Re: Whitelisting Sprint with no domain security

2017-12-06 Thread John Hardin
On Wed, 6 Dec 2017, Alex wrote: John wrote: What is TVD_SPACE_RATIO_MINFP? That appears to be a complex rule, but adds 2.5 points to a basic email with just an image attachment. It's TVD_SPACE_RATIO plus some exclusions of hits on hammy rules. My point was, does it make sense for this rul

Re: Whitelisting Sprint with no domain security

2017-12-06 Thread Alex
Hi, >> What is TVD_SPACE_RATIO_MINFP? That appears to be a complex rule, but >> adds 2.5 points to a basic email with just an image attachment. >> >> https://pastebin.com/cYtygBY9 >> >> I've tried: >> >> whitelist_from_rcvd *@pm.sprintpcs.com sprintpcs.com >> >> Ideas greatly appreciated. > > > Tr

Re: Whitelisting Sprint with no domain security

2017-12-06 Thread John Hardin
On Wed, 6 Dec 2017, Alex wrote: What is TVD_SPACE_RATIO_MINFP? That appears to be a complex rule, but adds 2.5 points to a basic email with just an image attachment. It's TVD_SPACE_RATIO plus some exclusions of hits on hammy rules. -- John Hardin KA7OHZhttp://www.impsec.o

Re: Whitelisting Sprint with no domain security

2017-12-06 Thread David B Funk
On Wed, 6 Dec 2017, Alex wrote: Hi, sprintpcs.com has no domain security and for some reason I can't whitelist them using whitelist_from_rcvd, or even whitelist_from just to make it even more simple. Can someone help me figure out what I'm doing wrong? Ideally I'd like to avoid whitelisting th

Whitelisting Sprint with no domain security

2017-12-06 Thread Alex
Hi, sprintpcs.com has no domain security and for some reason I can't whitelist them using whitelist_from_rcvd, or even whitelist_from just to make it even more simple. Can someone help me figure out what I'm doing wrong? Ideally I'd like to avoid whitelisting them, but many people using their cel

Re: Rule to detect mailsploit

2017-12-06 Thread Kevin A. McGrail
On 12/6/2017 10:00 AM, RW wrote: On Wed, 6 Dec 2017 06:29:01 -0500 Kevin A. McGrail wrote: I've added these rules to KAM.cf and would appreciate feedback. #MAILSPLOIT CONTROL CHARACTER - Thanks to Jan-Pieter Cornet for the idea #NUL header   __KAM_MAILSPLOIT1   From =~ /[\0]/ describe __KAM_MA

Re: Re: HTML_IMAGE_ONLY_* generating too many FP's

2017-12-06 Thread Mark London
On 12/5/2017 5:28 AM, Sebastian Arcus wrote: On 02/12/17 18:45, David Jones wrote: On 12/02/2017 11:22 AM, Sebastian Arcus wrote: On 02/12/17 13:06, Matus UHLAR - fantomas wrote: On 12/01/2017 11:17 AM, Sebastian Arcus wrote: -0.2 RCVD_IN_MSPIKE_H2 RBL: Average reputation (+2)

Re: New From header tactics

2017-12-06 Thread David Jones
On 12/06/2017 08:53 AM, Alex wrote: Also, I know David's scores are different, but is it such a good idea to assign such a large negative value to all mail passing through google? In other words, isn't all mail from google going to pass senderscore90-100, automatically giving every mail from Goo

Re: Rule to detect mailsploit

2017-12-06 Thread micah
RW writes: > On Wed, 6 Dec 2017 06:29:01 -0500 > Kevin A. McGrail wrote: > >> I've added these rules to KAM.cf and would appreciate feedback. >> >> #MAILSPLOIT CONTROL CHARACTER - Thanks to Jan-Pieter Cornet for the >> idea #NUL >> header   __KAM_MAILSPLOIT1   From =~ /[\0]/ >> describe __KAM_MA

Off-Topic, any spamhaus people here?

2017-12-06 Thread Gary Smith
I know this is way off topic, but I'm trying to get ahold of any spamhaus.org support members.

