Re: False Positives from yahoo due to FORGED_MUA_MOZILLA

2017-04-21 Thread RW
On Thu, 20 Apr 2017 10:41:21 -0400
Lyle Evans wrote:

> I have been getting false positives from Yahoo due to
> FORGED_MUA_MOZILLA hitting on a new X-Mailer line added by Yahoo
> about 3/31/17

I've been looking into this and IMO Yahoo have exposed a problem with
the rule: 

https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7411


Re: False Positives from yahoo due to FORGED_MUA_MOZILLA

2017-04-21 Thread Merijn van den Kroonenberg
> On Thu, 20 Apr 2017, Lyle Evans wrote:
>
>> At 01:00 PM 4/20/2017, John Hardin wrote:
>>> On Thu, 20 Apr 2017, Merijn van den Kroonenberg wrote:
>>>
>>> > > On Thu, 20 Apr 2017 10:41:21 -0400
>>> > > Lyle Evans wrote:
>>> > >
>>> > > > I have been getting false positives from Yahoo due to
>>> > > > FORGED_MUA_MOZILLA hitting on a new X-Mailer line added by Yahoo
>>> > > > about 3/31/17
>>> > > >
>>> > > > The X-Mailer line reads:
>>> > > >
>>> > > > X-Mailer: WebService/1.1.9272 YahooMailNeo Mozilla/5.0 (Windows
>>> NT
>>> > > > 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
>>> > > > Chrome/56.0.2924.87 Safari/537.36
>>> > > /DCE\)/
>>> > >
>>> > > My guess is that they are including the http user-agent header of
>>> the
>>> > > browser that connected to their webmail server.
>>> >
>>> > Correct, I also noticed this a few days ago. Maybe the rule could be
>>> > changed to exclude yahoo...but maybe other webmail applications do
>>> this
>>> > too, not sure.
>>>
>>> Excluding when verified from Yahoo would be the proper approach.
>>
>> I added && !__FROM_YAHOO_COM (from 20_headers.cf) to FORGED_MUA_MOZILLA
>> giving
>>
>> FORGED_MUA_MOZILLA (__MOZILLA_MUA && !__UNUSABLE_MSGID &&
>> !__MOZILLA_MSGID && !__FROM_YAHOO_COM )
>>
>> I am testing that now,
>> any comments or suggestions for improvement are welcome.
>
> My concern would be how easy it might be to spoof __FROM_YAHOO_COM (which
> I'm not at the moment going evaluate...) If it's a basic "From header
> includes 'yahoo.com'" rule (which is what the name suggests), you might
> want to create a meta of __FROM_YAHOO_COM && (__SPF_PASS || __DKIM_PASS)
> (rule names from memory, that's only to suggest the approach) and then use
> that instead of the bare __FROM_YAHOO_COM.
>

I think in this case the ability to spoof/bypass the FORGED_MUA_MOZILLA is
not a huge issue.

Yahoo does DKIM sign the mail:
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com;
s=s2048; t=1492004654; bh=u/RrXL8wELnsl6uuALJnwAC/TQxfVkCBCHQc7pZDY/A=;
h=Date:From:Reply-To:To:In-Reply-To:References:Subject:From:Subject;
b=P5zjzMsC0OoZ7c

But to make it waterproof we would need to verify if the mail was DKIM
signed for d=yahoo.com (and not for a spammer controlled domain). Is it
possible to do this somehow?

I assume checking for DKIM_VALID_AU is not good enough if users can use a
different mail identity in yahoo (I don't know if its possible).

SPF_PASS would work but you would need to check if the EnvelopeFrom is
from yahoo.com

But I think Lyle's rule is already better than nothing and might be good
enough, even if it can be spoofed.




Re: False Positives from yahoo due to FORGED_MUA_MOZILLA

2017-04-20 Thread Lyle Evans

At 01:00 PM 4/20/2017, John Hardin wrote:

On Thu, 20 Apr 2017, Merijn van den Kroonenberg wrote:


On Thu, 20 Apr 2017 10:41:21 -0400
Lyle Evans wrote:


I have been getting false positives from Yahoo due to
FORGED_MUA_MOZILLA hitting on a new X-Mailer line added by Yahoo
about 3/31/17

The X-Mailer line reads:

X-Mailer: WebService/1.1.9272 YahooMailNeo Mozilla/5.0 (Windows NT
10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/56.0.2924.87 Safari/537.36

/DCE\)/

My guess is that they are including the http user-agent header of the
browser that connected to their webmail server.


Correct, I also noticed this a few days ago. Maybe the rule could be
changed to exclude yahoo...but maybe other webmail applications do this
too, not sure.


Excluding when verified from Yahoo would be the proper approach.


I added && !__FROM_YAHOO_COM (from 20_headers.cf) to FORGED_MUA_MOZILLA
giving

FORGED_MUA_MOZILLA (__MOZILLA_MUA && !__UNUSABLE_MSGID && 
!__MOZILLA_MSGID && !__FROM_YAHOO_COM )


I am testing that now,
any comments or suggestions for improvement are welcome.

