Re: my emailBL is live!

2009-04-29 Thread Mike Cardwell
Adam Katz wrote: Mike Cardwell contended: It would definitely require a hashing algorithm, like MD5. IIRC there is a maximum length for a hostname, and that is 255 characters. What if the hostname in your email address is 255 characters long on it's own...? When MD5sums were first proposed

Re: my emailBL is live!

2009-04-29 Thread John Wilcock
Le 29/04/2009 02:40, Adam Katz a écrit : replaces the @ with a dot (not an underscore, that's not a legal character). Won't that pose problems distinguishing between fred.blo...@example.tld and f...@bloggs.example.tld ? John. -- -- Over 3000 webcams from ski resorts around the world -

Re: 'anti' AWL

2009-04-29 Thread RW
On Tue, 28 Apr 2009 22:14:21 -0400 Matt Kettler mkettler...@verizon.net wrote: Matt Kettler wrote: LuKreme wrote: Of course, first, or last depends on your perspective. I assume RW was thinking of first from a starting at the inside, working backwards in time approach. This is

Re: my emailBL is live!

2009-04-29 Thread Jesse Thompson
Adam Katz wrote: This was actually rather simple to set up. I'll publish the code [snip] Thanks for your efforts with this. I forwarded your message to the APER mailing list. A word of caution. Be very careful how you use the list. The intended usage for the list is to prevent (or

Re: my emailBL is live!

2009-04-29 Thread Rob McEwen
Jesse Thompson wrote: A word of caution. Be very careful how you use the list. OK. I was wrong. Due to this discussion, I'm convinced that MD5 of the whole (lower case!) e-mail address is best, with the entire e-mail address still showing up in plain text in the DNS txt record. But I have some

Re: Physician List

2009-04-29 Thread Jeff Chan
On Tuesday, April 28, 2009, 6:04:50 PM, Karsten Bräckelmann wrote: On Tue, 2009-04-28 at 19:43 -0400, Casartello, Thomas wrote: Has anyone else noticed these messages as a problem? I have had a few complaints about messages getting through my spam filter involving “Physicians List in the USA”

Re: Physician List

2009-04-29 Thread Karsten Bräckelmann
On Wed, 2009-04-29 at 06:42 -0700, Jeff Chan wrote: On Tuesday, April 28, 2009, 6:04:50 PM, Karsten Bräckelmann wrote: I have seen quite a few myself. Unfortunately, they tend to slip by. Made a first attempt at catching them, which helped -- though I do see new variants going under the

Re: my emailBL is live!

2009-04-29 Thread Mike Cardwell
Rob McEwen wrote: A word of caution. Be very careful how you use the list. OK. I was wrong. Due to this discussion, I'm convinced that MD5 of the whole (lower case!) e-mail address is best, with the entire e-mail address still showing up in plain text in the DNS txt record. But I have some

Re: my emailBL is live!

2009-04-29 Thread Jesse Thompson
Rob McEwen wrote: Jesse Thompson wrote: A word of caution. Be very careful how you use the list. OK. I was wrong. Due to this discussion, I'm convinced that MD5 of the whole (lower case!) e-mail address is best, with the entire e-mail address still showing up in plain text in the DNS txt

Re: my emailBL is live!

2009-04-29 Thread John Hardin
On Wed, 29 Apr 2009, Jesse Thompson wrote: A word of caution. Be very careful how you use the list. The intended usage for the list is to prevent (or monitor) local users from sending email to the listed addresses. The phishers frequently use compromised end-user accounts to receive the

419 emailBL?

2009-04-29 Thread John Hardin
On Wed, 29 Apr 2009, Jesse Thompson wrote: A word of caution. Be very careful how you use the list. The intended usage for the list is to prevent (or monitor) local users from sending email to the listed addresses. The phishers frequently use compromised end-user accounts to receive the

Re: 419 emailBL?

2009-04-29 Thread Steve Freegard
John Hardin wrote: On Wed, 29 Apr 2009, Jesse Thompson wrote: A word of caution. Be very careful how you use the list. The intended usage for the list is to prevent (or monitor) local users from sending email to the listed addresses. The phishers frequently use compromised end-user

Re: 419 emailBL?

