Re: Stan's List [was: free antivirus scanner ?]

2012-01-15 Thread Charles Marcus

On 2012-01-14 5:39 PM, Stan Hoeppner s...@hardwarefreak.com wrote:

On 1/14/2012 6:40 AM, Charles Marcus wrote:


I was more interested in what specific changes he made in order to use
it as a HELO blacklist, and how and why it avoided false positives when
it is used the way we have been using it


It wouldn't really require any changes.  You could use it with
check_helo_access as is.   The reason it avoids FPs in this usage is
just what he stated:  legit MTAs with generic rDNS are going to HELO
with a real hostname, not the rDNS string.


Thanks to you and Noel for the explanation...

I'd also be curious to see comparisons of blocked traffic in these two 
different uses (again by a high volume setup)...


--

Best regards,

Charles


Re: Stan's List [was: free antivirus scanner ?]

2012-01-14 Thread Charles Marcus

On 2012-01-13 6:05 PM, Stan Hoeppner s...@hardwarefreak.com wrote:

On 1/13/2012 2:13 PM, email builder wrote:

  We use a modified version as a HELO blacklist. This avoids the false



Interesting... can you provide specific details on what you mean by
'modified version'?



I second that.  I'm feeling convinced enough to use it as it was
intended, BUT ideally, I don't desire rejecting even those stubborn
people who insist on running their email server from their bedroom
without relaying through their ISP.



Used as intended fqrdns.pcre will definitely block the bedroom email
servers doing direct-to-MX, because odds are high that his parents' PC
or little sister's PC are infected with a spam bot, which again is the
purpose of this table.  Thus, if that is really your desire, you don't
want to use this table.  You're better off using Postscreen.


I was more interested in what specific changes he made in order to use 
it as a HELO blacklist, and how and why it avoided false positives when 
it is used the way we have been using it


--

Best regards,

Charles


Re: Stan's List [was: free antivirus scanner ?]

2012-01-14 Thread Stan Hoeppner
On 1/14/2012 6:40 AM, Charles Marcus wrote:

 I was more interested in what specific changes he made in order to use
 it as a HELO blacklist, and how and why it avoided false positives when
 it is used the way we have been using it

It wouldn't really require any changes.  You could use it with
check_helo_access as is.   The reason it avoids FPs in this usage is
just what he stated:  legit MTAs with generic rDNS are going to HELO
with a real hostname, not the rDNS string.

-- 
Stan





Re: Stan's List [was: free antivirus scanner ?]

2012-01-13 Thread Stan Hoeppner
On 1/13/2012 3:48 AM, DTNX/NGMX Postmaster wrote:
 On 11 jan. 2012, at 16:12, email builder wrote:
 
 http://www.hardwarefreak.com/fqrdns.pcre -- Stan's big list

 So who is using Stan's list?  What do people have to say about
 it?  What should I consider in regard to possibly implementing it?
 
 We use a modified version as a HELO blacklist. This avoids the false 
 positives we saw while testing it as a reverse DNS restriction but, because 
 the use of the reverse hostname as the HELO string is a common pattern in 
 spam attempts from compromised hosts, it's still very effective.
 
 It's a 'check_helo_access' restriction in our 'smtpd_recipient_restrictions', 
 and sits right before our RBL checks, where it has blocked 17235 attempts so 
 far this year, with zero false positives since we started using it, in 
 November somewhere.
 
 So another 'Thanks!' to Stan for providing something that saves us quite a 
 bit of time :-)

You're welcome Jona.  Glad it's useful for you in this manner.  I
believe there are also some users who replace all of the default actions
with their own PREPEND for use in scoring systems.  I'm glad you are
taking advantage of

...As such, you are completely free to use it and modify it as you see
fit, for your purposes, with absolutely no strings attached.

Even better than GPL in many ways.

I still wish to this day I knew the identity of the original author of
the predecessor REGEXP table, so I could credit him in the docs, but he
simply wished to remain anonymous.

I feel kinda weird/guilty/? each time I receive thanks/praise/credit for
something I did not create, but merely polished a little, expanded a
little, maintain a little, and did a little word-of-mouth advertising of
on some lists.  The heavy lifting was done by others.  So, thanks foes
to the anonymous original author as well.

