Re: SPF and DKIM tests by default?

2012-02-17 Thread Bowie Bailey
On 2/16/2012 6:18 PM, email builder wrote:
>>
>>>  Letting trusted_networks empty is not generally a good idea.  In
>>>  particular, if your SA server is using a private IP, it will default to
>>>  trusting too much.  Specify your local networks in trusted_networks and
>>>  see if that helps your problem.
>>>
>>>  Leaving trusted_networks empty does not mean "trust nothing";  it 
>>>
>>>  means "let SA figure out what to trust".
>> Makes sense, especially if my hunch about the "relayed through one or
>> more trusted relays, cannot use header-based Envelope-From, skipping"
>> part of the debug output I just sent to this list is on track.
>>
>> Is there a way to set trusted_networks on the command line of the
>> spamassassin command just for testing?
> This didn't work:
>
> spamassassin -D --cf='trusted_networks 127.0.0.1' -t example_email_no_spf 
> 2>&1 | grep -i SPF
>
> All my local handoffs are to localhost [127.0.0.1] so I wouldn't know what 
> else to use (it's an all-in-one single server simple system)

I'm not sure if that format will work or not.  If your normal process
uses Amavisd_new or spamd, you can just edit the config files for your
tests.  Changes to the config files will not affect the daemons until
they are restarted.

At some point, there has to be an external IP to accept mail from the
Internet.  That is what you need to add to trusted_networks.  127.0.0.1
should be automatically trusted.  The simplest solution (unless you
don't trust your network for some reason) is to add all of the IP blocks
that you control to trusted_networks.

-- 
Bowie


Re: SPF and DKIM tests by default?

2012-02-16 Thread email builder
> 

>>  On 2/16/2012 4:54 PM, email builder wrote:
> 
   but it's misconfigured trusted_networks and 
   internal_networks what causes SPF to misfire...
>>>   Thank you sincerely for your help. I can only imagine that SPF 
>>> wouldn't 
>>>  fire if I accidentally specified Google in one of those settings or had 
>>> an error 
>>>  in one of them. In this case, those are at their defaults of empty, so 
>>> I'm 
>>>  hoping there are other suggestions. Thanks again..
>> 
>>  Letting trusted_networks empty is not generally a good idea.  In
>>  particular, if your SA server is using a private IP, it will default to
>>  trusting too much.  Specify your local networks in trusted_networks and
>>  see if that helps your problem.
>> 
>>  Leaving trusted_networks empty does not mean "trust nothing";  it 
> 
>>  means "let SA figure out what to trust".
> 
> Makes sense, especially if my hunch about the "relayed through one or
> more trusted relays, cannot use header-based Envelope-From, skipping"
> part of the debug output I just sent to this list is on track.
> 
> Is there a way to set trusted_networks on the command line of the
> spamassassin command just for testing?

This didn't work:

spamassassin -D --cf='trusted_networks 127.0.0.1' -t example_email_no_spf 2>&1 
| grep -i SPF

All my local handoffs are to localhost [127.0.0.1] so I wouldn't know what else 
to use (it's an all-in-one single server simple system)



Re: SPF and DKIM tests by default?

2012-02-16 Thread email builder
> On 2/16/2012 4:54 PM, email builder wrote:

>>>  but it's misconfigured trusted_networks and 
>>>  internal_networks what causes SPF to misfire...
>>  Thank you sincerely for your help. I can only imagine that SPF wouldn't 
>> fire if I accidentally specified Google in one of those settings or had an 
>> error 
>> in one of them. In this case, those are at their defaults of empty, so I'm 
>> hoping there are other suggestions. Thanks again..
> 
> Letting trusted_networks empty is not generally a good idea.  In
> particular, if your SA server is using a private IP, it will default to
> trusting too much.  Specify your local networks in trusted_networks and
> see if that helps your problem.
> 
> Leaving trusted_networks empty does not mean "trust nothing";  it 
> means "let SA figure out what to trust".

Makes sense, especially if my hunch about the "relayed through one or
more trusted relays, cannot use header-based Envelope-From, skipping"
part of the debug output I just sent to this list is on track.

Is there a way to set trusted_networks on the command line of the
spamassassin command just for testing?



Re: SPF and DKIM tests by default?

2012-02-16 Thread email builder
> 

> On 2/15/2012 7:08 PM, email builder wrote:
>>  OK, but: Q: Are there any default rules as supplied by sa-update that would 
>> prevent SPF rules from firing?
> Not that I can think of.
>> 
>>  Q: Any other ideas on how to learn what rules are actually being used?
> What I would likely do is save the gmail message to an mbox format file.  
> Then I 
> would run spamassassin -D -t /tmp/mboxfile 2>&1 | grep -i SPF and see 
> what I find.

Well, that was actually the other more general question that
you kindly already offered your help for - how to determine
all rules currently in use at execution time. Short of other
opinions, we'll wait to see how the bugzilla item I created
progresses.