2009-04-29 Thread Mike Cardwell
Steve Freegard wrote: A word of caution. Be very careful how you use the list. The intended usage for the list is to prevent (or monitor) local users from sending email to the listed addresses. The phishers frequently use compromised end-user accounts to receive the phishing replies, so

Re: Physician List [ATT]

2009-04-29 Thread Karsten Bräckelmann
On Wed, 2009-04-29 at 03:04 +0200, Karsten Bräckelmann wrote: I have seen quite a few myself. Unfortunately, they tend to slip by. Made a first attempt at catching them, which helped -- though I do see new variants going under the radar of a few of my meta's. I'd be interested in getting

Re: 419 emailBL?

2009-04-29 Thread Steve Freegard
Mike Cardwell wrote: Steve Freegard wrote: A word of caution. Be very careful how you use the list. The intended usage for the list is to prevent (or monitor) local users from sending email to the listed addresses. The phishers frequently use compromised end-user accounts to receive the

Re: 419 emailBL?

2009-04-29 Thread Mike Cardwell
Steve Freegard wrote: For listing both emails and uri's it would be useful if you could add regular expressions. I'm not sure how you'd serve such an RBL though without writing your own custom software or modifying an existing dns server. Eg, it would be nice if you could add entries like this

Re: emailBL

2009-04-29 Thread Benny Pedersen
On Tue, April 28, 2009 12:19, Henrik K wrote: On Tue, Apr 28, 2009 at 10:51:33AM +0100, Matt wrote: Henrik K wrote: If someone wants to try it on their mail feed: http://sa.hege.li/pra.cf can be made to milter-regex.conf ? -- http://localhost/ 100% uptime and 100% mirrored :)

Re: 'anti' AWL

2009-04-29 Thread Charles Gregory
I just turned off my AWL today, because of FP issues but f...@example.com sends me lots of mail. Say it's over 100. It's all ham and it all comes from mail.example.com. The AWL for this email couplet is , say -2.1. An email comes in from f...@example.com but sent from

Re: 'anti' AWL

2009-04-29 Thread mouss
RW a écrit : On Tue, 28 Apr 2009 22:14:21 -0400 Matt Kettler mkettler...@verizon.net wrote: Matt Kettler wrote: LuKreme wrote: Of course, first, or last depends on your perspective. I assume RW was thinking of first from a starting at the inside, working backwards in time approach.

Re: 'anti' AWL

2009-04-29 Thread Jonas Eckerman
RW wrote: By your cronological definition of first and last (which is the same as mine), that's the the FIRST non-private address. Or the address in the fake Received header the spambot put in the mail? I hope this is not how it works... It makes sense to me, if I send you an email, the

Re: 'anti' AWL

2009-04-29 Thread Jeff Mincy
From: Charles Gregory cgreg...@hwcn.org Date: Wed, 29 Apr 2009 14:31:22 -0400 (EDT) I just turned off my AWL today, because of FP issues but f...@example.com sends me lots of mail. Say it's over 100. It's all ham and it all comes from mail.example.com. The

Re: my emailBL is live!

2009-04-29 Thread David B Funk
When MD5sums were first proposed (in place of my wild escaping), it seemed like a great idea. However, a voice in the back of my head, now spoken (typed?) by Rob, has been growing louder. My implementation now merely truncates email usernames to 16 characters (plus the noted defanging,

Re: my emailBL is live!

2009-04-29 Thread Adam Katz
David B Funk wrote: Repeat after me, ALMOST ALL characters (octets actually) are now LEGAL in DNS queries (see RFC-2181 section 11). There is NO need for -any- kind of munging. First, you must start and end a domain label (octet refers to IP addresses) with a letter or number, so munging is

Re: [0.0] Re: 'anti' AWL

2009-04-29 Thread Charles Gregory
On Wed, 29 Apr 2009, Jeff Mincy wrote: *someone* is getting their AWL reputation trashed every time a spammer forges their e-mail. AWL stores the IP/16 address with the email address. So your awl reputation is not being trashed by forged e-mail that comes from a different IP address.

Re: my emailBL is live!

2009-04-29 Thread Mike Cardwell
David B Funk wrote: When MD5sums were first proposed (in place of my wild escaping), it seemed like a great idea. However, a voice in the back of my head, now spoken (typed?) by Rob, has been growing louder. My implementation now merely truncates email usernames to 16 characters (plus the

Re: my emailBL is live!