-- 
Stan


Re: Stan's List [was: free antivirus scanner ?]

2012-01-13 Thread email builder
  We use a modified version as a HELO blacklist. This avoids the false

  positives we saw while testing it as a reverse DNS restriction but,
  because the use of the reverse hostname as the HELO string is a
  common pattern in spam attempts from compromised hosts, it's still
  very effective.
 
  It's a 'check_helo_access' restriction in our
  'smtpd_recipient_restrictions', and sits right before our RBL 
 checks,
  where it has blocked 17235 attempts so far this year, with zero false
  positives since we started using it, in November somewhere.
 
 Interesting... can you provide specific details on what you mean by 
 'modified version'?

I second that.  I'm feeling convinced enough to use it as it was
intended, BUT ideally, I don't desire rejecting even those stubborn
people who insist on running their email server from their bedroom
without relaying through their ISP.

Do you have a script that modifies the list into whatever format your
method requires?

Does anyone have any comments on the efficacy of this method?

I assume all it would take is for bots to change the way they
create their HELO hostname to bypass this.



Re: Stan's List [was: free antivirus scanner ?]

2012-01-13 Thread Stan Hoeppner
On 1/13/2012 2:13 PM, email builder wrote:
  We use a modified version as a HELO blacklist. This avoids the false

 Interesting... can you provide specific details on what you mean by 
 'modified version'?
 
 I second that.  I'm feeling convinced enough to use it as it was
 intended, BUT ideally, I don't desire rejecting even those stubborn
 people who insist on running their email server from their bedroom
 without relaying through their ISP.

Used as intended fqrdns.pcre will definitely block the bedroom email
servers doing direct-to-MX, because odds are high that his parents' PC
or little sister's PC are infected with a spam bot, which again is the
purpose of this table.  Thus, if that is really your desire, you don't
want to use this table.  You're better off using Postscreen.

-- 
Stan


Stan's List [was: free antivirus scanner ?]

2012-01-11 Thread email builder


  I'm searching for a friend (who has very few money) an open source
  antivirus scanner for email server that works with Postfix.
 
  Any infos/links/advices  welcome
 
 One link, Google, would have easily found clamav.
 
 Info/advice: with postscreen(8), sane HELO restrictions, and good 
 DNSBLs, clamav is not going to get much use.
 
 http://www.postfix.org/POSTSCREEN_README.html -- Postfix 2.8 req'd
 http://readlist.com/lists/postfix.org/postfix-users/28/140973.html
 http://jimsun.linxnet.com/misc/postfix-anti-UCE.txt
 http://www.spamhaus.org/zen/ -- worth the cost if not gratis for you
 http://www.spamhaus.org/whitepapers/effective_filtering.html
 http://barracudacentral.org/rbl -- gratis but registration req'd
 http://www.hardwarefreak.com/fqrdns.pcre -- Stan's big list

I've been curious about Stan's list of pcres.  It looks massive, and Stan
seems to be a regular expert contributer here.  But I'm reluctant to
start using a text file from a web site with nothing on it and only a
bit of documentation in the file itself (not saying it's not sufficiently
clear to implement, just that I don't feel like I have enough info to
judge if the list will continue to be supported, if it's supported by
more than one person, if it's supported just as a hobby or not,
whether or not many other administrators are making use of it..)

So who is using Stan's list?  What do people have to say about
it?  What should I consider in regard to possibly implementing it?


Re: Stan's List [was: free antivirus scanner ?]

2012-01-11 Thread Charles Marcus

On 2012-01-11 10:12 AM, email builder emailbuilde...@yahoo.com wrote:
 So who is using Stan's list?  What do people have to say about
 it?  What should I consider in regard to possibly implementing it?

I am using it (for a while now)...

This isn't really like a DNSBL, it simply rejects hosts that are 
'spammy', meaning, on dynamic IPs - ie, botnets...


There really is very little worry about FPs (false positives) now, and 
it doesn't need a lot of maintenance... even if Stan never updated it 
again, it would continue to be useful and with little to no FPs probably 
for many years to come...


Try it, you'll be glad you did... ;)

--

Best regards,

Charles


Re: Stan's List [was: free antivirus scanner ?]

2012-01-11 Thread Noel Jones
On 1/11/2012 9:12 AM, email builder wrote:
 
 
  I'm searching for a friend (who has very few money) an open source
  antivirus scanner for email server that works with Postfix.

