[sniffer] Upgrades and changing IPs

2021-09-06 Thread MadScientist madscient...@armresearch.com
Hi Sniffer Folks,

We are upgrading many of our systems this month.

While most of that work will be invisible to you, some IP addresses will
change and short disruptions might occur.

No reason to be alarmed, SNF itself is designed to operate for long
periods even if our systems are down.

BUT, if you have made specific rules in your firewalls to allow
communications with our systems -- maybe for SYNC or for getting
rulebases etc, then you will need to update those rules.

The vast majority of you don't have such rules and so will probably not
even notice the updates as they occur.

I just wanted to put this out there to explain any changes that are
observed.

Best,

_M

-- 

Pete McNeil (MadScientist)
ARM Research Labs, LLC


#
This message is sent to you because you are subscribed to
  the mailing list .
This list is for discussing Message Sniffer,
Anti-spam, Anti-Malware, and related email topics.
For More information see http://www.armresearch.com
To unsubscribe, E-mail to: 
To switch to the DIGEST mode, E-mail to 
To switch to the INDEX mode, E-mail to 
Send administrative queries to  



RE: [sniffer] Call for beta testers... snfrv2r3b1

2004-03-17 Thread Madscientist
I am still working a problem at our hosting facility (a t1 is down) so it 
will be a while before I can get back to the list, however I wanted to 
clear this one up to minimize confusion.

A persistent server instance uses a dynamic poll timing algorithm to 
minimize system loads while maximizing response times. It is probably not 
appropriate to use a fixed time interval for polling since this can cause 
unnecessary system loading and since the dynamic approach we're using has 
proven in our labs to offer improved all-around performance.

When the server has processed a job for a client it polls again immediately 
without waiting.

If no job is found then it will wait a short time before polling again.

If there are no available clients on a poll then the wait time between 
polls will increase in a natural spiral based on a Fibonacci sequence. 
This wait time will continue to expand until either a new job is found or 
the limit is reached. The limit is currently set to 1/2 the maximum client 
base wait time - which amounts to 4 seconds.

It's worth noting that in order for a server instance to get to a given 
wait time (such as 4 seconds) there must have been no messages to process 
for that amount of time. It's also worth noting that some folks using 
spamassassin regularly report message processing times on the order of 5 to 
9+ full seconds for each message (I just read this on the sa list). Based 
on these two factors I've considered that waiting a maximum of 4 seconds to 
process a message after a 4 second lull in activity is probably not an 
issue - especially considering that once the message is processed it will 
likely take only an additional 30ms or so on average for a total of 4.030 
sec (ymmv). This also represents the worst case given the current tuning 
parameters...

Once a job is found then the wait time is reset to the minimum.

Once again, the first poll after a job has been processed has no wait 
time... so if there is a burst of message activity after a 4+ second lull, 
the first message waits a maximum of 4 seconds and the rest wait only a few 
tens of milliseconds.

The monitor messages you are seeing are only a debugging/tuning aid and 
they will be removed for the production version. The timing message is only 
emitted when the server instance has found no messages to process during 
the previous poll.

Hope this helps,
_M
PS: In a situation where peer-server instances become mixed it is possible 
for more than one server instance to become active for a period of time. 
The Fibonacci timing spiral helps to ensure a distributed scattering of 
lock requests when multiple instances are active - thus reducing collisions.

At 03:04 PM 3/17/2004, you wrote:
Pete,

After my previous message, I noticed that 'polling' really means that
Sniffer is waiting that many milliseconds before it processes another
e-mail.
If I'm seeing this correctly, I'd like to request another option available
when spawning the persistent exe: /polling:x (where x = a fixed amount of
milliseconds between polling)
Groet, (regards)
--
ing. Michiel Prins bsc   [EMAIL PROTECTED]
SOS Small Office Solutions / Reject / 
Wannepad 27   -   1066 HW   -Amsterdam
t.+31(0)20-4082627  -  f.+31-(0)20-4082628
--
Consultancy -  Installation -  Maintenance
Network Security   -  Internet  -   E-mail
Software Development -  Project Management
--
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Pete McNeil
Sent: woensdag 17 maart 2004 20:05
To: [EMAIL PROTECTED]
Subject: [sniffer] Call for beta testers... snfrv2r3b1
Hello folks,