2009-04-29 Thread David B Funk
On Wed, 29 Apr 2009, Adam Katz wrote: David B Funk wrote: Repeat after me, ALMOST ALL characters (octets actually) are now LEGAL in DNS queries (see RFC-2181 section 11). There is NO need for -any- kind of munging. First, you must start and end a domain label (octet refers to IP

Re: my emailBL is live!

2009-04-29 Thread David B Funk
On Wed, 29 Apr 2009, Adam Katz wrote: But your very next topic is contrary to that philosophy... BTW notice that the Google data is multi-valued in the TYPE field. rather than a simple enumeration of that data into an address it is better to turn it into a bit-mask, as then multiple

Re: my emailBL is live!

2009-04-29 Thread Adam Katz
David B Funk wrote: Umm, I guess you didn't understand what the .phish.icaen.uiowa.edu part of address.phish.icaen.uiowa.edu ment. D'oh! Sorry, doing too many things at once. You're right, that worked for me. However, you still have Mike's issue of 63 characters per label and 255 characters

Re: [SA] 419 emailBL?

2009-04-29 Thread Adam Katz
Mike Cardwell wrote: For listing both emails and uri's it would be useful if you could add regular expressions. [...] Steve Freegard responded: Yuck; if you want to do stuff using regexp then: uri RULE_NAME /regexp/ score RULE_NAME nn.nnn Is the best way to do this - not via DNS. Mike

Re: [SA] 419 emailBL?

2009-04-29 Thread Mike Cardwell
Adam Katz wrote: For listing both emails and uri's it would be useful if you could add regular expressions. [...] Steve Freegard responded: Yuck; if you want to do stuff using regexp then: uri RULE_NAME /regexp/ score RULE_NAME nn.nnn Is the best way to do this - not via DNS. Mike

Re: [SA] 419 emailBL?

2009-04-29 Thread Theo Van Dinter
On Wed, Apr 29, 2009 at 6:24 PM, Adam Katz antis...@khopis.com wrote: The mechanism for sa-update is brilliant, but doesn't lend itself to enormous indices of frequently-changing rulesets. I guess it depends what you mean by enormous. A sought rule update is 135k. The likelihood is, imo, that

Re: 'anti' AWL

2009-04-29 Thread LuKreme
On 29-Apr-2009, at 15:31, Charles Gregory wrote: Apologies for original brevity, but my comment was a criticism of the proposal to start weighing *all* mail from a specific sender according to whether the IP was the 'most common' used for that address Essentially changing it from what

Re: my emailBL is live!

2009-04-29 Thread Adam Katz
Jesse Thompson wrote: A word of caution. Be very careful how you use the list. The intended usage for the list is to prevent (or monitor) local users from sending email to the listed addresses. The phishers frequently use compromised end-user accounts to receive the phishing replies, so

Re: 419 emailBL?

2009-04-29 Thread Adam Katz
Theo Van Dinter wrote: On Wed, Apr 29, 2009 at 6:24 PM, Adam Katz antis...@khopis.com wrote: The mechanism for sa-update is brilliant, but doesn't lend itself to enormous indices of frequently-changing rulesets. I guess it depends what you mean by enormous. A sought rule update is 135k.

Re: my emailBL is live!

2009-04-29 Thread John Hardin
On Wed, 29 Apr 2009, Adam Katz wrote: Okay, back to using the second half of the MD5 (simple enough, since that was my original implementation). Relevant code: $hash =~ s/@.*//; $hash =~ tr [A-Z] [a-z]; $hash = substr(Digest::MD5::md5_hex($hash),16); # 2nd 16 of 32 chars ...can you go

Re: 419 emailBL?

2009-04-29 Thread John Hardin
On Wed, 29 Apr 2009, Adam Katz wrote: Theo Van Dinter wrote: On Wed, Apr 29, 2009 at 6:24 PM, Adam Katz antis...@khopis.com wrote: The mechanism for sa-update is brilliant, but doesn't lend itself to enormous indices of frequently-changing rulesets. I guess it depends what you mean by

Re: 'anti' AWL

2009-04-29 Thread RW
On Wed, 29 Apr 2009 20:49:29 +0200 mouss mo...@ml.netoyen.net wrote: on the other hand, a spammer can forge Received headers. and this is a serious problem. Using untrusted received headers is broken. The point of AWL is to tweak ham scores towards the mean to avoid outlying high-scores

