Re: Microsoft blacklisted?

2006-11-14 Thread SM

At 18:56 13-11-2006, Philip Prindeville wrote:

I recently saw an email get bounced that was legitimately coming
from Microsoft:


[snip]



I've put into my spamassassin/sa-mimedefang.cf file:

whitelist_from_rcvd [EMAIL PROTECTED] smtp.microsoft.com


What am I missing at this point?

Does the 2nd arg to the whitelist_from_rcvd need to be
maila.microsoft.com instead?


Yes.

Regards,
-sm 



Re: White listing yahoo groups

2006-11-14 Thread SM

At 07:01 14-11-2006, Bill Moseley wrote:

Should I try and white list the hosts?  Or better to give a large
negative score?


Yes, if you don't receive spam from these hosts.


Can their use of DomainKeys be used in my scoring?


See whitelist_from_dk [EMAIL PROTECTED] example.com

The signing domain (last parameter) is optional.

Regards,
-sm 



Re: Microsoft blacklisted?

2006-11-14 Thread SM

At 11:49 14-11-2006, Philip Prindeville wrote:

The problem with this is that the DNS returns the response (of the multiple
PTR records) in no particular order, so looking up the rDNS can return
one of three different names...

# nslookup
 set type=any
 server ns4.msft.net.
Default server: ns4.msft.net.
Address: 207.46.66.126#53
 212.115.107.131.in-addr.arpa
Server: ns4.msft.net.
Address:207.46.66.126#53

212.115.107.131.in-addr.arpaname = mail1.microsoft.com.
212.115.107.131.in-addr.arpaname = smtp.microsoft.com.
212.115.107.131.in-addr.arpaname = maila.microsoft.com.



So, if I put:

whitelist_from_rcvd [EMAIL PROTECTED] mail1.microsoft.com


Then use:

whitelist_from_rcvd [EMAIL PROTECTED] microsoft.com

Regards,
-sm 



Re: What's with UCEPROTECT List?

2006-10-17 Thread SM

At 20:52 16-10-2006, Marc Perkel wrote:
I don't know if other MTAs support sender verification but if they 
don't they should. It's a very good trick for blocking spam at connect time.


It's also a good trick to cause a denial of service.

Regards,
-sm 



Re: Auto_increment vs SERIAL key types

2006-10-10 Thread SM

At 06:14 10-10-2006, Michael Scheidell wrote:

I am experimenting with mysql replication, and have done some research
on key collisions in the case of a 'load balancing' situation (live sql


[snip]



My concern is over use of SERIAL keys in amavisd-new tables, vs
AUTO_INCREMENT keys.
(are SERIAL keys an alias for AUTO_INCREMENT? Are SERIAL keys safe in
replication situations?)


It's an alias for BIGINT UNSIGNED NOT NULL AUTO_INCREMENT UNIQUE.

See auto_increment_increment and auto_increment_offset (MySQL 5.x).

Regards,
-sm 



Re: Setting up DKIM and DomainKeys mail signing and verification

2006-09-30 Thread SM

At 12:32 28-09-2006, Henrik Ostergaard wrote:

This sounds promissing! But I have distributed, moving users and therefore
uses pop-before-smtp for authentication, which means that my IP list is in a
hash table, which is not in CIDR format. :-(


dk-filter and dkim-filter support pop-before-smtp.

Regards,
-sm 



Re: duplicate emails

2006-09-26 Thread SM

At 08:53 26-09-2006, Steve Ingraham wrote:
I need help with a problem.  Our users are seeing some multiple 
duplicate emails coming from the same sender.  This is not occurring 
with every email so there does not seem to be any pattern to which 
incoming emails will be duplicated and which ones won't.  They are 
also reporting that duplicate emails are sent when they send to an 
outside email.  Has anyone experienced this problem before?  What 
could be causing this to occur and what can I do to stop this?  I am 
running qmailtoaster and spamassassin as an external email 
gateway.  There has been nothing changed with qmail but I did update 
some rules in SA using rules_du_jour yesterday.  Would these rules 
updates cause this problem?  If so, what would have changed?