I know folks are anxious to get their hands on this version so I'm going to
play this beta round a little looser than usual. Version 2-3b1 implements a
persistent mode feature for our cellular peer-server technology. Launching a
persistent instance of Message Sniffer has the effect of creating a daemon
so that all other instances will elect to be clients. We observed a DRAMATIC
improvement in system performance on our NT4/Imail/Declude test bed.
In static tests on my Toshiba 6100 we saw no memory leaks and consistent
performance over the past 18+ hours of testing. This included several tests
with more than 100+ concurrent client instances - all without failure and
without making the system unresponsive (though the WinXP file system did
start to show signs of strain).
This beta is for the windows platform only... once we're happy with this
version will will make the source and *nix versions available as always.
Windows platform users who are interested in testing the new beta should
download the following file:
http://www.sortmonster.com/MessageSniffer/Betas/snfrv2r3b1.zip

The file contains an executable and a short readme file.

We are going to be extremely busy for the next few hours so we won't be able
to provide support on this until later 

Re: [sniffer] SLM files

2004-03-17 Thread Madscientist
At 03:30 PM 3/17/2004, you wrote:

I have Imail 7.07 running on Win2000, with Declude Junkmail

I come up with errors scanning .SLM files.
Does sniffer use SLM files to process the messages.
Attached a snip from my log files
Sniffer scans whatever file is passed to it with the expectation that it is 
an SMTP message. It doesn't make any special allowances for the type of 
file that is passed.

Hope this helps,
_M


This E-Mail came from the Message Sniffer mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


Re: [sniffer] updater script for Linux

2004-03-05 Thread Madscientist
I'm not sure - but I think there are user submitted perl based update 
scripts on the help page that probably do all of this:

http://www.sortmonster.com/MessageSniffer/Help/AutomatingUpdatesHelp.html

Hope this helps,
_M
At 11:05 PM 3/5/2004, you wrote:
Has anyone written a good Sniffer updater script for Linux which has the
error checking like the one for Windows has?
Bill

This E-Mail came from the Message Sniffer mailing list. For information 
and (un)subscription instructions go to 
http://www.sortmonster.com/MessageSniffer/Help/Help.html


This E-Mail came from the Message Sniffer mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


Re: [sniffer] Bagle J others

2004-03-03 Thread Madscientist
At 01:33 PM 3/3/2004, you wrote:

On Mar 3, 2004, at 12:44 PM, Madscientist wrote:

We have adopted the current policy at least for the short term:

1 ) We block all potentially hazardous extensions including .zip.
Can these virus rules be bypassed?  We have real virus checking and 
don't want our spam checker doing any virus blocking.  Thanks.
Yes. Any rule can be blocked from any rulebase.

I made a mistake when I posted my original message. It is confusing.

The Malware rules we are coding into the system only block messages that 
match known virii/worm patterns, and of those, we are focusing only on 
those that have .zip file attached. We are not focusing on other .exe types.

Just to be clear, the malware rules we are putting in place are very much 
the same as malware rules we have coded in the past.

We are not creating any rules that block attachments.

I apologize again for the confusion.

_M



This E-Mail came from the Message Sniffer mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


Re: [sniffer] Rules Question

2004-03-03 Thread Madscientist
At 04:55 PM 3/3/2004, you wrote:
I am using Declude and have indiv. Sniffer Tests and lets say the
following gets tripped in an email
SNIFFER-WHTLIST result code 000
SNIFFER-PORNresult code 054
Which would take precedence over the other, as far as which would be the
final code passed to Declude?
There is some confusion about this.

A zero result from Message Sniffer as seen by Declude could mean that a 
white rule has fired, or it could mean that no rules matched at all.

In the first case - where an actual white rule has fired, the Message 
Sniffer log will show a White entry and the Final result will reflect 
that white rule. In this case, the white rule takes precedence. Declude 
will see a 0 result code.

In the second case - where no rules matched, the Message Sniffer log will 
show a Clean entry and Declude will see a zero result.

So, from Declude's perspective it will see a zero result in both the 
Clean and the White case. As a result, your SNIFFER-WHTLIST result code 
000 test will fire.

In a case where a white rule is present and a black rule is present the 
white rule will always win. So, if Sniffer saw both rules match a message 
it would return a zero result.

SNIFFER-WHTLIST is a misnomer. It's probably not a good idea to name the 
zero result test this way because most of the time a zero result doesn't 
mean White but instead means Clean.

If you wish to have the white rules in your rulebase separated out then we 
could code those to a 1 result and then you would be able to legitimately 
create a SNIFFER-WHTLIST test checking for a result of 1.