But your advice here is in fact quite useful and may do a
fine job at pointing to the issue. Keep in mind, all rules
are as given by sa-update. I copied in all the output below
but here are what I see as key points by line number:

Line 8: Someone earlier pointed out that SA uses this
Received-SPF header, but then I think it was you that
pointed out that this shouldn't be necessary, and I added
that it would seem odd to me if SA didn't also look for the
quasi-standard "Return-Path" header which for some mailers
such as Postfix will include the envelope from address. The
lack of this header doesn't seem to stop SPF execution though.
When I copy my Return-Path header into a Received-SPF header,
line 8 becomes two lines:

Feb 16 14:19:59.263 [12846] dbg: spf: found a Received-SPF header added by an 
internal host: Received-SPF: 
Feb 16 14:19:59.263 [12846] dbg: spf: could not parse result from existing 
Received-SPF header

I tried this with a couple different formats of email and/or
domain name. Not sure what's going on here. The rest of the
lines are the same in both cases.

Line 12: Any comments why the SPF lookup returns nothing?
How can I do this same lookup by hand? Could this be a DNS
problem?

Line 13: Weren't the last few lines DNS checks already?

Line 14: I don't know why this happens. It is true that Postfix
relays mail to amavis, then it goes back to Postfix then it is
handed off to maildrop for delivery - SA is called from maildrop.
So there is some local relaying here, but why does this stop SA
from checking the hop from the outside to my Postfix? Is this
where having a non-default trusted_networks setting would help?

Thanks again for the great help and patience.

1) Feb 16 14:13:17.361 [12806] dbg: plugin: loading 
Mail::SpamAssassin::Plugin::SPF from @INC
2) Feb 16 14:13:17.774 [12806] dbg: config: fixed relative path: 
/var/lib/spamassassin/3.003001/updates_spamassassin_org/25_spf.cf
3) Feb 16 14:13:17.774 [12806] dbg: config: using 
"/var/lib/spamassassin/3.003001/updates_spamassassin_org/25_spf.cf" for 
included file
4) Feb 16 14:13:17.774 [12806] dbg: config: read file 
/var/lib/spamassassin/3.003001/updates_spamassassin_org/25_spf.cf
5) Feb 16 14:13:17.894 [12806] dbg: config: fixed relative path: 
/var/lib/spamassassin/3.003001/updates_spamassassin_org/60_whitelist_spf.cf
6) Feb 16 14:13:17.895 [12806] dbg: config: using 
"/var/lib/spamassassin/3.003001/updates_spamassassin_org/60_whitelist_spf.cf" 
for included file
7) Feb 16 14:13:17.895 [12806] dbg: config: read file 
/var/lib/spamassassin/3.003001/updates_spamassassin_org/60_whitelist_spf.cf
8) Feb 16 14:13:19.595 [12806] dbg: spf: checking to see if the message has a 
Received-SPF header that we can use
9) Feb 16 14:13:19.646 [12806] dbg: spf: using Mail::SPF for SPF checks
10) Feb 16 14:13:19.646 [12806] dbg: spf: checking HELO 
(helo=mail-iy0-f181.google.com, ip=209.85.210.181)
11) Feb 16 14:13:19.648 [12806] dbg: dns: providing a callback for id: 
13553/mail-iy0-f181.google.com/SPF/IN
12) Feb 16 14:13:19.984 [12806] dbg: spf: query for 
/209.85.210.181/mail-iy0-f181.google.com: result: none, comment: , text: No 
applicable sender policy available
13) Feb 16 14:13:19.988 [12806] dbg: spf: already checked for Received-SPF 
headers, proceeding with DNS based checks
14) Feb 16 14:13:19.988 [12806] dbg: spf: relayed through one or more trusted 
relays, cannot use header-based Envelope-From, skipping
15) Feb 16 14:13:19.995 [12806] dbg: spf: def_spf_whitelist_from: already 
checked spf and didn't get pass, skipping whitelist check
16) Feb 16 14:13:19.997 [12806] dbg: spf: whitelist_from_spf: already checked 
spf and didn't get pass, skipping whitelist check
17) Feb 16 14:13:25.566 [12806] dbg: timing: total 8235 ms - init: 1912 
(23.2%), parse: 1.82 (0.0%), extract_message_metadata: 74 (0.9%), 
poll_dns_idle: 381 (4.6%), get_uri_detail_list: 1.24 (0.0%), tests_pri_-1000: 
27 (0.3%), compile_gen: 171 (2.1%), compile_eval: 39 (0.5%), tests_pri_-950: 9 
(0.1%), tests_pri_-900: 9 (0.1%), tests_pri_-400: 8 (0.1%), tests_pri_0: 5996 
(72.8%), dkim_load_modules: 33 (0.4%), check_dkim_signature: 11 (0.1%), 
check_spf: 389 (4.7%), check_dcc: 190 (2.3%), check_razor2: 5003 (60.8%), 
check_pyzor: 0.54 (0.0%), tests_pri_500: 100 (1.2%), tests_pri_1000: 15 (0

Re: SPF and DKIM tests by default?