Re: Rule to detect mailsploit

2017-12-06 Thread John Hardin
On Wed, 6 Dec 2017, Antony Stone wrote: On Wednesday 06 December 2017 at 18:15:55, John Hardin wrote: On Wed, 6 Dec 2017, Kevin A. McGrail wrote: Something like this: header__KAM_MAILSPLOIT1 From =~ /[\0]/ describe__KAM_MAILSPLOIT1RFC2047 Exploit https://www.mailsploit.com/ind

Re: Rule to detect mailsploit

2017-12-06 Thread Antony Stone
On Wednesday 06 December 2017 at 18:15:55, John Hardin wrote: > On Wed, 6 Dec 2017, Kevin A. McGrail wrote: > > > > Something like this: > > > > header__KAM_MAILSPLOIT1 From =~ /[\0]/ > > describe__KAM_MAILSPLOIT1RFC2047 Exploit > > https://www.mailsploit.com/index > > > > And a p

Re: Rule to detect mailsploit

2017-12-06 Thread John Hardin
On Wed, 6 Dec 2017, Kevin A. McGrail wrote: On 12/6/2017 4:27 AM, Frido Otten wrote: Yesterday I saw this message that a bug in mailclients allow sender spoofing which bypasses SPF/DKIM/DMARC mechanisms. Maybe you've read about it. More information about it here: https://www.mailsploit.com/i

Re: Does This Look Right?

2017-12-06 Thread Gao
You can use fail2ban and enable postfix-sasl filter, then those IP will be banned after few knocks. Gao On 2017-12-04 11:17 PM, Colony.three wrote: Looks like it's doing what it's supposed to, but just checking... Dec  5 06:58:26 quantumn postfix/smtpd[51554]: lost connection after AUTH from

Re: New From header tactics

2017-12-06 Thread Benny Pedersen
David Jones skrev den 2017-12-06 15:28: I see plenty of legit email with an email address in the From:name so that would need to be a very low score or combined with other rules in a meta. yes misguided spammers wins always I was pointing out the "cc:" in the From:name to try to hide the sen

Re: Rule to detect mailsploit

2017-12-06 Thread RW
On Wed, 6 Dec 2017 06:29:01 -0500 Kevin A. McGrail wrote: > I've added these rules to KAM.cf and would appreciate feedback. > > #MAILSPLOIT CONTROL CHARACTER - Thanks to Jan-Pieter Cornet for the > idea #NUL > header   __KAM_MAILSPLOIT1   From =~ /[\0]/ > describe __KAM_MAILSPLOIT1   RFC2047 Expl

Re: New From header tactics

2017-12-06 Thread Alex
Hi, On Wed, Dec 6, 2017 at 9:02 AM, Benny Pedersen wrote: > David Jones skrev den 2017-12-06 14:54: >> >> Interesting new From: header tactic: >> >> https://pastebin.com/9BhD8m9C >> >> I have reported this to SpamcCop and Google's abuse. > > > if thay ever listing > > untested: > > header __FROM_

Re: New From header tactics

2017-12-06 Thread Kevin A. McGrail
On 12/6/2017 9:33 AM, Kevin A. McGrail wrote: On 12/6/2017 9:28 AM, David Jones wrote: I see plenty of legit email with an email address in the From:name so that would need to be a very low score or combined with other rules in a meta. I was pointing out the "cc:" in the From:name to try to h

Re: New From header tactics

2017-12-06 Thread Kevin A. McGrail
On 12/6/2017 9:28 AM, David Jones wrote: I see plenty of legit email with an email address in the From:name so that would need to be a very low score or combined with other rules in a meta. I was pointing out the "cc:" in the From:name to try to hide the sender's email address at first glance

Re: New From header tactics

2017-12-06 Thread David Jones
On 12/06/2017 08:02 AM, Benny Pedersen wrote: David Jones skrev den 2017-12-06 14:54: Interesting new From: header tactic: https://pastebin.com/9BhD8m9C I have reported this to SpamcCop and Google's abuse. if thay ever listing untested: header __FROM_ILLEGAL_CHARS From:name =~ /[\@?|:?]?/i

Re: New From header tactics

2017-12-06 Thread Benny Pedersen
David Jones skrev den 2017-12-06 14:54: Interesting new From: header tactic: https://pastebin.com/9BhD8m9C I have reported this to SpamcCop and Google's abuse. if thay ever listing untested: header __FROM_ILLEGAL_CHARS From:name =~ /[\@?|:?]?/i could test it imho