This doesn't look like a qmailtoaster or spamassassin problem.  Your 
Exchange server or mail client may be generating the duplicates.


Regards,
-sm 



Re: Setting up DKIM and DomainKeys mail signing and verification

2006-09-17 Thread SM

At 04:32 17-09-2006, Benny Pedersen wrote:

how does one do signing multible domains ?

man 8 dk-filter says to make a internal domain file and add this as -i
internal.file


You can use the -d parameter ( -d example.com,example.net) or


but can domains still have same domain keys or is one domain need to have
there own ?


The domains can have the same public and private keys.

Regards,
-sm 



Re: Setting up DKIM and DomainKeys mail signing and verification

2006-09-12 Thread SM

Hi Mark,
At 07:59 12-09-2006, Mark Martinec wrote:

At the time of this writing it appears the dkim-milter is more reliable
and better maintained than dk-milter, which is slowly fading into
oblivion. Similar holds true in the world of Perl modules: there are


Both milters are being maintained and are similar in reliability. 
dk-milter is not fading in oblivion as there are more domains signing 
with DomainKeys than DKIM.



The following SpamAssassin rules (in local.cf) work fairly well, giving
verified mail a little bit of advantage and slightly favourize mail from
some popular domains, and encourage people to start signing their mail.
Possible signed spam can be counterbalanced by other measures (see below).
  score DK_VERIFIED -1.5
  score DK_POLICY_SIGNSOME 0
  score DK_POLICY_TESTING  0

  score DKIM_VERIFIED -1.5


Note that some spam is DK signed.



  # DKIM and DK-based whitelisting may be used reliably:
  score USER_IN_DKIM_WHITELIST -3.0
  whitelist_from_dkim [EMAIL PROTECTED]
  whitelist_from_dk   [EMAIL PROTECTED]


This approach is better.



  * both the dkim-milter 0.5.1 and the dk-milter 0.4.1 need a patch as
described in the Postfix documentation file MILTER_README. The
dkim-milter already supplies a required patch in its bug tracking
system under [1537905] delayed queue ID; which will be included in
the next release;


IIRC, the Workarounds section of the Postfix documentation file is 
being read incorrectly.   Dkim-milter and dk-milter do not require any patch.


Regards,
-sm 



Re: uridnsbl error, info what?

2006-09-02 Thread SM

At 20:22 01-09-2006, Chris wrote:

I've been testing OpenDNS tonight vice using Earthlinks DNS nameservers.
Looking at my hourly syslog snip, about half way through my NANAS run I
noticed the below entries.  First of all, what are these entries telling

[snip]


Sep  1 21:51:25 localhost spamd[10939]: uridnsbl: bogus rr for
domain=spamhaus.org, rule=URIBL_XS_SURBL, id=8876
rr=spamhaus.org.xs.surbl.org. 1 IN A 208.67.219.40
at /usr/lib/perl5/site_perl/5.8.5/Mail/SpamAssassin/Plugin/URIDNSBL.pm line
626.


Turn off the typo correction feature of OpenDNS.

Regards,
-sm 



Re: Strange SPF problem/wrong result

2006-09-01 Thread SM

At 05:54 01-09-2006, decoder wrote:

This is no real forwarding, but all mail for us gets received by that
server first, and this server passes it to us. This is a common
structure for a bigger mail setup. The trusted_networks option solved
my problems, but it should definetly be included in the wiki somewhere.
Maybe we should add a note about trusted_networks being important for
SPF in the install manual where SPF installation is explained


The concept is the same as forwarding.  Maybe you shouldn't be 
running any SPF tests in such a setup.


Regards,
-sm 



RE: source SENDER authentication ? (as opposed to SPF HOST authentication)

2006-08-30 Thread SM

At 10:55 30-08-2006, Michael Grey wrote:

I like Michel Vaillancourt's idea - if it has to be done.