2012-02-16 Thread Bowie Bailey
On 2/16/2012 4:54 PM, email builder wrote:
>> but it's misconfigured trusted_networks and 
>> internal_networks what causes SPF to misfire...
> Thank you sincerely for your help. I can only imagine that SPF wouldn't fire 
> if I accidentally specified Google in one of those settings or had an error 
> in one of them. In this case, those are at their defaults of empty, so I'm 
> hoping there are other suggestions. Thanks again..

Letting trusted_networks empty is not generally a good idea.  In
particular, if your SA server is using a private IP, it will default to
trusting too much.  Specify your local networks in trusted_networks and
see if that helps your problem.

Leaving trusted_networks empty does not mean "trust nothing";  it means
"let SA figure out what to trust".

-- 
Bowie


Re: SPF and DKIM tests by default?

2012-02-16 Thread email builder
> 

>>>  Q: Will some rules not fire if some condition exists based on other 
>>> rules?
>>> 
>>>  A: Correct.  There are plenty of rules that build on other rules.  We 
>>> call these
>>>  meta rules.
>> 
>> Q: Are there any default rules as supplied by sa-update that would
>> prevent SPF rules from firing?
> 
> you can disable SPF or clear all scores 

The question was *as supplied by sa-update*

>> Q: Any other ideas on how to learn what rules are actually being used?
> 
> huh?

Please read the rest of this thread.

>> Q: Any suggestions as to why SPF rules would not fire on a
>> Gmail message where Gmail uses SPF, my SPF plugin and rule
>> initiation seem to be in place, and a Return-Path header with the
>> envelope from address exists?  (please see my previous messages
>> on this thread)
> 
> I haven't found the headers in apache archive, maybe I didn't search 
> carefully enough,

I recommend gmane.org

> but it's misconfigured trusted_networks and 
> internal_networks what causes SPF to misfire...

Thank you sincerely for your help. I can only imagine that SPF wouldn't fire if 
I accidentally specified Google in one of those settings or had an error in one 
of them. In this case, those are at their defaults of empty, so I'm hoping 
there are other suggestions. Thanks again..


Re: SPF and DKIM tests by default?

2012-02-16 Thread Kevin A. McGrail

On 2/15/2012 7:08 PM, email builder wrote:
OK, but: Q: Are there any default rules as supplied by sa-update that 
would prevent SPF rules from firing?

Not that I can think of.


Q: Any other ideas on how to learn what rules are actually being used?
What I would likely do is save the gmail message to an mbox format 
file.  Then I would run spamassassin -D -t /tmp/mboxfile 2>&1 | grep -i 
SPF and see what I find.



Regards,
KAM


Re: SPF and DKIM tests by default?

2012-02-16 Thread Matus UHLAR - fantomas

Q: Will some rules not fire if some condition exists based on other rules?

A: Correct.  There are plenty of rules that build on other rules.  We call these
meta rules.


On 15.02.12 16:08, email builder wrote:

Q: Are there any default rules as supplied by sa-update that would
prevent SPF rules from firing?


you can disable SPF or clear all scores 


Q: Any other ideas on how to learn what rules are actually being used?


huh?


Q: Any suggestions as to why SPF rules would not fire on a
Gmail message where Gmail uses SPF, my SPF plugin and rule
initiation seem to be in place, and a Return-Path header with the
envelope from address exists?  (please see my previous messages
on this thread)


I haven't found the headers in apache archive, maybe I didn't search 
carefully enough, but it's misconfigured trusted_networks and 
internal_networks what causes SPF to misfire...

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Windows found: (R)emove, (E)rase, (D)elete


Re: SPF and DKIM tests by default?

2012-02-15 Thread email builder


> 
> Q: Will some rules not fire if some condition exists based on other rules?
> 
> A: Correct.  There are plenty of rules that build on other rules.  We call 
> these 
> meta rules.
> 

OK, but:

Q: Are there any default rules as supplied by sa-update that would
prevent SPF rules from firing?

Q: Any other ideas on how to learn what rules are actually being used?

Q: Any suggestions as to why SPF rules would not fire on a
Gmail message where Gmail uses SPF, my SPF plugin and rule
initiation seem to be in place, and a Return-Path header with the
envelope from address exists?  (please see my previous messages
on this thread)


Re: SPF and DKIM tests by default?

2012-02-13 Thread Kevin A. McGrail

Q: Will some rules not fire if some condition exists based on other rules?

A: Correct.  There are plenty of rules that build on other rules.  We 
call these meta rules.


Regards,
KAM


Re: SPF and DKIM tests by default?

2012-02-12 Thread email builder
>>>  On 02/10, email builder wrote:

   > I believe for SPF you *should* be doing the detecting at your 
   > MTA
   > (mail server software) and inserting a header for 
   > spamassassin to use:
   > Received-SPF.  (Because SPF is supposed to use the 
   > "envelope from",
   > which is not necessarily included in a header.)
 
