I'm confused. Are you saying it's catching the same spam messages you about the same amount?

If they are new messages then it's doing well.


On 12/08/15 12:43, Rick Macdougall wrote:
Hi,

Quick and dirty look.

grep CTYME_IXHASH /var/log/spamd/current | wc
    147    2058   79255

grep RAZOR /var/log/spamd/current | wc
    138    1932   73479

grep RCVD_IN_BL_SPAMCOP_NET /var/log/spamd/current | wc
    196    2744   97495

Almost all CTYME hits had a corresponding RAZOR hit.

Regards,

Rick

On 2015-12-08 3:32 PM, Marc Perkel wrote:
I'd like to get a sense from everyone how well it works. Is it hitting
spam other tests aren't hitting? Are there false positives?

On 12/08/15 05:57, Reindl Harald wrote:


Am 08.12.2015 um 14:37 schrieb Alex:
On Sun, Dec 6, 2015 at 11:41 PM, Marc Perkel
<supp...@junkemailfilter.com> wrote:
ixhashdnsbl     CTYME_IXHASH ixhash.junkemailfilter.com.
body            CTYME_IXHASH eval:check_ixhash('CTYME_IXHASH')
describe CTYME_IXHASH iXhash found @ ixhash.junkemailfilter.com
tflags          CTYME_IXHASH net
score           CTYME_IXHASH 5

Are all the messages here unsolicited? It appears they are not, but
that isn't what I was expecting.

There are messages from amazon, skype, harryanddavid, coldwatercreek,
etc.

not what i see here, maybe because skype/amazon and many others are
whitelist_auth and so sortcircuit here

we have 38 hits since yesterday evening
most are far above 15 points
that one would not have reached 8.0 without

Dec  8 09:31:45 mail-gw spamd[1339]: spamd: result: Y 9 -
BAYES_99,BAYES_999,HTML_MESSAGE,IXHASH_CHECK,JEF_IXHASH,RCVD_IN_MSPIKE_H2,SPF_SOFTFAIL,USER_IN_MORE_SPAM_TO scantime=2.9,size=22641,user=sa-milt,uid=189,required_score=5.5,rhost=localhost,raddr=127.0.0.1,rport=/run/spamassassin/spamassassin.sock,mid=<21fc01d13192$d15a3030$740e9090$@search-marketing-services.com>,bayes=1.000000,autolearn=disabled,shortcircuit=no


To score this at 5 relies on bayes00 and pretty much no other spam
rules.

5 is too high

I suppose that could be the same as with DCC/razor, etc, but they're
scored more like 1.7 or even lower.

DCC flags *any* massmail spam or not, hence a no-go here
razor is supposed to work differentely

Suggestions for the best way to use this, and what to expect from it,
would be appreciated.

Any idea how much overlap there is with existing DCC/razor entries?

the idea of different digest-services is that when junk hits different
spamtraps and you have more than one hit score it higher than a
possible FP

below how we handle digest services while i renamed it to "JEF_IXHASH"
since we use also the DNSBL/DNSWL for postscreen and spamassassin
heavily and CTYME don't tell me much in logs :-)

the idea is give adaptive 0.5 points for every IXHASH-source, 1.5
points for IX_HASH in generel, means 2.0 points out to a maximum of
3.5 points for a message on all 4 sources

"DIGEST_MULTIPLE_LOCAL" replaces "DIGEST_MULTIPLE" and adds anothe 2.5
points if a message is on IXHASH+PYZOR, IXHASH+RAZOR, RAOZOR+PYZOR

given a well trained bayes with -3.5 for BAYES_00 and a milter-reject
of 8.0 in combination with all sorts of scored whitelists currently
that gives a nearly 100% hitrate with zero-to-no FP's

# remote hash services
use_pyzor   1
pyzor_path  /usr/bin/pyzor
score       PYZOR_CHECK               0.5
score       RAZOR2_CHECK              0.5
score       RAZOR2_CF_RANGE_51_100    0.5
score       RAZOR2_CF_RANGE_E4_51_100 1.5
score       RAZOR2_CF_RANGE_E8_51_100 2.0
score       GENERIC_IXHASH            0.5
score       NIXSPAM_IXHASH            0.5
score       SEM_IXHASH                0.5
score       JEF_IXHASH                0.5
ixhashdnsbl JEF_IXHASH ixhash.junkemailfilter.com.
body        JEF_IXHASH eval:check_ixhash('JEF_IXHASH')
describe JEF_IXHASH DIGEST: ixhash.junkemailfilter.com
describe    GENERIC_IXHASH            DIGEST: generic.ixhash.net
describe    NIXSPAM_IXHASH            DIGEST: ix.dnsbl.manitu.net
describe SEM_IXHASH DIGEST: ixhash.spameatingmonkey.net
meta        IXHASH_CHECK              (GENERIC_IXHASH ||
NIXSPAM_IXHASH || SEM_IXHASH || JEF_IXHASH)
describe    IXHASH_CHECK              Message hits one ore more IXHASH
digest-sources
meta        DIGEST_MULTIPLE_LOCAL     RAZOR2_CHECK + DCC_CHECK +
PYZOR_CHECK + IXHASH_CHECK > 1
describe    DIGEST_MULTIPLE_LOCAL     Message hits more than one
network digest check (razor, pyzor, ixhash)
score       DIGEST_MULTIPLE_LOCAL     2.5
score       IXHASH_CHECK              1.5
score       DIGEST_MULTIPLE           0







--
Marc Perkel - Sales/Support
supp...@junkemailfilter.com
http://www.junkemailfilter.com
Junk Email Filter dot com
415-992-3400

Reply via email to