There are milters and MTAs that can do that.  It's not a good idea as 
it can cause a denial of service.


Regards,
-sm 



Re: end user whitelist failure help needed

2006-08-28 Thread SM

At 09:42 28-08-2006, Sally K. Scheer wrote:

HOWEVER, I have a problem with SA intercepting a set of messages I wish to
receive daily. They are from our bank and contain only two words (report
ready) and an attached pdf file. They are always from the same address but
the subject varies according to what kind of report is being sent. The
reports are automatically generated and sent by my bank's computer system.


[snip]


I whitelisted the address several times but it doesn't seem to help.


Read the Received header to find out the email address and the host 
to whitelist.


whitelist_from_rcvd [EMAIL PROTECTED]  example.com

Regards,
-sm 



Re: end user whitelist failure help needed

2006-08-28 Thread SM

At 12:51 28-08-2006, Sally K. Scheer wrote:

I already did whitelist the messages according to the spam box directions.
How do I find the actual whitelist so I can check to see if the proper
header information was included in the whitelist? Perhaps the process I used
to whitelist the messages was wrong.


The user preferences file location is 
~/.spamassassin/user_prefs  That's the .spamassassin directory when 
you login through a ssh.  You can open that file with a text editor 
and see whether it contains any whitelist entries.


It may be better to contact your system administrator and ask the 
later about the user configuration details as SpamAssassin may have 
been set up differently.


Regards,
-sm 



Re: Yahoo Received header problem?

2006-08-16 Thread SM

At 03:05 16-08-2006, Matthew Newton wrote:

I just received an e-mail that had been incorrectly marked as
hitting a block list (the SBL in this case, IIRC). The culprit
for this seems to be the following first Received header, where
a.b.c.d is the address on the BL:

Received: from [a.b.c.d] by web55501.mail.re4.yahoo.com via
 HTTP; Tue, 15 Aug 2006 15:34:33 BST

This seems wrong to me? However, my guess is that there is nothing
wrong with SpamAssassin, just that Yahoo shouldn't be adding a
Received header for a non-SMTP transaction (of course an


Section 3.8.2 (Received Lines in Gatewaying) mentions adding a 
Received header as trace fields for messages originating from 
non-SMTP environments.  The above Yahoo.com Received line is correct.


Regards,
-sm 



Re: Rule for non-DK-signed mail from yahoo

2006-08-14 Thread SM

At 11:03 14-08-2006, Mark Martinec wrote:

Having received a couple of messages faking to be from yahoo,
despite FORGED_YAHOO_RCVD and few other rules firing, the final
score was not high enough. Since Yahoo! is signing their
outgoing mail with DomainKeys, I came up with:

  header   __L_FROM_YAHOOFrom:addr =~ /[EMAIL PROTECTED]/i
  meta UNVERIFIED_YAHOO  __L_FROM_YAHOO  !DK_VERIFIED
  priority UNVERIFIED_YAHOO  500
  scoreUNVERIFIED_YAHOO  5.0

which seems to do its job.


The score is too high.  Some From: yahoo.com mail may not be DK 
signed.  DK verification may fail if the mail goes through mailing lists.


Regards,
-sm 



Re: Looking for a good Ebay whitelist

2006-08-08 Thread SM

At 09:52 08-08-2006, Mark Martinec wrote:

Seems like ebay is signing messages with DomainKeys, I'm getting
DK_VERIFIED in my log for mail from [EMAIL PROTECTED] and
[EMAIL PROTECTED] and similar.


Ebay.com and a few other high profile domains have been signing their 
mail with DK.  Note that they still have the testing flag set.