   I see. That makes sense. Is there a wiki page suggesting solutions 
   for this? Anyone know of tips for doing this in postfix? Or during 
 amavis 
   processing?
>>> 
>>>  I use postfix-policyd-spf-perl.
>>>  Which appears to currently be officially hosted at:
>>>  https://launchpad.net/postfix-policyd-spf-perl/
>> 
>>  Thanks for that, although see my last post - do you know if the SPF tests 
>> only know how to look for that Received-SPF header or can use the envelope 
>> sender if it's present?
> 
> If your MTA provides sufficient info for SA to determine the envelope sender 
> that is enough.

I agree and I've done some more research and found that Postfix adds the 
envelope sender as a "Return-Path" header (its pipe and virtual delivery agent 
at least do this). So I *do* have a header in my messages with the envelope 
sender. Either the SPF rules don't know how to look for "Return-Path" (which 
would surprise me given that it is quasi-standard and highly used) or I have 
some other problem.

Will some rules not fire if some condition exists based on other rules?

> I've been using sendmail+milter+sa for years
> with SPF & DKIM rules and never had any kind of special MTA added 
> 'Received-SPF' header.

OK, good.

> One thing that -is- a factor; sa depends upon specific perl modules
> for that functionality; DNS, SPF, & DKIM modules (EG Net::DNS, Mail::DKIM, 
> Mail::SPF ), and 'loadplugin' statements in the correct ".pre" 
> files.

I think I forgot to reply to the hints on checking for the SPF module earlier 
in this thread, but I do have it installed. And the SPF plugin is loaded from 
init.pre (is that OK?).

> Occasionally issues arise with problematic versions of those modules.
> For example, search this list archive for disussions about problems caused by 
> buggy versions of the DNS module.
> 
> If you execute the test:
>   % spamassassin --lint -D 2>&1 | grep -i -E 'spf|dkim|dns'
> 
> [snip ...]
> 
> If you don't see those 'plugin: loading' lines for SPF & DKIM, 
> then there's your problem. Either they're not installed on your system 
> in a way that SA can find them, wrong verions, or not invoked by 
> 'loadplugin' statements.

Thanks that was helpful, and I did in fact find the "plugin loading" for the 
SPF plugin, so it's there, but I'm not getting hits on messages from Gmail 
which does use SPF. Hmmm any other suggestions anyone? Thanks for the excellent 
help so far!


Re: SPF and DKIM tests by default?

2012-02-12 Thread Dave Funk

On Sun, 12 Feb 2012, email builder wrote:


On 02/10, email builder wrote:

 > I believe for SPF you *should* be doing the detecting at your MTA
 > (mail server software) and inserting a header for spamassassin to use:
 > Received-SPF.  (Because SPF is supposed to use the "envelope 
> from",

 > which is not necessarily included in a header.)

 I see. That makes sense. Is there a wiki page suggesting solutions for 
this? Anyone know of tips for doing this in postfix? Or during amavis 
processing?


I use postfix-policyd-spf-perl.
Which appears to currently be officially hosted at:
https://launchpad.net/postfix-policyd-spf-perl/


Thanks for that, although see my last post - do you know if the SPF tests only 
know how to look for that Received-SPF header or can use the envelope sender if 
it's present?


If your MTA provides sufficient info for SA to determine the envelope 
sender that is enough. I've been using sendmail+milter+sa for years
with SPF & DKIM rules and never had any kind of special MTA added 
'Received-SPF' header.


One thing that -is- a factor; sa depends upon specific perl modules
for that functionality; DNS, SPF, & DKIM modules (EG Net::DNS, Mail::DKIM, 
Mail::SPF ), and 'loadplugin' statements in the correct ".pre" files.

Occasionally issues arise with problematic versions of those modules.
For example, search this list archive for disussions about problems caused 
by buggy versions of the DNS module.


If you execute the test:
  % spamassassin --lint -D 2>&1 | grep -i -E 'spf|dkim|dns'

You should see output that looks something like:

Feb 12 20:08:05.530 [13365] dbg: dns: is Net::DNS::Resolver available? yes
Feb 12 20:08:05.530 [13365] dbg: dns: Net::DNS version: 0.63
Feb 12 20:08:06.394 [13365] dbg: diag: [...] module installed: Net::DNS, 
version 0.63
Feb 12 20:08:06.394 [13365] dbg: diag: [...] module installed: Mail::SPF, 
version v2.007
Feb 12 20:08:06.395 [13365] dbg: diag: [...] module installed: Mail::DKIM, 
version 0.39
Feb 12 20:08:06.409 [13365] dbg: plugin: loading 
Mail::SpamAssassin::Plugin::URIDNSBL from @INC
Feb 12 20:08:06.414 [13365] dbg: plugin: loading 
Mail::SpamAssassin::Plugin::SPF from @INC
Feb 12 20:08:06.429 [13365] dbg: plugin: loading 
Mail::SpamAssassin::Plugin::DKIM from @INC
Feb 12 20:08:06.446 [13365] dbg: plugin: loading 
Mail::SpamAssassin::Plugin::DNSEval from @INC
[snip ...]

