2020-07-10 Thread Luis E. Muñoz

On 10 Jul 2020, at 12:29, @lbutlr wrote:

If people are so fragile that they have to hold on to terms that are 
extremely offensive to some of their peers, they will get more spam. 
Oh noes.


I keep hearing about this mythical people that get terribly offended by 
the use of these words. I've been working in IT since the 90s, and I've 
never actually seen one in real life. Do they really exist?


-lem


Re: IMPORTANT NOTICE FOR PEOPLE RUNNING TRUNK re: [Bug 7826] Improve language around whitelist/blacklist and master/slave

2020-07-11 Thread Luis E. Muñoz

On 10 Jul 2020, at 23:51, Bill Cole wrote:

"Terribly offended" is not what I've heard from anyone but the issue 
has been raised by Black colleagues a few times in multiple contexts, 
as Yet Another Minor Annoyance in a world stuffed full of such little 
things.


Reminds me of left-handed people back when I grew up. In my time 
children would use chairs with integrated tables that would be fit for 
_either_ right- or left-handed people. Since there were more 
right-handed children, left-handed people would have to be more creative 
to adapt.


So far we know:

* Terms such as blacklist are a minor annoyance
* There's no evidence of "how many people have thought less of SA" 
because of the use of the term "blacklist"
* The change has a very non-zero impact _everywhere_ the software is 
deployed, as explained by other contributors to this ML


If you want a direct first-hand explication, hunt down the recent 
extended rant on Twitter by Jackie Singh (@find_evil) triggered by the 
suggestion that the Black Hat conference was considering a name change 
and the blowback from that.


Sure, are you talking about this?

https://twitter.com/find_evil/status/1279945071371128834 – "The only 
person on that list who looks anything like me is the head of infosec at 
Fb"


In here she posts a poll asking whether you would apply to be part of a 
board composing by people that don't look like you 
– https://twitter.com/find_evil/status/1279948068411052045


I can't answer for everybody of course, but I would not care how the 
current members of a group I wanted to join look. I have been part of 
many groups that contained people that did not look like me 
– professional and otherwise. Up to that point in the thread, it 
seems to me as someone looking for excuses. If I missed something, 
please point me to it.


If I continue to look at her tweets, I find examples such as this: 
https://twitter.com/find_evil/status/1281735488437727233 – she seems 
surprised that someone would want to choose compatible people to work 
with. I don't know her or the context, and it is not my place to pass 
judgement, but I sincerely hope that whomever is in charge has better 
justification for this change than this lady's tweet rant.


I do not know the rules under which ASF and SAP operate, but this thread 
is evidence that the position you are defending is far from widely 
shared, and to me, looks very poorly justified.


Future software? Sure. Get rid of anything remotely offensive _the next 
time around_. Start by not using Assassin in the name, Apache in your 
organization and not mentioning any colors or university degrees. For 
existing, deployed, critical code? Don't change things to win cookie 
points.


Best regards

-lem


Re: IMPORTANT NOTICE FOR PEOPLE RUNNING TRUNK re: [Bug 7826] Improve language around whitelist/blacklist and master/slave

2020-07-14 Thread Luis E. Muñoz

On 14 Jul 2020, at 9:24, Kevin A. McGrail wrote:


Here's a well researched
and documented article from a medical journal on the topic with expert
citations: https://jmla.pitt.edu/ojs/jmla/article/view/490  The 
abstract
says it very well: "This commentary addresses the widespread use of 
racist
language in discussions concerning predatory publishing. Examples 
include
terminology such as blacklists, whitelists, and black sheep. The use 
of
such terms does not merely reflect a racist culture, but also serves 
to

legitimize and perpetuate it."


You might want to note that it was included in JMLA Vol 106, No 4 (2018) 
in the **Commentary** section, along with pieces such as


"Using Slack to communicate with medical students"
"The relative citation ratio: what is it and why should medical 
librarians care?"
"Transforming the systematic review service: a team-based model to 
support the educational needs of researchers"

and
"How to earn a reputation as a great partner"

So yeah, quoting a magazine article on a scientific-sounding source is 
great and all, but perhaps the citation is not as authoritative as you 
think it is. If you actually go and read the paper, you will see that 
the "evidence" the authors present is based on other people's similarly 
sourced lists. There are no surveys, polls or other mechanisms to query 
the actual sentiment of the allegedly affected population. I also have 
to note that this piece was not peer reviewed, so there was no checks 
for methodology or accuracy – why would there need to be one, it's 
commentary after all.


The quote provides proof that the topic is controversial. Not surprising 
judging by the length of the threads. I think it is also clear that 
there are two well defined poles on the issue.


Dismissing those that oppose this change as "socially insensitive" or 
"racists", as has been seen in previous messages, is a transparent 
attempt to demonize the opposition. The same can be said of those 
dismissing the group that wants to edit the terms. Both group have their 
own motivations and I am pretty sure that each believe their motivations 
to be good. I believe so about my own and I'm sure you are the same.


The vote of the PMC is being presented as an unsurmountable, immovable 
design from the gods that need to be followed by all. I think the PMC 
would be very wise to recognize that their prior vote lacked in 
consideration to all the positions and should be reconsidered after an 
appropriate opportunity to internalize the arguments that have been 
presented. After all, it has been recognized by some defenders of the 
term replacement, that this action is a mere gesture devoid of actual 
ability to change the real underlying problem – which is not 
constrained to the US, as some mentioned.