Regards,
-sm 



Re: postres bayes db and high load

2006-08-03 Thread SM

At 09:23 03-08-2006, Dan wrote:
Over the past few weeks, my company's mail server has been 
experiencing high loads that result in SA skipping emails.  I use a 
postgres database to manage bayes, awl and userprefs.  I am pretty 
sure that it is the bayes db that is causing the high load and 
resultant skipping, but I have no idea how to fix the problem.  I 
installed the SA DBI


[snip]


postgreSQL v8.0.4


Upgrade to Postgresql 8.1.4 if you can.  Turn on autovacuum.  Use 
BayesStore::PgSQL.


Regards,
-sm 



Re: SpammAssassin on WHM/Cpanel

2006-06-25 Thread SM

At 07:11 25-06-2006, Ken Dawber wrote:
I have a reseller shared hosting account under WHM/Cpanel software. 
(In other words I'm not a systems admin) The Cpanel is a control 
panel for web hosting. The implementation


This is the first time I see someone saying that. :)

1) Is there some way for the server system administrator who is 
using WHM/CPanel to change the default configuration so that SA 
setup is on the Webmail control panel rather than the Cpanel 
interface? If so, what do I have to tell the system admin to do?


That should be possible if the system admin writes the code to do that.

2) Assuming there is no easy way to do this, is the problem in the 
way cpanel is implemented or in the way SA is implemented.


The restrictions are in CPanel.

3) I notice mention of the need to feed spam  ham to SA. The cpanel 
interface doesn't seem to have any interface for the email user to 
tell it what was identified as spam was ham or that what was 
specified as ham was in fact spam. Should there be such an interface 
or is there one already that I just haven't understood.


SpamAssassin does not come with an interface.  The interface you 
see is implemented by CPanel.  If you have ssh access, you can use sa-learn.


Regards,
-sm 



Re: Domainkeys - Conflicting msg headers?

2006-06-13 Thread SM

At 22:57 12-06-2006, Daryl C. W. O'Shea wrote:

Already changed in 3.2:

describe DK_SIGNED  Domain Keys: message has a signature


[snip]

It's DomainKeys and not Domain Keys.

Regards,
-sm





RE: Public Blacklists?

2005-12-22 Thread SM

Hi Aaron,
At 13:14 21-12-2005, Aaron Boyles wrote:

understanding is that I should shell out to nslookup
70.221.33.80.sbl-xbl.spamhaus.org and nab the response.  However, when I
attempt this, I always get the same thing in response:  Can't find server
name for address 10.0.0.1 which is our gateway.  Am I doing something


nslookup is broken. :-) Use dig instead.

Regards,
-sm 



RE: Public Blacklists?

2005-12-22 Thread SM

Hi Aaron,
At 10:14 22-12-2005, Aaron Boyles wrote:

A number of people have mentioned that... But what is it?  It's not a
command my PC recognizes.


It's not part of Windows.  It comes with BIND.  You can download a 
Win32 version at ftp://ftp.isc.org/isc/bind/contrib/ntbind-9.3.2/BIND9.3.2.zip


Regards,
-sm 



RE: Public Blacklists?

2005-12-22 Thread SM

Hi Aaron,
At 11:24 22-12-2005, Aaron Boyles wrote:

I assumed that typing:  dig www.yahoo.com
At the command prompt should have SOMETHING result.  Instead, I get the time
out.


dig @10.0.0.1 www.yahoo.com where 10.0.0.1 is the IP address of your 
name server.


Regards,
-sm 



Re: DomainKeys in SA

2005-12-13 Thread SM

At 06:30 13-12-2005, Kai Schaetzl wrote:

Going from that I looked at the Yahoo Groups messages I recently got:

From: [EMAIL PROTECTED]
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=lima;
d=yahoogroups.com;

Do I understand it correctly that d should match the sender's domain? In
that case all messages from Yahoo groups have to fail.


Yes, it should match the sending domain.  You should verify the 
Sender: header as well.


