Re: SIG: SpamAssassin Milter Plugin Remote Arbitrary Command Injection Attempt

2010-03-10 Thread LuKreme
On 9-Mar-2010, at 02:45, Brian wrote:
On Tue, 2010-03-09 at 02:36 -0700, LuKreme wrote:
 
 On 08-Mar-10 23:51, Brian wrote:
 Yes, but that does not answer my question {and is once more Postfix
 biased} AFAIK Postfix is totally unable to reject mail at SMTP time that
 Spamassassin decides IS SPAM without the aid of a milter or policy
 deamon of some kind. Unless you know different?
 
 You don't let messages even GET to SA until they pass sane checks (like 
 reject_non_fqdn_sender and reject_non_fqdn_recipient).
 
 Which spam happily passes, hence the need for Spamassassin to do content
 inspection - unless you are telling me Postfix can offer the same level
 of content inspection as  Spamassassin? (Clue: stock answer - 'Postfix
 is an MTA, it does not do..)

Please read the whole thread. We were talking about a specific threat, as 
detailed in the subject.


-- 
Send beer, words simply can't adequately express your gratitude -- James
Sedgwick



Re: SIG: SpamAssassin Milter Plugin Remote Arbitrary Command Injection Attempt

2010-03-10 Thread LuKreme
On 9-Mar-2010, at 05:51, Brian wrote:
 
 On Tue, 2010-03-09 at 13:17 +0100, Ralf Hildebrandt wrote:
 * Brian brel.astersik100...@copperproductions.co.uk:
 
 In the year 2010 it is not unreasonable to expect the MTA that takes
 responsibility for accepting a message to make reasonable checks about
 the validity or content of that message. 
 
 Postfix can do this either via the milter interface OR the
 smtpd_proxy_filter
 
 It's very easy.
 
 GROAN *** WE KNOW THAT!
 Look at the title and read the post Ralf. The point is you need to use a
 milter or proxy/policy daemon to do this with Postfix.

No you don't. You can completely eliminate the ACI issue with sane checks on 
the SMTP transaction. No milters, plugins, or voodoo required.


-- 
Well I've seen the Heart of Darkness/Read the writing on the wall/an the voice
out in the desert/Was the voice out in the hall



Re: SIG: SpamAssassin Milter Plugin Remote Arbitrary Command Injection Attempt

2010-03-10 Thread LuKreme
On 9-Mar-2010, at 06:50, Brian wrote:
 
 Postfix remains an MTA for the 1990's as it is, but that's just a view.
 If 9x% of the traffic an MTA gets to see is unwanted SPAM, it's not
 unreasonable to expect a solid and reliable built in mechanism to reject
 it.

My postfix rejects more than 90% of all connections attempts at transaction 
stage. It does this without proxies or milters of any kind.

-- 
I am by nature made for my own good, not my own evil



RE: [sa] Re: SMTP REJECT after DATA (was: SpamAssassin Milter Plugin...)

2010-03-10 Thread R-Elists
 

 
 Now THAT is off-topic. We are discussing the use of SA at SMTP time.
 Please stay on-topic for this group, and for this thread.
 
 If you actually care to continue, I expect a reasonable 
 response to my arguments about rejection being better than 
 bouncing or silent diversion.
 Geez, you didn't even try to advocate a system of notices to 
 the user to overcome the 'silent' portion of that argument. 
 Do I have to argue both sides for you? :)
 
 - C
 

Charles,

with all due respect and in right spirit

you know way too much for anyone to have an argument with you...

if you cannot implement all processing and reject in DATA phase, then
well... there it is...

work on it...

your next post says you sometimes have to reject after... and i quote you

---
Charles Gregory Quote:Re: [sa] Re: SMTP REJECT after DATA
The only efficiency to be gained is to reject as much as possible after the
RCPT_TO, before accepting DATA. But for systems like mine, with lousy user
cooperation, rejecting some of the mail after DATA is still the best
option.
---

i would say you are arguing both sides and that it might be the issue.

i would tend to believe that most have made the choice not to straddle the
fence

are you blaming the users for your administration?  ;-)

 - rh



[Fwd: Re: rules]

2010-03-10 Thread Martin Gregorie
Sent just to Matt by mistake. Apologies

 Forwarded Message 
From: Martin Gregorie mar...@gregorie.org
Reply-to: mar...@gregorie.org
To: Matt Kettler mkettler...@verizon.net
Subject: Re: rules
Date: Wed, 10 Mar 2010 12:19:23 +

On Tue, 2010-03-09 at 20:52 -0500, Matt Kettler wrote:
 I'm not really an expert on simscan, but if it calls spamc as an
 interface to spamd, by default spamc will skip scanning messages over
 500kb (to avoid bogging SA down on emails that are more likely to be
 business emails with large attachments). Are the affected messages all
 over 500k?
 