If you don't see those 'plugin: loading' lines for SPF & DKIM, then 
there's your problem. Either they're not installed on your system in a 
way that SA can find them, wrong verions, or not invoked by 'loadplugin' 
statements.


--
Dave Funk  University of Iowa
College of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include 
Better is not better, 'standard' is better. B{

Re: SPF and DKIM tests by default?

2012-02-12 Thread email builder
 

> On 02/10, email builder wrote:
>>  > I believe for SPF you *should* be doing the detecting at your MTA
>>  > (mail server software) and inserting a header for spamassassin to use:
>>  > Received-SPF.  (Because SPF is supposed to use the "envelope 
>> > from",
>>  > which is not necessarily included in a header.)
>> 
>>  I see. That makes sense. Is there a wiki page suggesting solutions for 
>> this? Anyone know of tips for doing this in postfix? Or during amavis 
>> processing?
> 
> I use postfix-policyd-spf-perl.
> Which appears to currently be officially hosted at:
> https://launchpad.net/postfix-policyd-spf-perl/

Thanks for that, although see my last post - do you know if the SPF tests only 
know how to look for that Received-SPF header or can use the envelope sender if 
it's present?


Re: SPF and DKIM tests by default?

2012-02-12 Thread email builder

> On 2/10/2012 9:20 PM, email builder wrote:

>>  Wonder if I can delete the older one 
> Sure.  Worst case just run sa-update again if you delete the wrong one.

OK, thank you. I'll report back if it causes any problems but I can't imagine 
it would.

>>  Hm, well is there a file or somewhere to look and see what rules are 
>> active? 
> Do you mean something like: With my configuration, what rules might possibly 
> be 
> triggered?

yes

> That's an interesting question.  Perhaps we could use a spamassassin 
> parameter to run, parse config and dump all possible rules that would run 
> (with 
> scores) based on all plugins, etc. that are believed to be configured.  If 
> that 
> is what you want, please open a bug at 
> https://issues.apache.org/SpamAssassin/ 
> assuming no one knows a way this can occur now.

OK it's a feature request then huh? I added it:
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6757

>>>  I believe for SPF you *should* be doing the detecting at your MTA
>>>  (mail server software) and inserting a header for spamassassin to use:
>>>  Received-SPF.  (Because SPF is supposed to use the "envelope 
>>> from",
>>>  which is not necessarily included in a header.)
>>  I see. That makes sense. Is there a wiki page suggesting solutions for 
>> this? Anyone know of tips for doing this in postfix? Or during amavis 
>> processing?
> Interesting thought though while the envelope sender is not in a header per 
> se, 
> it is in the From line for mbox format email, I believe.  If you are using 
> procmail for delivery, for example, there shouldn't be an issue.

Actually, you're right - it seems as long as the envelope info is available you 
would not need to add a new header, no? That depends if the SA SPF rules know 
how to check the envelope or if they only look for a "Received-SPF" header. 
Anyone know the details in that regard?

I use maildrop for delivery out of postfix (and SA runs from maildrop). Postfix 
passes what I think is the envelope sender to maildrop by "-f ${sender}" (I'll 
double check but I think that's accurate).

I'm uncertain if the envelope info gets to SA, though, as my maildrop call to 
SA is: xfilter "/usr/bin/spamc -u $LOGNAME"

I'd rather not add a header if not necessary. Second choice is to do it using 
amavis, as adding a policy server just for this to be pretty extreme.

>>  Me too. I sent emails to myself from Yahoo and Gmail and got these in my 
> X-Spam-Status:
>> 
>>  Gmail: DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU
>>  Yahoo: DKIM_ADSP_CUSTOM_MED,DKIM_SIGNED,T_DKIM_INVALID
>> 
>>  (that last one is interesting - not sure how the message gets altered to 
> break the signature, especially if Gmail works fine (running SA from 
> Maildrop))
> Chasing down DKIM errors can be interesting to say the least.  I found a bug 
> in 
> Sendmail, for example, where it canonicalized the email address in the To: 
> Header which was case-sensitive on the signing so DKIM validation failed.
> 
> Have you looked at the received headers to confirm it is in fact a valid 
> Yahoo! 
> email?
>> 
>>>  I believe SPF tests are also enabled by default, but won't do quite 
> the
>>>  right thing unless you're inserting the Received-SPF header at your 
> MTA.
>>  Well I guess so because I see no SPF hits and I think at least Gmail uses 
> SPF. I'd appreciate any tips on getting those headers inserted.
> Gmail does publish SPF.
> 
> Check your *.pre files and see if you have loadplugin 
> Mail::SpamAssassin::Plugin::SPF
> 
> Also make sure you have Mail::SPF.  This command can help determine that:
> 
> perl -e 'if (require Mail::SPF) { print "Mail::SPF Version is: 
> $Mail::SPF::VERSION\n"; exit 0;} else {exit 1;}' || echo 
> 'Mail::SPF Not Present!'
> Mail::SPF Version is: v2.005
> 
> 
> Regards,
> KAM
>


Re: SPF and DKIM tests by default?

2012-02-12 Thread email builder
> On 2/10/2012 9:35 PM, email builder wrote:

>>  Hi Kevin, thank you for your reply! But I think you should send it to the 
>> list :)
> Hi & Thanks for bringing it back to the list.  Sometimes I'm just trying 
> to bang out answers too quickly!

>>>  You should look in /var/lib/spamassassin.  Because rules are no longer
>>>  paired to releases but released nearly continuously, there is no wiki
>>>  list of all the rules.
>>  Gotcha - but is it certain that all rules in 
>> /var/lib/spamassassin/3.003001/updates_spamassassin_org are being used?
> No.  There are many plugins, configuration options & dependencies that could 
> affect what rules are used.

Oh OK, that's a little surprising, but I understand it can get complex, so 
that's fine.

>>  Oh, sorry for the noob question, but how do I know if I have Mail::DKIM 
>> installed? 
> For example:
> 
> perl -e 'if (require Mail::DKIM) { print "Mail::DKIM Version is: 
> $Mail::DKIM::VERSION\n"; exit 0;} else {exit 1;}' || echo 
> 'Mail::DKIM Not Present!'
> Mail::DKIM Version is: 0.37

Great! Thank you


Re: SPF and DKIM tests by default?

2012-02-12 Thread darxus
On 02/10, email builder wrote:
> > I believe for SPF you *should* be doing the detecting at your MTA
> > (mail server software) and inserting a header for spamassassin to use:
> > Received-SPF.  (Because SPF is supposed to use the "envelope from",
> > which is not necessarily included in a header.)
> 
> I see. That makes sense. Is there a wiki page suggesting solutions for this? 
> Anyone know of tips for doing this in postfix? Or during amavis processing?

I use postfix-policyd-spf-perl.
Which appears to currently be officially hosted at:
https://launchpad.net/postfix-policyd-spf-perl/

-- 
"For gasoline vapor, the explosive range is from 1.3 to 6.0% vapor
to air...useful against soft targets such as...armored vehicles...and
bunkers." - http://www.fas.org/man/dod-101/sys/dumb/fae.htm
http://www.ChaosReigns.com


Re: SPF and DKIM tests by default?

2012-02-12 Thread Kevin A. McGrail

On 2/10/2012 9:20 PM, email builder wrote:
Wonder if I can delete the older one 

Sure.  Worst case just run sa-update again if you delete the wrong one.

Hm, well is there a file or somewhere to look and see what rules are 
active? 
Do you mean something like: With my configuration, what rules might 
possibly be triggered?


That's an interesting question.  Perhaps we could use a spamassassin 
parameter to run, parse config and dump all possible rules that would 
run (with scores) based on all plugins, etc. that are believed to be 
configured.  If that is what you want, please open a bug at 
https://issues.apache.org/SpamAssassin/ assuming no one knows a way this 
can occur now.

I believe for SPF you *should* be doing the detecting at your MTA
(mail server software) and inserting a header for spamassassin to use:
Received-SPF.  (Because SPF is supposed to use the "envelope from",
which is not necessarily included in a header.)

I see. That makes sense. Is there a wiki page suggesting solutions for this? 
Anyone know of tips for doing this in postfix? Or during amavis processing?
Interesting thought though while the envelope sender is not in a header 
per se, it is in the From line for mbox format email, I believe.  If you 
are using procmail for delivery, for example, there shouldn't be an issue.




Me too. I sent emails to myself from Yahoo and Gmail and got these in my 
X-Spam-Status:

Gmail: DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU
Yahoo: DKIM_ADSP_CUSTOM_MED,DKIM_SIGNED,T_DKIM_INVALID

(that last one is interesting - not sure how the message gets altered to break 
the signature, especially if Gmail works fine (running SA from Maildrop))
Chasing down DKIM errors can be interesting to say the least.  I found a 
bug in Sendmail, for example, where it canonicalized the email address 
in the To: Header which was case-sensitive on the signing so DKIM 
validation failed.


Have you looked at the received headers to confirm it is in fact a valid 
Yahoo! email?



I believe SPF tests are also enabled by default, but won't do quite the
right thing unless you're inserting the Received-SPF header at your MTA.

Well I guess so because I see no SPF hits and I think at least Gmail uses SPF. 
I'd appreciate any tips on getting those headers inserted.

Gmail does publish SPF.

Check your *.pre files and see if you have loadplugin 
Mail::SpamAssassin::Plugin::SPF


Also make sure you have Mail::SPF.  This command can help determine that:

perl -e 'if (require Mail::SPF) { print "Mail::SPF Version is: 
$Mail::SPF::VERSION\n"; exit 0;} else {exit 1;}' || echo 'Mail::SPF Not 
Present!'

Mail::SPF Version is: v2.005


Regards,
KAM


Re: SPF and DKIM tests by default?

2012-02-12 Thread Kevin A. McGrail

On 2/10/2012 9:35 PM, email builder wrote:

Hi Kevin, thank you for your reply! But I think you should send it to the list 
:)
Hi & Thanks for bringing it back to the list.  Sometimes I'm just trying 
to bang out answers too quickly!

You should look in /var/lib/spamassassin.  Because rules are no longer
paired to releases but released nearly continuously, there is no wiki
list of all the rules.

Gotcha - but is it certain that all rules in 
/var/lib/spamassassin/3.003001/updates_spamassassin_org are being used?
No.  There are many plugins, configuration options & dependencies that 
could affect what rules are used.
Oh, sorry for the noob question, but how do I know if I have 
Mail::DKIM installed? 

For example:

perl -e 'if (require Mail::DKIM) { print "Mail::DKIM Version is: 
$Mail::DKIM::VERSION\n"; exit 0;} else {exit 1;}' || echo 'Mail::DKIM 
Not Present!'

Mail::DKIM Version is: 0.37

Regards,
KAM


Re: SPF and DKIM tests by default?

2012-02-10 Thread email builder


> From: Kevin A. McGrail 

Hi Kevin, thank you for your reply! But I think you should send it to the list 
:)

>>  Is this the right place to look to know what
>>  tests the server should be running?
>> 
>>  https://spamassassin.apache.org/tests_3_0_x.html
> You should look in /var/lib/spamassassin.  Because rules are no longer 
> paired to releases but released nearly continuously, there is no wiki 
> list of all the rules.

Gotcha - but is it certain that all rules in 
/var/lib/spamassassin/3.003001/updates_spamassassin_org are being used?

>>  > From that page, it seems that SPF checks are normal
>>  but DKIM is not. Is this right?
>> 
>>  Contrary to that, this page suggests that DKIM test are
>>  enabled by default in version 3.3:
>> 
>>  https://wiki.apache.org/spamassassin/Plugin/DKIM
> Yes, 3.1.2 enabled DKIM by default if you have Mail::DKIM installed, I 
> believe.

Oh, sorry for the noob question, but how do I know if I have Mail::DKIM 
installed?

>>  Also, where can I look to verify the tests/rules currently
>>  in place on the server?  (per-user rules are not implemented)
> In the version dir under /var/lib/spamassassin.
>> 
>>  I looked in /usr/share/spamassassin and there are a few
>>  files with "spf" and "dkim" in their names.  Does that
>>  mean those tests are active?
>> 
>>  ls *spf*
>>  -rw-r--r-- 1 root root 3100 Mar 15  2010 25_spf.cf
>>  -rw-r--r-- 1 root root 3584 Mar 15  2010 60_whitelist_spf.cf
>> 
>>  ls *dkim*
>>  -rw-r--r-- 1 root root 4407 Mar 15  2010 25_dkim.cf
>>  -rw-r--r-- 1 root root 9288 Mar 15  2010 60_adsp_override_dkim.cf
>>  -rw-r--r-- 1 root root 6455 Mar 15  2010 60_whitelist_dkim.cf
> 
> I believe SPF and DKIM are enabled by default but that doesn't mean you 
> have all the supporting modules installed.  Did you configure the 
> installation yourself or did you use a package?

I used yum to install a package on centOS



Re: SPF and DKIM tests by default?

2012-02-10 Thread email builder
Thanks a lot for your reply

> Run: sa-update -D 2>&1| grep DIR

> 
> That will output something like:
> 
> Feb  9 12:08:49.609 [20855] dbg: generic: Perl 5.010001, PREFIX=/usr, 
> DEF_RULES_DIR=/usr/share/spamassassin, LOCAL_RULES_DIR=/etc/spamassassin, 
> LOCAL_STATE_DIR=/var/lib/spamassassin
> 
> On this system, sa-update downloads rules to /var/lib/spamassassin, so I
> guess you're looking for the LOCAL_STATE_DIR.

OK, makes sense.  Mine is the same as yours.

> That directory will contain a directory related to your SA version,
> something like 3.003001, which will contain updates_spamassassin_org, which
> will contain the files defining all the rules.  

Hmm, in there I find TWO directories:

 3.002005
 3.003001

Strangely, both have dates of today, but the *contents* of 3.002005 are from 
Apr 3 2011.  So I guess my system uses 3.003001 since it's files are dated 
currently

Wonder if I can delete the older one

> Although that doesn't necessarily tell you which are enabled by default.
> Some require configuration changes.

Hm, well is there a file or somewhere to look and see what rules are active?

> I believe for SPF you *should* be doing the detecting at your MTA
> (mail server software) and inserting a header for spamassassin to use:
> Received-SPF.  (Because SPF is supposed to use the "envelope from",
> which is not necessarily included in a header.)

I see. That makes sense. Is there a wiki page suggesting solutions for this? 
Anyone know of tips for doing this in postfix? Or during amavis processing?