I will point out here that this has been tried once or twice and in both 
cases the user switched back almost immediately because the results were 
confusing.

In Sniffer we use white rules to force a non result more than we ever use 
them to indicate a true white result.

Hope this helps,
_M


This E-Mail came from the Message Sniffer mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


RE: [sniffer] Rules Question

2004-03-03 Thread Madscientist
White rules are entered either upon request or in response to a false 
positive report with your permission. In some cases we will enter a white 
rule based on our own research or in response to a false positive report if 
we feel a core white rule would be more appropriate. We add core white 
rules without permission. We add local rules of any type only with 
permission or by request.

Hope this helps,
_M
At 06:43 PM 3/3/2004, you wrote:
Thanks for the aid.  One last question, you mentioned:

In a case where a white rule is present and a black rule is present the
white rule will always win
So if the White Rule fired 000, it would override a Porn Rule of 54?  If 
so, how are these White Rules entered?

Thanks,

Keith

-Original Message-
From: [EMAIL PROTECTED] on behalf of Madscientist
Sent: Wed 3/3/2004 6:01 PM
To: [EMAIL PROTECTED]
Cc:
Subject: Re: [sniffer] Rules Question


At 04:55 PM 3/3/2004, you wrote:
I am using Declude and have indiv. Sniffer Tests and lets say the
following gets tripped in an email

SNIFFER-WHTLIST result code 000
SNIFFER-PORNresult code 054

Which would take precedence over the other, as far as which 
would be the
final code passed to Declude?

There is some confusion about this.

A zero result from Message Sniffer as seen by Declude could mean 
that a
white rule has fired, or it could mean that no rules matched at all.

In the first case - where an actual white rule has fired, the Message
Sniffer log will show a White entry and the Final result will 
reflect
that white rule. In this case, the white rule takes precedence. 
Declude
will see a 0 result code.

In the second case - where no rules matched, the Message Sniffer 
log will
show a Clean entry and Declude will see a zero result.

So, from Declude's perspective it will see a zero result in both the
Clean and the White case. As a result, your SNIFFER-WHTLIST 
result code
000 test will fire.

In a case where a white rule is present and a black rule is 
present the
white rule will always win. So, if Sniffer saw both rules match a 
message
it would return a zero result.

SNIFFER-WHTLIST is a misnomer. It's probably not a good idea to 
name the
zero result test this way because most of the time a zero result 
doesn't
mean White but instead means Clean.

If you wish to have the white rules in your rulebase separated 
out then we
could code those to a 1 result and then you would be able to 
legitimately
create a SNIFFER-WHTLIST test checking for a result of 1.

I will point out here that this has been tried once or twice and 
in both
cases the user switched back almost immediately because the 
results were
confusing.

In Sniffer we use white rules to force a non result more than 
we ever use
them to indicate a true white result.

Hope this helps,
_M


This E-Mail came from the Message Sniffer mailing list. For 
information and (un)subscription instructions go to 
http://www.sortmonster.com/MessageSniffer/Help/Help.html

p/


This E-Mail came from the Message Sniffer mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


[sniffer] Moving follow up...

2004-03-02 Thread Madscientist
Hello Sniffer Folks.

The critical portions of our move have been completed.
We had very few outages.
We are not expecting any more.
False and Spam processing schedules will stabilize over the next day or so.

Thanks for your support!
_M
This E-Mail came from the Message Sniffer mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


[sniffer] Tanx / Bagle.b

2004-02-17 Thread Madscientist
Hello folks,

The new worm Tanx / Bagle.b seems to be spreading quickly.
We have added a rule to Sniffer for this and we are currently pushing it 
out to all rulebases.

Thanks,
_M
Pete McNeil (Madscientist)
President, MicroNeil Research Corporation.
Chief SortMonster, www.SortMonster.com.
Vox 703-406-2016, Fax 703-406-2017
This E-Mail came from the [EMAIL PROTECTED] mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


Re: [sniffer] Referrals page.

2004-02-17 Thread Madscientist
Now I understand.
Certainly - we will add the referral link.
Thanks!
_M
At 02:56 PM 2/17/2004, you wrote:
In that case, I should rephrase my request:

In addition to our software product for IMail, we also offer email services
to individuals and businesses.
http://www.mxguard.com/individual
http://www.mxguard.com/organization
We currently describe how the service works at:
http://www.mxguard.com/individual/how_it_works.asp
There is a blurb about Sniffer at the bottom of the page (that I just
noticed needs an image and a link to you).
Maybe you can link to these pages?


