Re: Using SA to prevent bouncing spam?

2006-08-17 Thread Ole Nomann Thomsen
Andreas Pettersson wrote:

 Ole Nomann Thomsen wrote:

 Performing callouts will probably cause it to emit strange noises and
 smoke.
 
 
 Why would it?
 It would generate the same amount of connect attempts to FC as it
 already does today, but the spam gets rejected instead of accepted and
 then bounced.

No, see, the problem is nondeliverable spam (NDS). Consider the setup:

Net -(1)- [my box] -(2)- [FC]

At present, I receive everything at (1) and then NDS gets rejected at (2),
generating a bounce. That's one connection to the overworked FC per NDS.

Using callouts, every NDS causes one callout at (2) and then gets rejected
at (1). The load at (2) must be about the same.

But then comes the deliverable spam and ham: They will now generate a
callout at (2), be accepted at (1) and then delivered at (2). 

The total difference would the be one additional VRFY or RCPT TO (ot
whatever callout uses) at (2) per deliverable message, wouldn't it? This is
to much for FC. (But the bounce problem would be solved, I guess).




Re: Using SA to prevent bouncing spam?

2006-08-17 Thread Ole Nomann Thomsen
Ole Nomann Thomsen wrote:

 Hi, in order to avoid bouncing spam back to the (almost certainly) faked
 sender-addresses, I thought I could use SA directly:

Thanks for all your input. Using you replies, I managed to persuade the FC
guys to start providing me with a complete list of valid FC adresses.

I will now soon be able to use static goodrcptto lists or somesuch.

- Ole.



Re: Using SA to prevent bouncing spam?

2006-08-15 Thread Ole Nomann Thomsen
Den 14.08.2006 kl. 19:48 skrev Sanford Whiteman  
[EMAIL PROTECTED]:



Hi, in order to avoid bouncing spam back to the (almost certainly) faked
sender-addresses, I thought I could use SA directly:


What's  your  MTA  and/or SA-invoking app? Surely it is easier to have
that  agent  parse  SA's  feedback  (headers, subject mod or score) in
deciding the final disposition of the msg than to try to trick the MTA
into dumping the mail.


I use Qmail. To obtain the above, I must patch with spam-control or  
similiar.

I'd rather do something simpler.


Please elaborate on the use case in which you can't use MTA processing
rules   to  prevent  backscatter,  given  that  you  trust  SA  markup
completely here, right?


I realize that I did not explain my setup sufficiently in the original  
post:


I run a qmail frontend for a FirstClass system. The qmail accepts mail for
about 500 domains, hosted on the FirstClass system, and scans them with SA.
In then injects them into FirstClass. If the domain is known, but the user  
is

wrong (as in [EMAIL PROTECTED]) the mail is rejected on
smtp-level by FirstClass. Qmail then generates a bounce back to the  
original

sender. In case of spam, origninal sender is faked and we have backscatter.

I know qmail-ldap could be of some use here, but I have no way of setting
up an ldap-server that knows legitimate FirstClass adressess (FirstClass  
itself

could do it, but it is running at 99% capacity most of the time, so no go.
Exporting adresses from FirstClass won't do either, as there are  
forum-adresses
that wont export). This is a classic MTA frontend problem, but I'm  
afraid I'm

stuck with it.

I trust SA enough, that I would suppress all bounces generated by  
undeliverable
mails that SA believes to be spam. I though that if spamassassin wold  
insert

Reply-to:  in any spam message, this would do the trick.

It turns out I misread http://cr.yp.to/proto/mailloops.txt, confusing
replier and bouncer. A replier will use Reply-To: before  
envelope-sender

but a bouncer will not.

Den 15.08.2006 kl. 03:56 skrev John Andersen [EMAIL PROTECTED]:


On Monday 14 August 2006 01:44, Ole Nomann Thomsen wrote:

Hi, in order to avoid bouncing spam back to the (almost certainly) faked
sender-addresses, I thought I could use SA directly:


Why would you bounce spam, with or without spamassassin?


