You mention that he should adjust for the weight of his system, but you do
not let him know what weighting system you are using. Can you expand on
that?  I.e. Hold at >10, Delete at >20  Thanks.

John Olden
Systems Administrator
Champaign Park District

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Darrell
([EMAIL PROTECTED])
Sent: Friday, March 04, 2005 9:47 AM
To: [email protected]
Subject: Re: [Declude.JunkMail] Beginner configuration?

Joey, 

A couple of thoughts. 

1.) Look at adding a content test like invURIBL or Message Sniffer.  Both
have trials.
2.) I would not give a negative weight for BONDEDSENDER or SPFPASS. Spammers
can easily setup SPF records.
3.) Add a few of the other RBL style tests.  make sure you adjust the weight
for your system and add the corresponding entries in the $default$.junkmail
file.
XBL(LAST)       dnsbl   %IP4R%.sbl-xbl.spamhaus.org     127.0.0.4       12
0
XBL(ALL)        ip4r    sbl-xbl.spamhaus.org            127.0.0.4       4
0
UCEPROTECT-LAST dnsbl   %IP4R%.dnsbl-1.uceprotect.net   127.0.0.2       6
0
UCEPROTECT-ALL  ip4r    dnsbl-1.uceprotect.net          127.0.0.2       2
0
SENDERDB-BLACK  ip4r    pub.senderdb.net                127.0.0.2       10
0
SENDERDB-SUSPICIOUS     ip4r    pub.senderdb.net        127.0.0.4       4
0
MAILPOLICE-BULK rhsbl   bulk.rhs.mailpolice.com 127.0.0.2       9       0
MAILPOLICE-PORN rhsbl   porn.rhs.mailpolice.com 127.0.0.2       12      0
MAILPOLICE-FRAUD        rhsbl   fraud.rhs.mailpolice.com        127.0.0.2
10      0 


Darrell
 ------------------------------------------------------------------------
Check out http://www.invariantsystems.com for utilities for Declude And
Imail.  IMail/Declude Overflow Queue Monitoring, SURBL/URI integration, MRTG
Integration, and Log Parsers. 

Joey Proulx writes: 

> Thank you for the response.  Here is my global.cfg file: 
> 
> #=========================================    ADVANCED OPTIONS   
> =================================
> 
> CONSOLE ON
> 
> #IPBYPASS       192.0.2.25 
> 
> HOP             0
> #HOPHIGH        1 
> 
> #DNS            127.0.0.1 
> 
> HIDETESTS       CATCHALLMAILS IPNOTINMX NOLEGITCONTENT 
> 
> CATCHALLMAILS           catchallmails   x       x       0       0
> NOLEGITCONTENT          nolegitcontent  x       x       0       -5
> IPNOTINMX               ipnotinmx       x       x       0       -3 
> 
> #=========================================    WHITELISTS 
> =======================================
> 
> #WHITELIST      HABEAS
> #AUTOWHITELIST  ON
> PREWHITELIST    ON
> WHITELIST       AUTH 
> 
> # ----- Domain Example -----
> WHITELIST        FROM   @declude.com
> WHITELIST        FROM   @munis.com 
> 
> # ----- User Example -----
> WHITELIST        FROM   [EMAIL PROTECTED] 
> 
> # ----- TO  Example -----
> #WHITELIST      TO      postmaster@
> #WHITELIST      TO      abuse@ 
> 
> #=========================================    BLACKLISTS 
> =======================================
> 
> #BLACKLIST      fromfile        [path]\Filters\blacklist.txt    x       10

>     0
> #BLACKIP        ipfile          [path]\Filters\blackip.txt      x       10

>     0
> 
> #=========================================   RBL IP4R TESTS   
> ==========================================
> # 1. Definitions of the tests to use (do not edit unless you know what 
> you are doing). These must come before the actions.
> # 2. First is the name of the check, then the type of check (ip4r is a 
> DNS lookup using the reverse of the IP address).
> # 3. For type ip4r, 'matchstring' is the string to look for, or "*" 
> for anything.
> 
> AHBL            ip4r    dnsbl.ahbl.org                  *               6

>    0
> BLITZEDALL      ip4r    opm.blitzed.org                 *               7