Lyle Evans


Unfortunately masscheck is down for migration so any global fix 
won't go out anytime soon...



--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79



---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus



Re: False Positives from yahoo due to FORGED_MUA_MOZILLA

2017-04-20 Thread Lyle Evans

At 01:00 PM 4/20/2017, John Hardin wrote:

On Thu, 20 Apr 2017, Merijn van den Kroonenberg wrote:


On Thu, 20 Apr 2017 10:41:21 -0400
Lyle Evans wrote:


I have been getting false positives from Yahoo due to
FORGED_MUA_MOZILLA hitting on a new X-Mailer line added by Yahoo
about 3/31/17

The X-Mailer line reads:

X-Mailer: WebService/1.1.9272 YahooMailNeo Mozilla/5.0 (Windows NT
10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/56.0.2924.87 Safari/537.36

/DCE\)/

My guess is that they are including the http user-agent header of the
browser that connected to their webmail server.


Correct, I also noticed this a few days ago. Maybe the rule could be
changed to exclude yahoo...but maybe other webmail applications do this
too, not sure.


Excluding when verified from Yahoo would be the proper approach.


I added && !__FROM_YAHOO_COM (from 20_headers.cf) to FORGED_MUA_MOZILLA
giving

FORGED_MUA_MOZILLA (__MOZILLA_MUA && !__UNUSABLE_MSGID && 
!__MOZILLA_MSGID && !__FROM_YAHOO_COM )


I am testing that now,
any comments or suggestions for improvement are welcome.

Lyle Evans


Unfortunately masscheck is down for migration so any global fix 
won't go out anytime soon...



--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79




---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus



Re: False Positives from yahoo due to FORGED_MUA_MOZILLA

2017-04-20 Thread John Hardin

On Thu, 20 Apr 2017, Lyle Evans wrote:


At 01:00 PM 4/20/2017, John Hardin wrote:

On Thu, 20 Apr 2017, Merijn van den Kroonenberg wrote:

> > On Thu, 20 Apr 2017 10:41:21 -0400
> > Lyle Evans wrote:
> > 
> > > I have been getting false positives from Yahoo due to

> > > FORGED_MUA_MOZILLA hitting on a new X-Mailer line added by Yahoo
> > > about 3/31/17
> > > 
> > > The X-Mailer line reads:
> > > 
> > > X-Mailer: WebService/1.1.9272 YahooMailNeo Mozilla/5.0 (Windows NT

> > > 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
> > > Chrome/56.0.2924.87 Safari/537.36
> > /DCE\)/
> > 
> > My guess is that they are including the http user-agent header of the

> > browser that connected to their webmail server.
> 
> Correct, I also noticed this a few days ago. Maybe the rule could be

> changed to exclude yahoo...but maybe other webmail applications do this
> too, not sure.

Excluding when verified from Yahoo would be the proper approach.


I added && !__FROM_YAHOO_COM (from 20_headers.cf) to FORGED_MUA_MOZILLA
giving

FORGED_MUA_MOZILLA (__MOZILLA_MUA && !__UNUSABLE_MSGID && 
!__MOZILLA_MSGID && !__FROM_YAHOO_COM )


I am testing that now,
any comments or suggestions for improvement are welcome.


My concern would be how easy it might be to spoof __FROM_YAHOO_COM (which 
I'm not at the moment going evaluate...) If it's a basic "From header 
includes 'yahoo.com'" rule (which is what the name suggests), you might 
want to create a meta of __FROM_YAHOO_COM && (__SPF_PASS || __DKIM_PASS) 
(rule names from memory, that's only to suggest the approach) and then use 
that instead of the bare __FROM_YAHOO_COM.


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  Campuses today are a theatrical mashup of
  1984 and Lord of the Flies, performed by people
  who don't understand these references.   -- David Burge
---
 3 days until Max Planck's 159th birthday


Re: False Positives from yahoo due to FORGED_MUA_MOZILLA

2017-04-20 Thread John Hardin

On Thu, 20 Apr 2017, Merijn van den Kroonenberg wrote:


On Thu, 20 Apr 2017 10:41:21 -0400
Lyle Evans wrote:


I have been getting false positives from Yahoo due to
FORGED_MUA_MOZILLA hitting on a new X-Mailer line added by Yahoo
about 3/31/17

The X-Mailer line reads:

X-Mailer: WebService/1.1.9272 YahooMailNeo Mozilla/5.0 (Windows NT
10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/56.0.2924.87 Safari/537.36

/DCE\)/

My guess is that they are including the http user-agent header of the
browser that connected to their webmail server.



Correct, I also noticed this a few days ago. Maybe the rule could be
changed to exclude yahoo...but maybe other webmail applications do this
too, not sure.


Excluding when verified from Yahoo would be the proper approach.

Unfortunately masscheck is down for migration so any global fix won't go 
out anytime soon...