My original post wasn't clear: I *don't* want to bounce spam. And I dont  
want
undeliverable spam to generate bounces. The question was (or should have  
been)

how to avoid the latter in a simple way.

Den 15.08.2006 kl. 04:21 skrev David B Funk [EMAIL PROTECTED]:


Other people have already commented on the issue of bouncing spam.

One detail that I think you don't understand, mail routing is controlled
by the envelope-sender and envelope-recipient addresses, the addresses
in the headers are ignored for that purposes. In most configurations SA
only gets to see/change the headers, it does not get to mess with the
envelope addresses at all.
Thus even if you could get SA to change the header addresses it wouldn't
have your desired effect.


You're absolutely right. As mentioned above, I confused repliers and  
bouncers.


- Ole (thoroughly castigated, thus enlightened :-)



Re: Using SA to prevent bouncing spam?

2006-08-15 Thread Andreas Pettersson

Ole Nomann Thomsen wrote:

I run a qmail frontend for a FirstClass system. The qmail accepts mail 
for
about 500 domains, hosted on the FirstClass system, and scans them 
with SA.
In then injects them into FirstClass. If the domain is known, but the 
user  is

wrong (as in [EMAIL PROTECTED]) the mail is rejected on
smtp-level by FirstClass. Qmail then generates a bounce back to the  
original
sender. In case of spam, origninal sender is faked and we have 
backscatter.


I know qmail-ldap could be of some use here, but I have no way of setting
up an ldap-server that knows legitimate FirstClass adressess 
(FirstClass  itself
could do it, but it is running at 99% capacity most of the time, so no 
go.
Exporting adresses from FirstClass won't do either, as there are  
forum-adresses
that wont export). This is a classic MTA frontend problem, but I'm  
afraid I'm

stuck with it.



While I don't really see why ldap isn't an option, even with an 99% 
load, callout might be the solution.

However, I don't run qmail but here's how it works with exim

http://www.exim.org/exim-html-4.62/doc/html/spec_html/ch39.html#SECTcallver


hälsningar,
Andreas



Re: Using SA to prevent bouncing spam?

2006-08-15 Thread Duncan Hill
On Tuesday 15 August 2006 10:46, Ole Nomann Thomsen wrote:
 I run a qmail frontend for a FirstClass system. The qmail accepts mail for
 about 500 domains, hosted on the FirstClass system, and scans them with SA.
 In then injects them into FirstClass. If the domain is known, but the user
   is
 wrong (as in [EMAIL PROTECTED]) the mail is rejected on
 smtp-level by FirstClass. Qmail then generates a bounce back to the  
 original
 sender. In case of spam, origninal sender is faked and we have backscatter.

Consider switching to qpsmtpd instead of qmail-smtpd, and use a real-time 
recipient verification tool, instead of living with QMail's 'accept 
everything, then bounce' methods.  Or a plugin that can read a static list of 
valid users exported from FirstClass.


Re: Using SA to prevent bouncing spam?

2006-08-15 Thread Ole Nomann Thomsen

Den 15.08.2006 kl. 12:01 skrev Andreas Pettersson [EMAIL PROTECTED]:

While I don't really see why ldap isn't an option, even with an 99%  
load, callout might be the solution.

However, I don't run qmail but here's how it works with exim

http://www.exim.org/exim-html-4.62/doc/html/spec_html/ch39.html#SECTcallver


Yeah, that is pretty neat. But the Firstclass system is running at 99%
capacity on the E-mail injection too. I mean, we are really pumping it in,
trying to level the peak-priod and everything.

Performing callouts will probably cause it to emit strange noises and  
smoke.




Re: Using SA to prevent bouncing spam?