>    0
> CBL             ip4r    cbl.abuseat.org                 127.0.0.2       6

>    0
> DSBL            ip4r    list.dsbl.org                   *               6

>    0
> ORDB            ip4r    relays.ordb.org                 *               5

>    0
> SBL             ip4r    sbl.spamhaus.org                *               7

>    0
> SORBS-HTTP      ip4r    dnsbl.sorbs.net                 127.0.0.2       5

>    0
> SORBS-SOCKS     ip4r    dnsbl.sorbs.net                 127.0.0.3       5

>    0
> SORBS-MISC      ip4r    dnsbl.sorbs.net                 127.0.0.4       5

>    0
> SORBS-SMTP      ip4r    dnsbl.sorbs.net                 127.0.0.5       5

>    0
> SORBS-SPAM      ip4r    dnsbl.sorbs.net                 127.0.0.6       4

>    0
> #SORBS-WEB      ip4r    dnsbl.sorbs.net                 127.0.0.7       5

>    0
> SORBS-BLOCK     ip4r    dnsbl.sorbs.net                 127.0.0.8       5

>    0
> SORBS-ZOMBIE    ip4r    dnsbl.sorbs.net                 127.0.0.9       5

>    0
> SORBS-DUHL      ip4r    dnsbl.sorbs.net                 127.0.0.10      4

>    0
> SPAMCOP         ip4r    bl.spamcop.net                  127.0.0.2       7

>    0
> #MTLDB          ip4r    mtldb.declude.com               127.0.0.2       3

>    0
> 
> BONDEDSENDER    ip4r    query.bondedsender.org          127.0.0.10      
> -10     0 
> 
> #ADDITIONAL USED RBL IP4R TESTS
> #FIVETENSRC     ip4r    blackholes.five-ten-sg.com      127.0.0.2       2

>    0
> #JAMMDNSBL      ip4r    dnsbl.jammconsulting.com        127.0.0.2       2

>    0
> 
> #=========================================   RHBSL  TESTS 
> ==========================================
> 
> DSN             rhsbl   dsn.rfc-ignorant.org            127.0.0.2       3

>    0
> #NOABUSE                rhsbl   abuse.rfc-ignorant.org  127.0.0.4       2

>    0
> #NOPOSTMASTER   rhsbl   postmaster.rfc-ignorant.org     127.0.0.3       1

>    0
> 
> #=========================================   OTHER  TESTS 
> ==========================================
> 
> BADHEADERS              badheaders      x       x       8       0
> BASE64                  base64          x       x       4       0
> CMDSPACE                cmdspace        x       x       8       0
> COMMENTS                comments        x       x       7       0
> HELOBOGUS               helovalid       x       x       4       0
> MAILFROM                envfrom         x       x       12      0
> PERCENT                 percent         x       x       10      0
> REVDNS                  revdnsexists    x       x       4       0
> ROUTING                 spamrouting     x       x       2       0
> SPAMHEADERS             spamheaders     x       x       3       0
> SPFFAIL                 spffail         x       x       3       0
> SPFPASS                 spfpass         x       x       -3      0 
> 
> #BCC                    bcc             20      x       5       0
> NONENGLISH              nonenglish      x       x       0       0
> #SUBJECTCHARS           subjectchars    50      x       0       0
> #SUBJECTSPACES          subjectspaces   12      x       5       0 
> 
> #===========================================   FILTERS 
> ===============================================
> 
> #SUBJECT        filter          [path]\Filters\Subject.txt              x

>    0       0
> #WORD           filter          [path]\Declude\Filters\Word.txt         x

>    0       0 
> 
> 
> #=========================================   3RD PARTY  
> =============================================
> 
> #SNIFFER        external        nonzero "[path]\Sniffer\snfrv2r2.exe 
> xnk05x5vmipeaof7"
> #SPAMCHK        external        nonzero "[path]\Spamchk\spamchk.exe"    1

>      0
> 
> 
> #=========================================   TRIGGERS 
> ==============================================
> 
> WEIGHT10        weight          x       x       10      0
> WEIGHT14        weight          x       x       14      0
> WEIGHT20        weight          x       x       20      0 
> 
> #=========================================   ADDITIONAL TESTS  
> ========================================
> # The following tests are commented out by default because they are 
> not commonly used (or they require a subscription).
> 
> #BADWHOIS       rhsbl   whois.rfc-ignorant.org          127.0.0.5     3

>    0
> #BLARS          ip4r    block.blars.org                 *     4       0
> #BOGONS         ip4r    bogons.cymru.com                127.0.0.2     4

>    0
> #COMPU          ip4r    blackhole.compu.net             127.0.0.4     5

>    0
> #DEVNULL        ip4r    dev.null.dk                     127.0.0.2     5

>    0
> #DORKS          ip4r    orbs.dorkslayers.com            127.0.0.2     5

>    0
> #DORKZTL        ip4r    ztl.dorkslayers.com             127.0.0.2     5

>    0
> #DSBLALL        ip4r    unconfirmed.dsbl.org            *     4       0
> #DUL            ip4r    dialups.mail-abuse.org          127.0.0.3     5

>    0
> #FIVETENDUL     ip4r    blackholes.five-ten-sg.com      127.0.0.3     5

>    0
> #FIVETENOPTIN   ip4r    blackholes.five-ten-sg.com      127.0.0.4     5

>    0
> #FIVETENOTHER   ip4r    blackholes.five-ten-sg.com      127.0.0.5     5

>    0
> #FIVETENSRC     ip4r    blackholes.five-ten-sg.com      127.0.0.2     5

>    0
> #FLOWGO         ip4r    flowgoaway.com                  127.0.0.2     5

>    0
> #GUARDBLOCK     ip4r    spamguard.leadmon.net           127.0.0.7     3

>    0
> #GUARDBULK      ip4r    spamguard.leadmon.net           127.0.0.4     3

>    0
> #GUARDDUL       ip4r    spamguard.leadmon.net           127.0.0.2     3

>    0
> #GUARDMULTI     ip4r    spamguard.leadmon.net           127.0.0.6     3

>    0
> #GUARDSINGLE    ip4r    spamguard.leadmon.net           127.0.0.5     3

>    0
> #GUARDSRC       ip4r    spamguard.leadmon.net           127.0.0.3     3

>    0
> #INTERSIL       ip4r    blackholes.intersil.net         127.0.0.2     5

>    0
> #IPWHOIS        ip4r    ipwhois.rfc-ignorant.org        127.0.0.6     3

>    0
> #NJABL          ip4r    dnsbl.njabl.org                 127.0.0.2     5

>    0
> #NJABLDUL       ip4r    dnsbl.njabl.org                 127.0.0.3     5

>    0
> #RBL            ip4r    blackholes.mail-abuse.org       127.0.0.2     5

>    0
> #RSS            ip4r    relays.mail-abuse.org           127.0.0.2     5

>    0
> #SELWERD        ip4r    xbl.selwerd.cx                  127.0.0.2     5

>    0
> #SPAMBAG        ip4r    blacklist.spambag.org           127.0.0.2     5

>    0
> #SPAMTR         ip4r    rbl.spam.org.tr                 127.0.0.2     5

>    0
> #SUMMIT         ip4r    blackholes.2mbit.com            127.0.0.2     5

>    0
> #V6NET          ip4r    spammers.v6net.org              127.0.0.2     5

>    0
> #VISI           ip4r    relays.visi.com                 127.0.0.2     5

>    0
> #ZTA            ip4r    zta.birdsong.org                *     5       0
> #RBLPLUS        ip4r    rbl-plus.mail-abuse.org         127.1.0.1
> #DULPLUS        ip4r    rbl-plus.mail-abuse.org         127.1.0.2
> #RBLANDDUL      ip4r    rbl-plus.mail-abuse.org         127.1.0.3
> #RSSPLUS        ip4r    rbl-plus.mail-abuse.org         127.1.0.4
> #RBLANDRSS      ip4r    rbl-plus.mail-abuse.org         127.1.0.5
> #DULANDRSS      ip4r    rbl-plus.mail-abuse.org         127.1.0.6
> #MAPSALL        ip4r    rbl-plus.mail-abuse.org         127.1.0.7 
> 
>  
> 
> #=========================================   OUTBOUND 
> =============================================
> # The actions listed below only apply to outgoing E-mail, and only if 
> you have the "Pro" version.  Note that the DUL test should NOT # be 
> used to block outgoing mail!
> 
> AHBL            WARN
> BLITZEDALL      WARN
> CBL             WARN
> DSBL            WARN
> ORDB            WARN
> SBL             WARN
> SORBS-HTTP      WARN
> SORBS-SOCKS     WARN
> SORBS-MISC      WARN
> SORBS-SMTP      WARN
> SORBS-SPAM      WARN
> SORBS-WEB       WARN
> SORBS-BLOCK     WARN
> SORBS-ZOMBIE    WARN
> SORBS-DUHL      WARN
> SPAMCOP WARN
> 
> DSN             WARN
> NOABUSE WARN
> NOPOSTMASTER    WARN 
> 
> BADHEADERS      WARN
> BASE64          WARN
> CMDSPACE        WARN
> COMMENTS        WARN
> HELOBOGUS       WARN
> IPNOTINMX       IGNORE
> MAILFROM        WARN
> NOLEGITCONTENT  IGNORE
> PERCENT HOLD
> REVDNS          WARN
> ROUTING         WARN
> SPAMHEADERS     WARN 
> 
> #SNIFFER        WARN 
> 
> WEIGHT10        WARN
> WEIGHT20        WARN 
> 
> 
> #BADWHOIS       WARN
> #BLARS          WARN
> #BOGONS WARN
> #CATCHALLMAILS  IGNORE
> #COMPU          WARN
> #DEVNULL        WARN
> #DORKS          WARN
> #DORKZTL        WARN
> #DSBLALL        WARN
> #DUL            WARN
> #FIVETENDUL     WARN
> #FIVETENOPTIN   WARN
> #FIVETENOTHER   WARN
> #FIVETENSRC     WARN
> #FLOWGO         WARN
> #GUARDBLOCK     WARN
> #GUARDBULK      WARN
> #GUARDDUL       WARN
> #GUARDMULTI     WARN
> #GUARDSINGLE    WARN
> #GUARDSRC       WARN
> #HEUR           WARN
> #INTERSIL       WARN
> #IPWHOIS        WARN
> #NJABL          WARN
> #NJABLDUL       WARN
> #NONENGLISH     WARN
> #RBL            WARN
> #RSS            WARN
> #SELWERD        WARN
> #SPAMBAG        WARN
> #SPAMTR WARN
> #SUMMIT         WARN
> #V6NET          WARN
> #VISI           WARN
> #ZTA            WARN 
> 
> #RBLPLUS        WARN
> #DULPLUS        WARN
> #RBLANDDUL      WARN
> #RSSPLUS        WARN
> #RBLANDRSS      WARN
> #DULANDRSS      WARN
> #MAPSALL        WARN 
> 
> #BCC            WARN
> #NONENGLISH     WARN
> #SPAMDOMAINS    WARN
> #SUBJECTCHARS   WARN
> #SUBJECTSPACES  WARN
> 
> I havent' changed much, only commented out a couple tests that were 
> causing me trouble.  I can certainly use the IP whitelist trick, thank 
> you.  Couple more questions:
> 
> Seems like a URL filter would be very easy to implement (assuming of 
> course you nab that first spam message to add it to the list).  Is 
> this something you all use, and if so, is there a de facto list I can 
> start with?  Perhaps the one that Imail pushes out?
> 
> Also, I know there has been some discussion on this list, but if a 
> message has a weight that indicated HOLD and also ROUTETO, does it do 
> both?  It looks like it is right now.  I have my weights of 10 set to 
> HOLD, and those same messages I'm seeing in the held dir are also 
> showing up in my ROUTETO box.  Especially where I plan to delete 
> messages over 20 in the near future, I'd like to figure this part out.
> 
> Thanks. 
> 
> Joey
> 
> At 09:17 AM 3/4/2005, you wrote:
>> Joey,
>> Declude is very effective when tweaked.  Not to mention the default 
>> global.cfg ships without all of the RBL's that most of us use (XBL, 
>> UCE, MAIL-POLICE, SENDERDB).  Also, there are other 3rd patry 
>> utilties which are very effective at catching spam like like invURIBL 
>> and Message Sniffer.
>> Both of those applications have trial versions.
>> Are you still using the default scale?  Since you have been working 
>> with your global.cfg you might want to post it to the list for us to 
>> look over it and see what you have done so far as to make suggestions.
>> For your clients that you are not in control of I would imagine that 
>> you know the ip blocks they come from or the firewall ip that they 
>> are behind that.  You can whitelist that ip so that them failing the 