  Any infos/links/advices  welcome

 One link, Google, would have easily found clamav.

 Info/advice: with postscreen(8), sane HELO restrictions, and good 
 DNSBLs, clamav is not going to get much use.

 http://www.postfix.org/POSTSCREEN_README.html -- Postfix 2.8 req'd
 http://readlist.com/lists/postfix.org/postfix-users/28/140973.html
 http://jimsun.linxnet.com/misc/postfix-anti-UCE.txt
 http://www.spamhaus.org/zen/ -- worth the cost if not gratis for you
 http://www.spamhaus.org/whitepapers/effective_filtering.html
 http://barracudacentral.org/rbl -- gratis but registration req'd
 http://www.hardwarefreak.com/fqrdns.pcre -- Stan's big list
 
 I've been curious about Stan's list of pcres.  It looks massive, and Stan
 seems to be a regular expert contributer here.  But I'm reluctant to
 start using a text file from a web site with nothing on it and only a
 bit of documentation in the file itself (not saying it's not sufficiently
 clear to implement, just that I don't feel like I have enough info to
 judge if the list will continue to be supported, if it's supported by
 more than one person, if it's supported just as a hobby or not,
 whether or not many other administrators are making use of it..)
 
 So who is using Stan's list?  What do people have to say about
 it?  What should I consider in regard to possibly implementing it?

I use it.  Stan occasionally updates it based his experience and
user feedback.  I see the last update was 2011/08. Unlike a dnsbl,
this list does not require much updating; a few times a year is
adequate.

I would consider the list a hobby like many other non-commercial
free antispam services.  If Stan decides to stop supporting and/or
publishing it, it will still keep on working, and someone else might
volunteer official maintenance.  Since it's basically a text file,
any user is free to add/remove entries as they see fit.  I expect
that even with zero updates the file would continue to be fairly
effective for years.

As stated elsewhere, the intent of the file is to reject consumer
dynamic internet connections without the overhead of a DNS lookup.
Connections from these hosts are almost always spambots doing
direct-to-MX spamming.

I would classify it as low risk of false positives, and fairly safe.
(but not 100% safe; few rules are.  YMMV and such.)  I've had a
couple of FP's from idiots that run their business mail servers on a
cablemodem with a dynamic rDNS name (their IP is static, but the
rDNS incorrectly says dynamic), so I added their IP to a local
whitelist.  You may or may not run into the same easily-fixed problem.

Use it like:
smtpd_client_restrictions =
  permit_mynetworks
# uncomment next line if using SASL
# permit_sasl_authenticated
  check_reverse_client_hostname_access pcre:/etc/postfix/fqrdns.pcre

For testing, you can prepend warn_if_reject like this:
  warn_if_reject reject_reverse_client...
This causes postfix to log a warning: message without actually
rejecting the mail.  Then examine the log for anything interesting.

It can alternately be used in smtpd_recipient_restrictions (or any
smtpd_*_restrictions sections), but be sure it's after
permit_mynetworks and permit_sasl_authenticated so you don't reject
your own authorized users.

If you have an old postfix version that doesn't have the
check_reverse_client_hostname_access restriction, you'll need to use
check_client_access instead.  The check_client_access will be a
little less effective, but doesn't affect safety.



  -- Noel Jones


Re: Stan's List [was: free antivirus scanner ?]

2012-01-11 Thread Mark Alan
On Wed, 11 Jan 2012 10:19:36 -0600, Noel Jones njo...@megan.vbhcs.org
wrote:

 I would classify it as low risk of false positives, and fairly safe.
 (but not 100% safe; few rules are.  YMMV and such.)  I've had a
 couple of FP's from idiots that run their business mail servers on a
 cablemodem with a dynamic rDNS name (their IP is static, but the
 rDNS incorrectly says dynamic), so I added their IP to a local
 whitelist.  You may or may not run into the same easily-fixed problem.
 