2006-08-15 Thread Duncan Hill
On Tuesday 15 August 2006 11:28, Ole Nomann Thomsen wrote:

 Yeah, that is pretty neat. But the Firstclass system is running at 99%
 capacity on the E-mail injection too. I mean, we are really pumping it in,
 trying to level the peak-priod and everything.

 Performing callouts will probably cause it to emit strange noises and
 smoke.

Static goodrcptto lists are what you need then - assuming your FC user list 
doesn't change very often, you could do a nightly export from FC to 
flatfile/hashed file and feed that file to qmail.  At that point though, 
we're beyond SA, and off topic :)


Re: Using SA to prevent bouncing spam?

2006-08-15 Thread Andreas Pettersson

Ole Nomann Thomsen wrote:


Den 15.08.2006 kl. 12:01 skrev Andreas Pettersson [EMAIL PROTECTED]:

While I don't really see why ldap isn't an option, even with an 99%  
load, callout might be the solution.

However, I don't run qmail but here's how it works with exim

http://www.exim.org/exim-html-4.62/doc/html/spec_html/ch39.html#SECTcallver 




Yeah, that is pretty neat. But the Firstclass system is running at 99%
capacity on the E-mail injection too. I mean, we are really pumping it 
in,

trying to level the peak-priod and everything.

Performing callouts will probably cause it to emit strange noises and  
smoke.



Why would it?
It would generate the same amount of connect attempts to FC as it 
already does today, but the spam gets rejected instead of accepted and 
then bounced.



Regards,
Andreas



Re: Using SA to prevent bouncing spam?

2006-08-15 Thread DAve

Andreas Pettersson wrote:

Ole Nomann Thomsen wrote:

I run a qmail frontend for a FirstClass system. The qmail accepts mail 
for
about 500 domains, hosted on the FirstClass system, and scans them 
with SA.
In then injects them into FirstClass. If the domain is known, but the 
user  is

wrong (as in [EMAIL PROTECTED]) the mail is rejected on
smtp-level by FirstClass. Qmail then generates a bounce back to the  
original
sender. In case of spam, origninal sender is faked and we have 
backscatter.


I know qmail-ldap could be of some use here, but I have no way of setting
up an ldap-server that knows legitimate FirstClass adressess 
(FirstClass  itself
could do it, but it is running at 99% capacity most of the time, so no 
go.
Exporting adresses from FirstClass won't do either, as there are  
forum-adresses
that wont export). This is a classic MTA frontend problem, but I'm  
afraid I'm

stuck with it.



While I don't really see why ldap isn't an option, even with an 99% 
load, callout might be the solution.

However, I don't run qmail but here's how it works with exim

http://www.exim.org/exim-html-4.62/doc/html/spec_html/ch39.html#SECTcallver


hälsningar,
Andreas


chkuser for qmail, think 'Milter-Ahead' on steroids.
http://www.interazioni.it/opensource/chkuser/

If you want to check a static list of users, try validrcptto,
http://qmail.jms1.net/patches/validrcptto.cdb.shtml

I use both, they work great, using SA to stop the backscatter after the 
fact is not the best way to go about this. I wouldn't worry about the 
high load on your FirstClass system, stop the spam from getting past the 
qmail server and your load will likely drop considerably. If you get as 
much spam as we do anyway ;^)


DAve

--
Three years now I've asked Google why they don't have a
logo change for Memorial Day. Why do they choose to do logos
for other non-international holidays, but nothing for
Veterans?

Maybe they forgot who made that choice possible.


Re: Using SA to prevent bouncing spam?

2006-08-15 Thread Bookworm

Ole Nomann Thomsen wrote:

Den 15.08.2006 kl. 12:01 skrev Andreas Pettersson [EMAIL PROTECTED]:

While I don't really see why ldap isn't an option, even with an 99% 
load, callout might be the solution.

However, I don't run qmail but here's how it works with exim

http://www.exim.org/exim-html-4.62/doc/html/spec_html/ch39.html#SECTcallver 



Yeah, that is pretty neat. But the Firstclass system is running at 99%
capacity on the E-mail injection too. I mean, we are really pumping it 
in,

trying to level the peak-priod and everything.