New From header tactics

2017-12-06 Thread David Jones
Interesting new From: header tactic: https://pastebin.com/9BhD8m9C I have reported this to SpamcCop and Google's abuse. -- David Jones

Re: Rule to detect mailsploit

2017-12-06 Thread Dianne Skoll
On Wed, 06 Dec 2017 14:37:28 +0100 Benny Pedersen wrote: > http://www.postfix.org/postconf.5.html#message_strip_characters That won't work because the doc says: Note 1: this feature does not recognize text that requires MIME decoding. It inspects raw message content, just like header_ch

Re: Rule to detect mailsploit

2017-12-06 Thread Benny Pedersen
Kevin A. McGrail skrev den 2017-12-06 14:24: Re: #5.  There is an exploit in that From: Where an Email Address is used in the Name Field.  There's been a lot of discussion about that type of email on list that it likely wouldn't apply to this group of rules. http://www.postfix.org/postconf.5.h

Re: Rule to detect mailsploit

2017-12-06 Thread Kevin A. McGrail
On 12/6/2017 8:06 AM, Ian wrote: All 14 variations from the MailSploit website apart from #5 triggered the rule.  This is expected as the From: in #5 is simply: From: "po...@whitehouse.gov" I.e. there doesn't seem to be an exploit in it ;) Thanks Ian.  I appreciate the testing. He's ap

Re: Rule to detect mailsploit

2017-12-06 Thread Ian
On 06/12/2017 11:29, Kevin A. McGrail wrote: I've added these rules to KAM.cf and would appreciate feedback. Hi, All 14 variations from the MailSploit website apart from #5 triggered the rule. This is expected as the From: in #5 is simply: From: "po...@whitehouse.gov" I.e. ther

Re: MSBL Email Blocklist (EBL) SA usage query

2017-12-06 Thread RW
On Tue, 05 Dec 2017 21:03:07 -0500 Michael Grant wrote: > On 5 December 2017 18:40:15 GMT-05:00, Benny Pedersen > wrote: > >Michael Grant skrev den 2017-12-05 19:01: > > > >> loadplugin Mail::SpamAssassin::Plugin::HashBL HashBL.pm > > > >this line must not be in cf file but should be in pre f

Re: Rule to detect mailsploit

2017-12-06 Thread Kevin A. McGrail
I've added these rules to KAM.cf and would appreciate feedback. #MAILSPLOIT CONTROL CHARACTER - Thanks to Jan-Pieter Cornet for the idea  #NUL header   __KAM_MAILSPLOIT1   From =~ /[\0]/ describe __KAM_MAILSPLOIT1   RFC2047 Exploit https://www.mailsploit.com/index  #\n Multiple inthe From Head

Rule to detect mailsploit

2017-12-06 Thread Frido Otten
Hi all, Yesterday I saw this message that a bug in mailclients allow sender spoofing which bypasses SPF/DKIM/DMARC mechanisms. Maybe you've read about it. More information about it here: https://www.mailsploit.com/index I was thinking that there might be a possiblity to detect this in spamassassi

Re: Rule to detect mailsploit

2017-12-06 Thread Kevin A. McGrail
On 12/6/2017 4:27 AM, Frido Otten wrote: Yesterday I saw this message that a bug in mailclients allow sender spoofing which bypasses SPF/DKIM/DMARC mechanisms. Maybe you've read about it. More information about it here: https://www.mailsploit.com/index I was thinking that there might be a possib

Re: FIlter

2017-12-06 Thread Matus UHLAR - fantomas
On 04.12.17 21:04, Junk wrote: what i am asking is how to you manage actual IPs of the hosts providing services. you apparently mean, addresses of blacklists (below). What if at some point one of them or more are out of service? D you monitor it so in case some stop providing the services yo

Rule to detect mailsploit

2017-12-06 Thread Frido Otten
Hi all, Yesterday I saw this message that a bug in mailclients allow sender spoofing which bypasses SPF/DKIM/DMARC mechanisms. Maybe you've read about it. More information about it here: https://www.mailsploit.com/index I was thinking that there might be a possiblity to detect this in spamassassi