 Use it like:
 smtpd_client_restrictions =
   permit_mynetworks
 # uncomment next line if using SASL
 # permit_sasl_authenticated
   check_reverse_client_hostname_access pcre:/etc/postfix/fqrdns.pcre

I would also be interesting to be able to use a similar mechanism
earlier, from the postscreen_access_list (after permit_mynetworks
but before going outside to fetch the postscreen_dnsbl_* stuff):

postscreen_access_list = permit_mynetworks,
check_reverse_client_hostname_access pcre:/etc/postfix/fqrdns.pcre

But http://www.postfix.org/postconf.5.html#postscreen_access_list
states:
To discourage the use of hash, btree, etc. tables, there is no
support for substring matching like smtpd(8). Use CIDR tables instead.


M.


Re: Stan's List [was: free antivirus scanner ?]

2012-01-11 Thread /dev/rob0
On Wednesday 11 January 2012 12:52:42 Mark Alan wrote:
 I would also be interesting to be able to use a similar mechanism
 earlier, from the postscreen_access_list (after permit_mynetworks
 but before going outside to fetch the postscreen_dnsbl_* stuff):
 
 postscreen_access_list = permit_mynetworks,
 check_reverse_client_hostname_access pcre:/etc/postfix/fqrdns.pcre

Not possible, because postscreen does not look up PTR.

 But http://www.postfix.org/postconf.5.html#postscreen_access_list
 states:

(This link also lists all possible actions, and 
check_reverse_client_hostname_access is not among them.)

 To discourage the use of hash, btree, etc. tables, there is no
 support for substring matching like smtpd(8). Use CIDR tables
 instead.

But this is merely a dumbed-down version of check_client_access, so 
you're out of luck on this one.
-- 
  http://rob0.nodns4.us/ -- system administration and consulting
  Offlist GMX mail is seen only if /dev/rob0 is in the Subject:


Re: Stan's List [was: free antivirus scanner ?]

2012-01-11 Thread Benny Pedersen

On Wed, 11 Jan 2012 07:12:15 -0800 (PST), email builder wrote:


So who is using Stan's list?


its blowing in the wind


 What do people have to say about it?


good


What should I consider in regard to possibly implementing it?


ask for paypal account to pay Stan



Re: Stan's List [was: free antivirus scanner ?]

2012-01-11 Thread email builder
  http://www.hardwarefreak.com/fqrdns.pcre -- Stan's big list

 
  I've been curious about Stan's list of pcres.  It looks massive, 
 and Stan
  seems to be a regular expert contributer here.  But I'm reluctant to
  start using a text file from a web site with nothing on it and only a
  bit of documentation in the file itself (not saying it's not 
 sufficiently
  clear to implement, just that I don't feel like I have enough info to
  judge if the list will continue to be supported, if it's supported by
  more than one person, if it's supported just as a hobby or not,
  whether or not many other administrators are making use of it..)
 
  So who is using Stan's list?  What do people have to say about
  it?  What should I consider in regard to possibly implementing it?
 
 I use it.  Stan occasionally updates it based his experience and
 user feedback.  I see the last update was 2011/08. Unlike a dnsbl,
 this list does not require much updating; a few times a year is
 adequate.
 
 I would consider the list a hobby like many other non-commercial
 free antispam services.  If Stan decides to stop supporting and/or
 publishing it, it will still keep on working, and someone else might
 volunteer official maintenance.  Since it's basically a text 
 file,
 any user is free to add/remove entries as they see fit.  I expect
 that even with zero updates the file would continue to be fairly
 effective for years.
 
 As stated elsewhere, the intent of the file is to reject consumer
 dynamic internet connections without the overhead of a DNS lookup.
 Connections from these hosts are almost always spambots doing
 direct-to-MX spamming.
 
 I would classify it as low risk of false positives, and fairly safe.
 (but not 100% safe; few rules are.  YMMV and such.)  I've had a
 couple of FP's from idiots that run their business mail servers on a
 cablemodem with a dynamic rDNS name (their IP is static, but the
 rDNS incorrectly says dynamic), so I added their IP to a local
 whitelist.  You may or may not run into the same easily-fixed problem.
 
 Use it like:
 smtpd_client_restrictions =
   permit_mynetworks
 # uncomment next line if using SASL
 # permit_sasl_authenticated
   check_reverse_client_hostname_access pcre:/etc/postfix/fqrdns.pcre
 
 For testing, you can prepend warn_if_reject like this:
   warn_if_reject reject_reverse_client...
 This causes postfix to log a warning: message without actually
 rejecting the mail.  Then examine the log for anything interesting.
 