--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  It is criminal to teach a man not to defend himself when he is the
  constant victim of brutal attacks.  -- Malcolm X (1964)
---
 3 days until Max Planck's 159th birthday


Re: False Positives from yahoo due to FORGED_MUA_MOZILLA

2017-04-20 Thread RW
On Thu, 20 Apr 2017 17:02:57 +0200
Merijn van den Kroonenberg wrote:


> > My guess is that they are including the http user-agent header of
> > the browser that connected to their webmail server.
> >  
> 
> Correct, I also noticed this a few days ago. Maybe the rule could be
> changed to exclude yahoo...but maybe other webmail applications do
> this too, not sure.

I don't get much yahoo mail, is this the norm now? 



Re: False Positives from yahoo due to FORGED_MUA_MOZILLA

2017-04-20 Thread Merijn van den Kroonenberg
> On Thu, 20 Apr 2017 10:41:21 -0400
> Lyle Evans wrote:
>
>> I have been getting false positives from Yahoo due to
>> FORGED_MUA_MOZILLA hitting on a new X-Mailer line added by Yahoo
>> about 3/31/17
>>
>> The X-Mailer line reads:
>>
>> X-Mailer: WebService/1.1.9272 YahooMailNeo Mozilla/5.0 (Windows NT
>> 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
>> Chrome/56.0.2924.87 Safari/537.36
> /DCE\)/
>
> My guess is that they are including the http user-agent header of the
> browser that connected to their webmail server.
>

Correct, I also noticed this a few days ago. Maybe the rule could be
changed to exclude yahoo...but maybe other webmail applications do this
too, not sure.





Re: False Positives from yahoo due to FORGED_MUA_MOZILLA

2017-04-20 Thread RW
On Thu, 20 Apr 2017 10:41:21 -0400
Lyle Evans wrote:

> I have been getting false positives from Yahoo due to
> FORGED_MUA_MOZILLA hitting on a new X-Mailer line added by Yahoo
> about 3/31/17
> 
> The X-Mailer line reads:
> 
> X-Mailer: WebService/1.1.9272 YahooMailNeo Mozilla/5.0 (Windows NT 
> 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) 
> Chrome/56.0.2924.87 Safari/537.36
/DCE\)/

My guess is that they are including the http user-agent header of the
browser that connected to their webmail server.


False Positives from yahoo due to FORGED_MUA_MOZILLA

2017-04-20 Thread Lyle Evans

I have been getting false positives from Yahoo due to FORGED_MUA_MOZILLA
hitting on a new X-Mailer line added by Yahoo
about 3/31/17

The X-Mailer line reads:

X-Mailer: WebService/1.1.9272 YahooMailNeo Mozilla/5.0 (Windows NT 
10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) 
Chrome/56.0.2924.87 Safari/537.36


and the Messagid reads:

Message-ID: <909353831.1397505.1490989414...@mail.yahoo.com>


It is triggering the rule FORGED_MUA_MOZILLA from 20_meta_tests.cf


header __MOZILLA_MUA   X-Mailer =~ /\bMozilla\b/
header __MOZILLA_MSGID MESSAGEID =~ 
/^<[A-F\d]{8}\.[A-F1-9][A-F\d]{0,7}\@\S+>$/m
meta   FORGED_MUA_MOZILLA (__MOZILLA_MUA && !__UNUSABLE_MSGID && 
!__MOZILLA_MSGID)

describe FORGED_MUA_MOZILLAForged mail pretending to be from Mozilla

50_scores.cf: score FORGED_MUA_MOZILLA 2.399 1.596 2.399 2.309

I realize that its just 2.309 points but throw in a few other 
miscellaneous hits and you get a

False Positive. (I'll make another post about one of the miscellaneous hits.)

Where __UNUSABLE_MSGID is defined in 20_ratware.cf
# first define situations where servers rewrite message id so we 
can't use message id to detect forgeries


header __HOTMAIL_BAYDAV_MSGID   MESSAGEID =~ 
/^<[A-Z]{3}\d+-(?:DAV|SMTP)\d+[A-Z0-9]{25}\@phx\.gbl>$/m


header __IPLANET_MESSAGING_SERVER Received =~ /iPlanet Messaging Server/

header __LYRIS_EZLM_REMAILER  List-Unsubscribe =~ 
/<mailto:(?:leave-\S+|\S+-unsubscribe)\@\S+>$/


header __SYMPATICO_MSGIDMESSAGEID =~ 
/^<BAYC\d+-PASMTP\d+[A-Z0-9]{25}\@CEZ\.ICE>$/m


header __WACKY_SENDMAIL_VERSION Received =~ /\/CWT\/DCE\)/

meta __UNUSABLE_MSGID (__LYRIS_EZLM_REMAILER || 
__GATED_THROUGH_RCVD_REMOVER || __WACKY_SENDMAIL_VERSION || 
__IPLANET_MESSAGING_SERVER || __HOTMAIL_BAYDAV_MSGID || __SYMPATICO_MSGID)


My questions are is anybody else seeing this?
Why the @#$%! is Yahoo doing this?
What is the best fix?
I have temporarily removed the rule.

Thanks
Lyle Evans



---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus