John Andersen wrote:
> On Sunday 10 December 2006 04:09, Santiago Vila wrote:
>> the image is also created with randomness in it (so I think razor
>> is not very effective with it).
> 
> The image is usually not really randomized (that would require
> too much work), but is randomly corrupted at the
> end of the image.

Yes it is really randomized, and not just at the end.

Even the font colors, size, and word wrap is randomized on a per message basis.

I've repeatedly had multiple system accounts receive the "same" message at
more-or-less the same time, but with a separate connection, each is really
completely different. Take a close look at your image spam sometime. Make sure
you're not looking at ones that were BCCed to multiple accounts at once (same
SMTP ID by your MTA).

As for the work involved, that's what botnets are for. Modern spammers don't use
their own resources, they use stolen ones.  Most of the bots are home PCs on
DSL/Cable networks. These machines usually have more spare CPU than upstream
bandwidth to send with, so the CPU overhead really doesn't slow down the rate of
spam sending.

>From the looks of things the spam is sent out to the bots in some kind of
quasi-html format, and the bot renders the html text into an image with slight
variations in the parameters.

On top of it all, older ones had random "noise dots" inserted. More recent ones
use a background of random colorful geometric figures with a border of random
"splotch" marks, and have the text rendered with a small random vertical offset
on each character (creates a "wavy text line" effect). The geometrics and
vertical offsets serve to help throw off OCRs, but also increase the randomness
of the image.

I just selected 94 image-rendered stock-spams dating from November 21 through
today. Razor did not hit a single one of them.


All that said, I don't think reporting these to Razor will really hurt, but it
won't help either. I don't think Razor can be "diluted" or "poisoned" by these
reports. But they're true random one-offs so they won't likely generate any
hits. (or if they do, it's due to occasional collisions in the random 
parameters)

I'd venture to guess that the Cloudmark folks are smart enough to use a purge
algorithm that favors purging "one-offs" like these. Some kind of modified LRU
that has a hit count bias, or LFU with time-of-last-hit bias, would be my own
approach. That would inhibit any dilution/poisoning impact.












-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys - and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Razor-users mailing list
Razor-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/razor-users

Reply via email to