Re: 'anti' AWL

2009-04-29 Thread Matt Kettler
RW wrote: Maybe one of us is reading the perl wrong (and it could well be me), or we are talking at cross purposes. As I see it, it's going through the list of IP address, starting with the mail client and working its way towards the SA Server. When it finds a routable IP address it sets

RE: 'anti' AWL

2009-04-29 Thread Mark
-Original Message- From: mouss [mailto:mo...@ml.netoyen.net] Sent: woensdag 29 april 2009 20:53 To: users@spamassassin.apache.org Subject: Re: 'anti' AWL on the other hand, a spammer can forge Received headers. and this is a serious problem. Using untrusted received headers is broken.

Re: 419 emailBL?

2009-04-29 Thread Theo Van Dinter
On Wed, Apr 29, 2009 at 8:06 PM, John Hardin jhar...@impsec.org wrote: And 135k doesn't add up to a lot of bandwidth? ...so don't look for updates more than once every day or two. Yeah, but I think the point was that a frequently changing ruleset would be downloaded frequently. And if

Re: 419 emailBL?

2009-04-29 Thread John Hardin
On Wed, 29 Apr 2009, Theo Van Dinter wrote: On Wed, Apr 29, 2009 at 8:06 PM, John Hardin jhar...@impsec.org wrote: And 135k doesn't add up to a lot of bandwidth? And if bandwidth at the server is a problem, would publishing the ruleset updates via the Coral Cache network work?

sa-update and trusted_networks

2009-04-29 Thread John Hardin
...I thought 127/8 was in trusted networks by default with 3.2.mumble? # sa-update -D [27722] dbg: generic: SpamAssassin version 3.2.5 ... [27722] dbg: conf: trusted_networks are not configured; it is recommended that you configure trusted_networks manually Or is trusted_networks even

Re: sa-update and trusted_networks

2009-04-29 Thread Matt Kettler
John Hardin wrote: ...I thought 127/8 was in trusted networks by default with 3.2.mumble? # sa-update -D [27722] dbg: generic: SpamAssassin version 3.2.5 ... [27722] dbg: conf: trusted_networks are not configured; it is recommended that you configure trusted_networks manually If nothing is

Re: 'anti' AWL

2009-04-29 Thread Matt Kettler
RW wrote: On Wed, 29 Apr 2009 20:49:29 +0200 mouss mo...@ml.netoyen.net wrote: on the other hand, a spammer can forge Received headers. and this is a serious problem. Using untrusted received headers is broken. The point of AWL is to tweak ham scores towards the mean to avoid

Re: 419 emailBL?

2009-04-29 Thread Theo Van Dinter
On Wed, Apr 29, 2009 at 7:56 PM, Adam Katz antis...@khopis.com wrote: I guess it depends what you mean by enormous.  A sought rule update is 135k. And 135k doesn't add up to a lot of bandwidth?  I suppose it depends on the number of users, and I'm figuring worst-case scenario, e.g. when/if

Re: emailBL

2009-04-29 Thread Henrik K
On Wed, Apr 29, 2009 at 08:27:34PM +0200, Benny Pedersen wrote: On Tue, April 28, 2009 12:19, Henrik K wrote: On Tue, Apr 28, 2009 at 10:51:33AM +0100, Matt wrote: Henrik K wrote: If someone wants to try it on their mail feed: http://sa.hege.li/pra.cf can be made to milter-regex.conf

Re: sa-update and trusted_networks

2009-04-29 Thread John Hardin
On Wed, 29 Apr 2009, Matt Kettler wrote: John Hardin wrote: ...I thought 127/8 was in trusted networks by default with 3.2.mumble? # sa-update -D [27722] dbg: generic: SpamAssassin version 3.2.5 ... [27722] dbg: conf: trusted_networks are not configured; it is recommended that you configure

Re: sa-update and trusted_networks

2009-04-29 Thread Matt Kettler
John Hardin wrote: On Wed, 29 Apr 2009, Matt Kettler wrote: John Hardin wrote: ...I thought 127/8 was in trusted networks by default with 3.2.mumble? # sa-update -D [27722] dbg: generic: SpamAssassin version 3.2.5 ... [27722] dbg: conf: trusted_networks are not configured; it is