Performing callouts will probably cause it to emit strange noises and 
smoke.
If your usernames don't change a lot, there's a validrcptto patch that 
seems to work quite well.


John Simpson - http://www.jms1.net - has some good information on this 
(don't use IE to go there)


I'm using a modified QmailRocks installation (modified because I helped 
with the Slackware writeup for QMR). I'm modifying further to try to 
squeeze better performance out of spamassassin and daemonizing.


BW



Using SA to prevent bouncing spam?

2006-08-14 Thread Ole Nomann Thomsen
Hi, in order to avoid bouncing spam back to the (almost certainly) faked
sender-addresses, I thought I could use SA directly:

Suppose I configure it to substitute  for the sender/reply-to in any
spam? That way spam-generated bounces would be dumped. Unfortunately It
doesn't seem possible:

* rewrite_header from will let met insert rfc 2822 comments but not
substitute entirely.

* remove_header and add_header will only let me work on X-spam-*
headers.

So am I left with writing my own wrapper here? That means a lot of testing
and double-testing, as I don't feel particularly lucky today.

- Ole.



Re: Using SA to prevent bouncing spam?

2006-08-14 Thread Sanford Whiteman
 Hi, in order to avoid bouncing spam back to the (almost certainly) faked
 sender-addresses, I thought I could use SA directly:

What's  your  MTA  and/or SA-invoking app? Surely it is easier to have
that  agent  parse  SA's  feedback  (headers, subject mod or score) in
deciding the final disposition of the msg than to try to trick the MTA
into dumping the mail.

Please elaborate on the use case in which you can't use MTA processing
rules   to  prevent  backscatter,  given  that  you  trust  SA  markup
completely here, right?

--Sandy



Re: Using SA to prevent bouncing spam?

2006-08-14 Thread John Andersen
On Monday 14 August 2006 01:44, Ole Nomann Thomsen wrote:
 Hi, in order to avoid bouncing spam back to the (almost certainly) faked
 sender-addresses, I thought I could use SA directly:

Why would you bounce spam, with or without spamassassin?

That is a MTA setting, and every MTA in existence today recommends you
NOT bounce either spam or viri.  

-- 
_
John Andersen


pgpOPoY5axDd2.pgp
Description: PGP signature


Re: Using SA to prevent bouncing spam?

2006-08-14 Thread David B Funk
On Mon, 14 Aug 2006, Ole Nomann Thomsen wrote:

 Hi, in order to avoid bouncing spam back to the (almost certainly) faked
 sender-addresses, I thought I could use SA directly:

 Suppose I configure it to substitute  for the sender/reply-to in any
 spam? That way spam-generated bounces would be dumped. Unfortunately It
 doesn't seem possible:

 * rewrite_header from will let met insert rfc 2822 comments but not
 substitute entirely.

 * remove_header and add_header will only let me work on X-spam-*
 headers.

 So am I left with writing my own wrapper here? That means a lot of testing
 and double-testing, as I don't feel particularly lucky today.

 - Ole.

Other people have already commented on the issue of bouncing spam.

One detail that I think you don't understand, mail routing is controlled
by the envelope-sender and envelope-recipient addresses, the addresses
in the headers are ignored for that purposes. In most configurations SA
only gets to see/change the headers, it does not get to mess with the
envelope addresses at all.
Thus even if you could get SA to change the header addresses it wouldn't
have your desired effect.
Only your MTA gets to play with the envelope addresses, so any re-routing
you want to to will have to be done at the MTA level.

You need to look at something like mailscanner or amvis-new which
integrate into your MTA.

-- 
Dave Funk  University of Iowa
dbfunk (at) engineering.uiowa.eduCollege of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include std_disclaimer.h
Better is not better, 'standard' is better. B{