 You guys are already linked through our Installation pages - you have a
 page to your selves in fact :-)

 http://www.sortmonster.com/MessageSniffer/Installation/IMail-mxGuard.html

 The referrals page is for links to service/product providers who use and
 reference Sniffer.

 Hope this helps,
 _M

 At 12:30 PM 2/17/2004, you wrote:
 Pete,
 
 We interface with your product very well. Please consider adding our
 *mxGuard for IMail* website to your list:
 
  http://www.mxguard.com/postmaster
 
 Regards,
 
 David Gregg
 dgSoft Internet Services
 +1.949.584-1514
 
 ---
 mxGuard for IMail
 Server based spam and virus protection for under $100
 Request a free trial at http://www.mxGuard.com/postmaster
 ---
 
 - Original Message -
 From: Madscientist [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Sent: Tuesday, February 17, 2004 9:11 AM
 Subject: [sniffer] Referrals page.
 
 
   Our referrals page is up and running.
  
   http://www.sortmonster.com/MessageSniffer/Referrals.html
  
   Thanks,
   _M
  
  
   Pete McNeil (Madscientist)
   President, MicroNeil Research Corporation.
   Chief SortMonster, www.SortMonster.com.
   Vox 703-406-2016, Fax 703-406-2017
  
   This E-Mail came from the [EMAIL PROTECTED] mailing list. For
 information and (un)subscription instructions go to
 http://www.sortmonster.com/MessageSniffer/Help/Help.html
  
 
 This E-Mail came from the [EMAIL PROTECTED] mailing list. For
 information and (un)subscription instructions go to
 http://www.sortmonster.com/MessageSniffer/Help/Help.html

 Pete McNeil (Madscientist)
 President, MicroNeil Research Corporation.
 Chief SortMonster, www.SortMonster.com.
 Vox 703-406-2016, Fax 703-406-2017

 This E-Mail came from the [EMAIL PROTECTED] mailing list. For
information and (un)subscription instructions go to
http://www.sortmonster.com/MessageSniffer/Help/Help.html

This E-Mail came from the [EMAIL PROTECTED] mailing list. For 
information and (un)subscription instructions go to 
http://www.sortmonster.com/MessageSniffer/Help/Help.html
Pete McNeil (Madscientist)
President, MicroNeil Research Corporation.
Chief SortMonster, www.SortMonster.com.
Vox 703-406-2016, Fax 703-406-2017
This E-Mail came from the [EMAIL PROTECTED] mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


Re: [sniffer] Autoupdating rule file

2004-02-12 Thread Madscientist
At 10:49 AM 2/12/2004, you wrote:

On Feb 12, 2004, at 8:58 AM, Timothy C. Bohen wrote:

Anyone willing to send me a script that I can use?


Sure, here's mine written in Perl.  It knows enough to check the 
timestamps so it doesn't fetch files when unecessary, keeps a backup copy, 
and does everything in a safe manner such as to not leave your system in 
an unusable state at any time.  It relies on the fact that the rename() 
function is atomic.  I don't make that guarantee on non-unix systems.
Slightly off topic -

Be careful with that assumption. rename() is NOT atomic on windows systems. 
You script should work since it won't be competing with multiple instances 
of itself and is not coordinating with other threads, but it's good to keep 
in mind for other projects. Similarly, writes to files in append mode are 
also not atomic in windows. Watch out!

_M

This E-Mail came from the [EMAIL PROTECTED] mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


[sniffer] Recent hotmail false positives and click atdmt

2004-02-12 Thread Madscientist
Hello folks,

Rule 11075 in the gray hosting group has been temporarily suspended.

This is one of our strongest rules which has been in place for more than 
500 days.

Microsoft recently began using this service to post an advertising link at 
the bottom of all of their messages. We have been trying to compensate for 
this by creating white rules, however the combinations are growing without 
bounds - particularly where forwarding is concerned - so we are abandoning 
this rule for the time being.

Due to the rule's strength ( 4.0) there will likely be an increase in spam 
for a short period while we develop additional black rules to compensate 
for specific spam associated with this service.

Faced with the choice of creating false positives for all hotmail, or 
dealing with increased spam as a result of dropping the rule our policy is 
always to avoid the false positives wherever practical.