Simscan is a single C source file available here:
http://www.inter7.com/?page=simscan

It goes on a bit but is quite easy to read and there's a README
documenting its arguments in the documentation wiki. Simscan calls spamc
rather than spamassassin. What it does depends on a set of options:

 --enable-spam=y|n Turn on spam scanning. default no.
 --enable-spam-passthru=y|nPass spam email thru or reject
   Default: disable (reject)
 --enable-spamc-user=y|n   Set user option to spamc.
 --enable-spam-hits=number Reject spam above this hit level.
   Default 10.0
 --enable-spamc=PATH   Full path to spamc program.
 --enable-spamc-args=ARGSArguments to pass to spamc.

The --enable-spamc-user controls whether it runs in per-user mode. The
-u option is always used together with any spamc arguments defined with
the simscan --enable-spamc-args=ARGS option, so the OP needs to read
his qmail config to see what, if any, overrides have been supplied.


Martin





Re: SMTP REJECT after DATA (was: SpamAssassin Milter Plugin...)

2010-03-10 Thread Charles Gregory

On Wed, 10 Mar 2010, R-Elists wrote:

Charles Gregory Quote:Re: [sa] Re: SMTP REJECT after DATA
The only efficiency to be gained is to reject as much as possible after the
RCPT_TO, before accepting DATA. But for systems like mine, with lousy user
cooperation, rejecting some of the mail after DATA is still the best
option.

i would say you are arguing both sides and that it might be the issue.


I'm arguing that with such a strong component of YMMV there is NO side 
in this debate that is so woefully wrong as to be labelled 'misguided', 
which is what I was responding to in my first posdt in this thread.



i would tend to believe that most have made the choice not to straddle the
fence


I made my own choice, as outlined above, but 'sit on the fence' with 
regard to my opinion on 'best practice' or 'misguided decisions', because 
I don't belive there really is any one 'good' or 'bad' decision (except 
maybe the decision to backscatter, but we all agree that is 'bad').



are you blaming the users for your administration?  ;-)


Naturally. All good adminsitration is customer driven. |-D

- C


Inconsistent Application of Rules?

2010-03-10 Thread Stephen Carville
I am using spamassassin v 3.2.5 invoked via spamc from Postfix v2.3.3.
 My local.conf file is pretty basic.  The only change is to shut off
the FH_DATE_PAST_20XX rules which triggers for every message from Jan
1, 2010 on

  required_hits 5
  report_safe 0
  rewrite_header Subject [SPAM]
  skip_rbl_checks 0
  score FH_DATE_PAST_20XX 0

I've been seeing several emails lately that are being scored low that,
from what I know of the SA rules should be scored higher.  A recent
example was a typical spam message:

--- Begin ---
March 10, 2010
12:59:09

--- Enter shop here [URL deleted because it causes my message to be rejected]

bunch of random sentence frasgments deleted
--- End ---

The original incoming message arrived in my inbox with the following score:

x-spam-status: No, score=2.1 required=5.0
tests=BAYES_50,RDNS_NONE,URIBL_BLACK   autolearn=no version=3.2.5
x-spam-checker-version: SpamAssassin 3.2.5 (2008-06-10) on cadmzmx01.lereta.com
x-spam-level: **

Out of curiosity I copied the original message body and sent it to
myself from a test address.  The headers this time looked like:

x-spam-status: No, score=4.4 required=5.0 tests=AWL,BAYES_00,
FROM_STARTS_WITH_NUMS,RCVD_IN_DNSWL_LOW,URIBL_AB_SURBL,URIBL_JP_SURBL,
URIBL_OB_SURBL,URIBL_SC_SURBL,URIBL_WS_SURBL autolearn=no
version=3.2.5
x-spam-checker-version: SpamAssassin 3.2.5 (2008-06-10) on cadmzmx01.lereta.com
x-spam-level: 

The second message invoked a larger number of body check rules than
the first but I don't understand why.  Is that normal or do I have
something configured incorrectly?

(I tried sending the complete headers but that message was bounced as spam!)

-- 
Stephen Carville


SpamAssassin Milter Plugin Input Validation Flaw patch

2010-03-10 Thread Robert Schetterer
Hi, an untested patch was written see

http://savannah.nongnu.org/bugs/?29136
http://savannah.nongnu.org/support/download.php?file_id=19901

for urgent might try, other should wait until harder tested i think

-- 
Best Regards

MfG Robert Schetterer

Germany/Munich/Bavaria


Re: Inconsistent Application of Rules?