Best regards

-lem


Re: spamhaus enabled by default

2020-07-14 Thread Luis E. Muñoz

On 14 Jul 2020, at 9:53, Kevin A. McGrail wrote:


I agree with you about the idea of turning off everything and just
delivering 100% commented configuration files..  I believe SA is a
framework that must have walls & paint added to make it a house.  
Others
want it ready to go as a pre-fab house aka a drop-in spam filter.  As 
a
project, the majority supports the drop-in model so I support the will 
of
the PMC.  The DNSBlocklist inclusion policy from 2011 has served us 
well
with a lot of users and very few complaints.  But if you think of 
edits it
might need, we can always improve it.  DNS Blocklists and the free for 
some

model really help the drop in spam filter be effective.


Are there any sort of numbers regarding how are the SA instances being 
installed? Is it mostly for distros? Direct installs?


SA could ship the walls & paint as you describe, and leave to the 
distros the activation of such features they think their users will 
need, perhaps?


In my case, it is helpful to pull SA from a Debian package and have it 
ready to go, with a reasonably complete configuration I can tweak. 
Starting from an empty config would be more complex to my average use 
case.


Best regards

-lem


Re: IMPORTANT NOTICE FOR PEOPLE RUNNING TRUNK re: [Bug 7826] Improve language around whitelist/blacklist and master/slave

2020-07-14 Thread Luis E. Muñoz

On 14 Jul 2020, at 10:10, Kevin A. McGrail wrote:

Kevin,

If my words or position had any chance of modifying course, I would 
certainly do so again. But as you say further down, the "hullabaloo" of 
people trying to present other points of view, is pointless.



Luis, the article I quoted was well research and included expert
citations.  I'd be interested if you can find me one that says it 
isn't
racially-charged with expert citations, please.  Especially one that 
has

citations almost 50 years old that mention the problem.


I meant actual research, where they reach out to affected populations, 
poll them and actually go through data to reach a conclusion. I am 
biased here with being an engineer and all, but that is the kind of 
evidence I would like to see.


Quoting editorial pieces will lead us nowhere.


The PMC voted to make the changes and make the changes 100% backwards
compatible for no less than a year.  They also won't be considered 
for

removal until SA 4.1 is released.  Therefore, to me the hullabaloo is
fairly pointless.  People stuck in the past who insist on not 
changing

have that choice.

The ONLY technical battle worth discussing is way down the road and
that's whether enough movement has been made by 4.1 that delaying the
removal of backwards compatibility.


Understood. I will shut up now. Thanks for your time.

-lem


Re: Screwed-up scoring

2020-07-19 Thread Luis E. Muñoz

On 19 Jul 2020, at 10:54, Kevin A. McGrail wrote:

Great question.  That's really a third party rule.  I would like to 
see it

change eventually but maybe that's another phase.  Thoughts?


My thoughts are to delay any further social/political motivated name 
changes until after the extents of the current process are fully 
completed and understood. At that time, I would also suggest bringing in 
the opinions of the people who will bear the larger extent of the 
implementation – the users themselves – as well as the allegedly 
aggravated people on whose behalf you seem to favor the change.


Best regards

-lem


Re: BIMI pilot at Google

2020-07-22 Thread Luis E. Muñoz

On 22 Jul 2020, at 23:14, Kevin A. McGrail wrote:


However, I have questions of adoption rate, impersonation concerns,
anticompetitive concerns, and privacy concerns.  This just sounds like 
a

commercial tracking pixel but the devil is in the details.

The pilot will shake things out more I imagine.


Money is of course a motivation here. This breathes some fresh air to 
CAs and opens the possibility to a few new interesting revenue streams 
for all the parties.


I'm not sure on the potential for user tracking although I haven't read 
the material deep enough.


The adoption will depend greatly on the price for the new certificates 
that will have to go with this service. I think a wait-and-see approach 
is the right thing to do here. This is what I'm advising others to do on 
this topic.


Impersonation will of course be a very interesting topic.

Best regards

-lem


Re: BIMI pilot at Google

2020-07-23 Thread Luis E. Muñoz

On 23 Jul 2020, at 0:56, Laurent S. wrote:


BIMI requires DMARC, which is much easier to implement if you are a
phisher creating a brand new domain .xyz with all the right SPF, DKIM,
DMARC and BIMI. Putting the paypal logo on that .xyz domain and there
you go. Your regular legit company will often struggle to implement 
all

those correctly.

So either you display any BIMI and it's a phisher's wet dream (also a
nightmare to catch for a spam filter), or you only use a exhaustive 
list

which will leave out most companies that don't have the (financial)
resources.


At some point, there is an entity that sanctions the relationship 
between a domain name and the logo to be displayed. That entity is a CA 
which will produce a new kind of certificate ("VMC").


This means that the trust model does include a number of CAs just as in 
the browser PKI model.


Best regards

-lem


Re: BIMI pilot at Google

2020-07-24 Thread Luis E. Muñoz

On 24 Jul 2020, at 12:22, John Hardin wrote:

Does that certificate include some kind of checksum of the logo image 
itself?


If not, what is to prevent a spammer from obtaining all the needed 
certificates, and then changing the logo image they are hosting to 
match the entity they are spoofing?


Don't know yet, but probably the certificate will include a signature 
for the SVG file. I'm speculating at this point.


Best regards

-lem


Re: Possible spam sign

2020-12-08 Thread Luis E. Muñoz

On 8 Dec 2020, at 12:47, Grant Taylor wrote:

I think that the strict RFC specification does allow for multiple 
senders, but I don't remember how it's done and it's so rare that I'd 
accept the false positive.


Yes to both.

-lem