 It can alternately be used in smtpd_recipient_restrictions (or any
 smtpd_*_restrictions sections), but be sure it's after
 permit_mynetworks and permit_sasl_authenticated so you don't reject
 your own authorized users.
 
 If you have an old postfix version that doesn't have the
 check_reverse_client_hostname_access restriction, you'll need to use
 check_client_access instead.  The check_client_access will be a
 little less effective, but doesn't affect safety.

Noel, thank you for the thorough response.  Thanks also to
all the other responders.  I'm definitely convinced.  :)

And of course, thanks to Stan!



Re: Stan's List [was: free antivirus scanner ?]

2012-01-11 Thread Stan Hoeppner
On 1/11/2012 3:56 PM, email builder wrote:
  http://www.hardwarefreak.com/fqrdns.pcre -- Stan's big list

 Noel, thank you for the thorough response.  Thanks also to
 all the other responders.  I'm definitely convinced.  :)
 
 And of course, thanks to Stan!

Of all days for me to be away from the KB most of the day... ;)

Others have already hit the high points (thanks guys) so I'll simply try
to clarify a few points, confirm some things.

It may be maintained and hosted in a hobby manner, but I'd say the
file gets as much, if not more, professional use than hobby use.  A
small sample of hosts that download the file 'regularly'.  Yes, the top
two are Barracuda Networks, makers of anti-spam appliances.  XS4ALL is a
large ISP in the Netherlands.  Xelerence is a Canadian manufacturer of
DNSSEC security appliances, etc.

  64.235.144.50: mail.ess.barracuda.com
 64.235.150.204: mail.ess.barracuda.com
 82.161.212.182: firehole.xs4all.nl
  83.163.53.136: puzzled.xs4all.nl
193.110.157.188: mx.xelerance.com
  83.139.103.70: dougie.bnet.hr
  83.139.103.73: jimbo.bnet.hr
 38.126.132.162: gateway.dclab.com
62.77.203.7: z.mx.invitel.net
  67.217.170.17: ashburn1.wheelockweb.com
  70.167.15.110: mailbox.dop.com
  80.150.141.20: mail.ecka-granules.com
  88.198.27.178: mx20.monline.it
 173.220.103.45: oouser.polylogics.net
 129.241.43.189: fender.itea.ntnu.no
  147.215.1.189: cache.esiee.fr
 147.32.9.2: nms.fjfi.cvut.cz
 194.156.172.86: mail96.atlas.de
70.43.81.99: smtp.media-brokers.com
 129.187.15.138: lxbsc02.ws.lrz.de
  207.10.60.100: hide-inside.nemetschek.net

Very little time goes into this.  Maintenance simply consists of adding
a expression to match a new or previously unknown rDNS string.  This
typically occurs when an ISP receives a new netblock from its RIR and
puts it into service.  Rarely, one ISP acquires another and renames
their generic rDNS patterns to reflect the new company name.  Adding or
changing rDNS strings is typically a pretty major infrastructure change.
 Thus don't simply don't occur very often.  It's akin to adding new area
codes or prefixes to a telephone system.

It primarily targets 'consumer' rDNS patterns, both dynamic and some
static.  Some static patterns are rejected, some have a prepend for use
with SA and the like.

Regarding Postscreen integration I don't see that as a win.  Postscreen
and the fqrdns.pcre table both target bot spam, but in different ways.
Postscreen targets bot spam directly, fqrdns.pcre indirectly.
Postscreen tends to stop most bot spam on it's own without need of
dnsbls or this pcre table.  Leaving fqrdns.prce in smtpd should kill any
that make it through Postscreen, if any do.

For those who don't know regular expressions, the table looks huge
because we use fully qualified expressions in most cases, making them
very long lines.  And each expression has ISP specific optional
rejection text, taking up even more space.

As Noel mentioned you may get FPs if receiving mail from a host that
sits on a residential or small biz line.  If that occurs the proper way
around it is to whitelist the client IP address, sending domain, or
sender address, with an access table.  See 'man 5 access'.

Let us/me know how it works for you.  Easiest way to check its
performance is with something like:

$ grep -i -c please relay /var/log/[your-mail-log-file]

-- 
Stan