>> cmdspace will not be a factor.  CMDSPACE is very effective but direct 
>> connects from clients using outlook will set that off.
>> For SPAMHEADERS I use "LOOSENSPAMHEADERS   ON" this relaxes the 
>> spamheaders test so that it does not trigger on missing message ID 
>> emails.
>> Hope that helps,
>> Darrell
>> ---------------------------------------------------------------------
>> --- Check out http://www.invariantsystems.com for utilities for 
>> Declude And Imail.  IMail/Declude Overflow Queue Monitoring, 
>> SURBL/URI integration, MRTG Integration, and Log Parsers.
>> 
>> Joey Proulx writes:
>>> Hello,
>>> Just downloaded the demo version of Junkmail Pro, and I was curious 
>>> about the basic setup.  For the last two days I've monitored and 
>>> tweaked and held and redirected and spent hours upon hours looking 
>>> over the junkmail setup and rules and whatnot.  I'm wondering if I'm 
>>> reinventing the wheel.
>>> I work for a school district with a big spam problem, but as any of 
>>> you in gov't know, if I tell them we should buy something I need to 
>>> make sure it works.  I was just wondering if there are any tried and 
>>> true setups that any of you are using to cut down on the spam.  I'm 
>>> seeing that this system works, but I'm also still running the 
>>> built-in Imail filter, and I've seen quite a few messages that get 
>>> caught by Imail, but have a Declude score of 0, that should NOT have 
>>> made it through.  Do you all still run the builtin Imail spam as 
>>> well?  Any filters I should definitely setup?
>>> I'm seeing a lot of CMDSPACE and SPAMHEADERS (missing MessageID 
>>> header) from some local clients (I don't control all my clients, so 
>>> I don't think I can make them authenticate).  Should I do away with 
>>> these tests, or can I fix these two issues on the server side?
>>> Thanks for all your help.
>>> _____________________________
>>> Joey Proulx
>>> SAU #21 Technology Support Staff
>>> 2 Alumni Drive
>>> Hampton, NH 03842
>>> (603) 926-8992, ext 115
>>> [EMAIL PROTECTED]
>>> 
>>> ---
>>> [This E-mail was scanned for viruses by Declude Virus 
>>> (http://www.declude.com)]
>>> ---
>>> This E-mail came from the Declude.JunkMail mailing list.  To 
>>> unsubscribe, just send an E-mail to [EMAIL PROTECTED], and type 
>>> "unsubscribe Declude.JunkMail".  The archives can be found at 
>>> http://www.mail-archive.com.
>> 
>> ---
>> [This E-mail was scanned for viruses by Declude Virus 
>> (http://www.declude.com)]
>> 
>> ---
>> This E-mail came from the Declude.JunkMail mailing list.  To 
>> unsubscribe, just send an E-mail to [EMAIL PROTECTED], and type 
>> "unsubscribe Declude.JunkMail".  The archives can be found at 
>> http://www.mail-archive.com.
> 
> ---
> [This E-mail was scanned for viruses by Declude Virus 
> (http://www.declude.com)]
> 
> ---
> This E-mail came from the Declude.JunkMail mailing list.  To 
> unsubscribe, just send an E-mail to [EMAIL PROTECTED], and type 
> "unsubscribe Declude.JunkMail".  The archives can be found at 
> http://www.mail-archive.com.
 

---
[This E-mail was scanned for viruses by Declude Virus
(http://www.declude.com)]

---
This E-mail came from the Declude.JunkMail mailing list.  To unsubscribe,
just send an E-mail to [EMAIL PROTECTED], and type "unsubscribe
Declude.JunkMail".  The archives can be found at
http://www.mail-archive.com.
[MSGID=D84470ce50212c186.SMD]


---
[This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)]

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.

Reply via email to