Regards,
-sm




RE: When is Bulk Bulk

2005-08-09 Thread SM

At 14:56 09-08-2005, Rob McEwen wrote:

Thanks for the feedback... but it looks like you e-mailed this directly to
me without sending it to the spamassassin thread
. Please consider re-sending this to the SA
list so that other can benefit from your comment... as you probably
intended! --Rob McEwen


I chose to send you an unsolicited email instead of replying to the 
thread. :-)  I am posting the comment to the SA list as you suggested.



-Original Message-
From: SM

This is indeed a slippery slope.  The emails are unsolicited.  This
one is too as we do not have any business relationship. :-)  In
business, there are times when we might email someone or even phone
that person even if we have no prior relationship with the
person.  As it is a manual process, we are limited to number of
emails we can write or calls we can make in a day.  The slippery
slope is where to set the threshold without hampering business.

As long as the emails are not computer generated, the list is not
some list the person purchased and the email is individualized, then
we cannot call it bulk.  If the template is to add the name of the
recipient and the website only, then a lot of people might label it
as spam.  There may come a day when your client may find that it is
easier and faster to use software to grab the information from the
website and have some bulk software generate and send the emails.

You may wish to bring to the attention of the client that his/her
emails might be construed as spam.  And you might warn the person
that you will be closely monitoring email traffic and you may
terminate the account if you receive any complaints.

Bulk is bulk when it people start complaining.  If you see hundreds
of emails going out each day, you are sure to have complaints sooner or
later.


Regards,
-sm 



Re: When is Bulk Bulk

2005-08-09 Thread SM

At 18:04 09-08-2005, jdow wrote:

Worrying about bulk or not is a distraction. It's not in issue. What
will the recipients think? How are they likely to react? What makes you
think it will get through the email process with NOBODY complaining to
a blacklist or sysadmin?


I mentioned complaints.  It is up to the admin of the sending domain 
to determine whether the server may be blacklisted because of such 
mail.  The replies to this thread gives the answer as to what will 
the recipients think and how they might react.


Regards,
-sm 



Re: [Dshield] fingerprinting servers before accepting

2004-12-02 Thread SM
Hi Joe,
At 15:51 01-12-2004, Joe Emenaker wrote:
That was the first thought through my mind when I read the original post. 
No need for a full-blown fingerprint... just see if they look server-ish 
or not. Try connecting to 25... and then maybe telnet, ssh, http, and imap.
You cannot assume that any of these other services are running or 
accessible.
There'd be some overhead involved in this, initially, but this could be 
mitigated by keeping a cache of previous call-backs. I imagine this would 
act like a sieve, where the hosts who send you the most mail (and, hence, 
would cause the greatest call-back load) would appear in the cache the 
soonest, and that would cut down on the call-back load the most. After a 
week or so, I imagine that the call-back load would be tapering off to 
those few odd hosts which connect.
There are some sites which implement the above.
Good thing they're well-known. We can add them to a file of known 
outgoing-only servers and can further cut down on the call-back load.
Your users will scream while you determine which sites to whitelist. :)
Regards,
-sm 



Re: [Dshield] fingerprinting servers before accepting

2004-12-01 Thread SM
Hi John,
At 08:54 01-12-2004, John Hardin wrote:
Interesting idea. It sounds a little heavy to be doing for every inbound
message, though, and it assumes that you're letting fingerprinting
traffic out of your network - I, for example, block all NetBIOS and
similar ports at my boundary, so fingerprinting wouldn't be useful.
It is not so heavy when applied to inbound connections.  Your connection 
can still be fingerprinted even if you block all NetBIOS and similar 
ports.  Scam-grey does that http://www.elandsys.com/scam/

However, this sounds like it might be useful in Spamassassin: attempt to
contact the sender on port 25, and add a little to the spamminess score
if the connection is refused or times out.
There are some well-known domains that have SMTP outgoing-only 
servers.  The scoring would affect them more than the spammy senders.

It might also be useful to try connecting to the backdoor ports for the
better-known spam worms and add a few points if the connection succeeds.
That would be too much overhead if it is done in realtime.
Regards,
-sm 



<    1   2   3   4