I wanted to let everyone know about this since there may be a sudden 
noticeable change in filtering effectiveness, however short lived we can 
make it.

Thanks,
_M
This E-Mail came from the [EMAIL PROTECTED] mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


RE: [sniffer] Rule Strength Analysis Window Change.

2004-02-10 Thread Madscientist
I found myself wondering why the message suddenly got through so I did some 
digging. Turns out the message that got through was sent via 65.32.5.133 
which was another Experimental IP rule that had just been pulled. I'm 
guessing the rule was in place when your previous notes were sent.

The false@ address handles filtering differently than our normal addresses 
(for obvious reasons).

An explanation about our Experimental IP rule program:

A few months ago when DNSBLs started to be heavily attacked and defeated by 
spammers, we implemented a policy of capturing source IPs to verified spam 
that reaches our spamtraps. This is in addition to our standard practices 
of capturing domains, links, structural features, obfuscation mechanisms, 
etc...

Recently we have had a higher than normal rate of false positives on 
experimental IP rules - probably due to the increase in worm activity.

Our policy on Experimental IP rules is very conservative and has just been 
made more so:

1. We only add single IP sources as part of this program, not blocks. 
(blocks may be added through other research).

2. We only add source IPs when we have no doubt about the message we are 
reviewing and the source is through one of our spamtraps - user submissions 
are not used for sourcing IP rules.

3. IP source rules are permanently removed on the first legitimate false 
positive report. Once an IP rule is removed, it cannot be added back to the 
core rulebase. It can be added to specific rulebases by request only.

The intent of the Experimental IP rule program is two fold:

1. Incrementally build and maintain an IP map of sources where there is 
unanimous agreement that the source is not legitimate (as defined by our 
user base). That means, if anybody finds an FP on an IP it is no longer 
eligible for this program.

2. Call attention to compromised equipment quickly wherever it is 
appropriate and assist in correcting the problem if possible. For example, 
we recently worked with a local military base to identify and correct a 
source on their network that was being used to relay porn (and other) spam.

As is always the case, our registered users can block this rule group or 
any specific rules if they wish. If after seeing this explanation you wish 
to block this rule group from your rulebase please send a note to support@ 
(off list). I don't advise this since this program is very effective, but I 
don't wish to discourage it either. In the end the rulebase must be 
compatible with your specific policies.

Hope this helps,
Thanks!
_M
At 06:00 PM 2/10/2004, you wrote:
List Folks!

The Sniffer guys are awesome and responded immediately with a phone call
when my previous post today finally went thru! I have been sending
support e-mails with header info, snippets from my logs, etc. to
support@ and the list - but they were not getting thru. Unfortunately, I
was not sending to the correct address even though I read it many times
to o so. The reason I did not, is as I was concerned that my rule base
would have been updated allowing e-mail from those domains we host to be
wide open. I learned that this would not have been the case and I would
have been contacted prior to any such changes.
The cause was due to our e-mails failing Code 84701 Symbol 62 which was
catching a rule base filtering on IP 65.32.5.132 which is Road Runner in
Tampa Bay. This was causing our own e-mail domains we host to fail. Once
identified on phone it was immediately corrected and all back to normal.
Unfortunately, I did not submit my e-mails to [EMAIL PROTECTED] as
instructed...
(see
http://www.sortmonster.com/MessageSniffer/Help/FalsePositivesHelp.html)
...which would have avoided all my frustrations. Also, I found out that
they do have a phone number on the Micro Neil site. Pete informed me
that they are going to look into another contact or reporting e-mail
address / procedure when someone gets to the point of panic mode, which
I was nearing.
I want to reiterate that Micro Neil, once they got my message responded
immediately and professionally and I was really at fault by not
submitting my info to the false@ address. Thanks.
-Don

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Madscientist
Sent: Tuesday, February 10, 2004 5:26 PM
To: [EMAIL PROTECTED]
Subject: RE: [sniffer] Rule Strength Analysis Window Change.
We didn't get your notes.
I'll call you right away.
_M
At 05:11 PM 2/10/2004, you wrote:
I have sent email several times to this list and support and even
Pete's
email addy which I picked up from a post and both from my personal
email
and our special registered email address [EMAIL PROTECTED] I am
again
trying today. I know of no other way to contact someone there and if I
could secure a phone number would call. It seems none of our emails are
getting through. We are having a major problem whereas any e-mail sent
from any domain hosted to another domain hosted are getting caught by
Sniffer. Can someone