>>  From that page, it seems that SPF checks are normal
>>  but DKIM is not. Is this right?
>> 
>>  Contrary to that, this page suggests that DKIM test are
>>  enabled by default in version 3.3:
>> 
>>  https://wiki.apache.org/spamassassin/Plugin/DKIM
> 
> I don't have anything in my /etc/spamassassin/local.cf related to DKIM, and
> I'm getting DKIM rule hits, so I agree that DKIM is enabled by default
> (although I'm running trunk / v3.4.0 which is unreleased).

Me too. I sent emails to myself from Yahoo and Gmail and got these in my 
X-Spam-Status:

Gmail: DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU
Yahoo: DKIM_ADSP_CUSTOM_MED,DKIM_SIGNED,T_DKIM_INVALID

(that last one is interesting - not sure how the message gets altered to break 
the signature, especially if Gmail works fine (running SA from Maildrop))

> I believe SPF tests are also enabled by default, but won't do quite the
> right thing unless you're inserting the Received-SPF header at your MTA.

Well I guess so because I see no SPF hits and I think at least Gmail uses SPF. 
I'd appreciate any tips on getting those headers inserted.

> None of the SPF or DKIM rules are particularly highly ranked in
> spamassassin rule QA, so I wouldn't actually expect significant
> improvements in accuracy from it:
> http://ruleqa.spamassassin.org/?daterev=20120204
> They both have some substantial flaws.  

I'm OK with that (have been weary about their limitations and not always 100% 
sure about using either of them on my domains), and it's actually the reason 
I'm asking about SA support for them because I would never want to use either 
of them to outright block mail.Just some influence on SA scoring is good.   



Re: SPF and DKIM tests by default?

2012-02-09 Thread darxus
On 02/08, email builder wrote:
> Hello,
> 
> I have a server where I never customized any of the SA
> rules/tests (SA v.3.3.1).  The server does run sa-update
> every day.  Is this the right place to look to know what
> tests the server should be running?
> 
> https://spamassassin.apache.org/tests_3_0_x.html

At the top of that page, it says "Tests Performed: v3.0.x" which is not the
version you are running.  https://spamassassin.apache.org/tests_3_3_x.html
contains tests for 3.3.  I don't know when they get updated, maybe only
when 3.3.0 was released.  I wouldn't trust it much.

Run: sa-update -D 2>&1| grep DIR

That will output something like:

Feb  9 12:08:49.609 [20855] dbg: generic: Perl 5.010001, PREFIX=/usr, 
DEF_RULES_DIR=/usr/share/spamassassin, LOCAL_RULES_DIR=/etc/spamassassin, 
LOCAL_STATE_DIR=/var/lib/spamassassin

On this system, sa-update downloads rules to /var/lib/spamassassin, so I
guess you're looking for the LOCAL_STATE_DIR.

That directory will contain a directory related to your SA version,
something like 3.003001, which will contain updates_spamassassin_org, which
will contain the files defining all the rules.  

Although that doesn't necessarily tell you which are enabled by default.
Some require configuration changes.

I believe for SPF you *should* be doing the detecting at your MTA
(mail server software) and inserting a header for spamassassin to use:
Received-SPF.  (Because SPF is supposed to use the "envelope from",
which is not necessarily included in a header.)

> From that page, it seems that SPF checks are normal
> but DKIM is not. Is this right?
> 
> Contrary to that, this page suggests that DKIM test are
> enabled by default in version 3.3:
> 
> https://wiki.apache.org/spamassassin/Plugin/DKIM

I don't have anything in my /etc/spamassassin/local.cf related to DKIM, and
I'm getting DKIM rule hits, so I agree that DKIM is enabled by default
(although I'm running trunk / v3.4.0 which is unreleased).

I believe SPF tests are also enabled by default, but won't do quite the
right thing unless you're inserting the Received-SPF header at your MTA.

> Also, where can I look to verify the tests/rules currently
> in place on the server?  (per-user rules are not implemented)
> 
> I looked in /usr/share/spamassassin and there are a few
> files with "spf" and "dkim" in their names.  Does that
> mean those tests are active?

Using the official Debian / Ubuntu packages, that directory contains the
rules installed by the spamassassin package, which are only used if you do
not run sa-update.  Which would obviously be sub-optimal.

> ls *spf*
> -rw-r--r-- 1 root root 3100 Mar 15  2010 25_spf.cf
> -rw-r--r-- 1 root root 3584 Mar 15  2010 60_whitelist_spf.cf
> 
> ls *dkim*
> -rw-r--r-- 1 root root 4407 Mar 15  2010 25_dkim.cf
> -rw-r--r-- 1 root root 9288 Mar 15  2010 60_adsp_override_dkim.cf
> -rw-r--r-- 1 root root 6455 Mar 15  2010 60_whitelist_dkim.cf

Those are related, although their presence doesn't indicate anything about
defaults.  

None of the SPF or DKIM rules are particularly highly ranked in
spamassassin rule QA, so I wouldn't actually expect significant
improvements in accuracy from it:
http://ruleqa.spamassassin.org/?daterev=20120204
They both have some substantial flaws.  

-- 
"Every man, woman and child on the face of this earth is at the mercy
of chaos." - a maxwell smart movie
http://www.ChaosReigns.com