2010-03-10 Thread John Hardin

On Wed, 10 Mar 2010, Stephen Carville wrote:


--- Enter shop here [URL deleted because it causes my message to be rejected]


Please publish the entire message including all headers to someplace like 
pastebin, and send us the link.



tests=BAYES_50,RDNS_NONE,URIBL_BLACK

Out of curiosity I copied the original message body and sent it to
myself from a test address.  The headers this time looked like:

x-spam-status: No, score=4.4 required=5.0 tests=AWL,BAYES_00,
FROM_STARTS_WITH_NUMS,RCVD_IN_DNSWL_LOW,URIBL_AB_SURBL,URIBL_JP_SURBL,
URIBL_OB_SURBL,URIBL_SC_SURBL,URIBL_WS_SURBL autolearn=no
version=3.2.5
x-spam-checker-version: SpamAssassin 3.2.5 (2008-06-10) on cadmzmx01.lereta.com
x-spam-level: 

The second message invoked a larger number of body check rules than
the first but I don't understand why.  Is that normal or do I have
something configured incorrectly?


The RCVD_IN checks being different aren't surprising as the test message 
came from a different source. The URIBL hits may be due to timing - i.e. 
the URI was added sometime between the original receipt of the message and 
your later test. Whether the original sender should have hit DNSBLs we 
can't tell until you post the original headers.


It looks like a simple matter of a very short spam with a URI that wasn't 
broadly recognized as bad the first time you saw it. Train your bayes with 
it, and consider adding greylisting to give the URIBLs a chance to get 
updated with new spam domains.


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  Failure to plan ahead on someone else's part does not constitute
  an emergency on my part. -- David W. Barts in a.s.r
---
 4 days until Daylight Saving Time begins in U.S. - Spring Forward


Re: [sa] Inconsistent Application of Rules?

2010-03-10 Thread Charles Gregory

On Wed, 10 Mar 2010, Stephen Carville wrote:

I've been seeing several emails lately that are being scored low that,
from what I know of the SA rules should be scored higher.  A recent
example was a typical spam message:
FROM_STARTS_WITH_NUMS,RCVD_IN_DNSWL_LOW,URIBL_AB_SURBL,URIBL_JP_SURBL,
URIBL_OB_SURBL,URIBL_SC_SURBL,URIBL_WS_SURBL autolearn=no
The second message invoked a larger number of body check rules than
the first but I don't understand why.  Is that normal or do I have
something configured incorrectly?


The extra rules are all 'SURBL' blocklist tests which check the embedded 
URI against internet blocklists. It is not uncommon for the first few 
spams using a new URI to get through before the blocklists are updated.
By the time you reran your tests, they had been updated, and so it scored 
higher


- C



Body only checking through spamc

2010-03-10 Thread yongke

Hi

Is there anyway to use spamc to only check the body section of an email? 
This is necessary when checking for emails that haven't been sent yet. 
Please help.
-- 
View this message in context: 
http://old.nabble.com/Body-only-checking-through-spamc-tp27853336p27853336.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Inconsistent Application of Rules?

2010-03-10 Thread Stephen Carville
On Wed, Mar 10, 2010 at 9:14 AM, John Hardin jhar...@impsec.org wrote:
 On Wed, 10 Mar 2010, Stephen Carville wrote:

 --- Enter shop here [URL deleted because it causes my message to be
 rejected]

 Please publish the entire message including all headers to someplace like
 pastebin, and send us the link.

http://www.heronforge.net/files/spam.message.01.txt

http://www.heronforge.net/files/spam.message.02.txt

 The RCVD_IN checks being different aren't surprising as the test message
 came from a different source. The URIBL hits may be due to timing - i.e. the
 URI was added sometime between the original receipt of the message and your
 later test. Whether the original sender should have hit DNSBLs we can't tell
 until you post the original headers.

That would explain the apparent anomaly.

 It looks like a simple matter of a very short spam with a URI that wasn't
 broadly recognized as bad the first time you saw it. Train your bayes with
 it, and consider adding greylisting to give the URIBLs a chance to get
 updated with new spam domains.

I am haven't turned on Baysean filtering yet.  I still need to test
for the false positive rate.   Until a week ago my employer used
Forefront for spam filtering and about 10% of the messages it caught
were legitimate and users were still getting an estimated 72
undetected spam messages per user per day.  That made management
nervous about filtering so I'm taking baby steps at turning on some
tests.  So far the UCE controls in Postfix combined with
Spamassassin's default settings have reduced the undetected spam to an
estimated 2 - 3 per user per day.

-- 
Stephen Carville


Re: Body only checking through spamc

2010-03-10 Thread Martin Gregorie
On Wed, 2010-03-10 at 09:45 -0800, yongke wrote:
 
 Is there anyway to use spamc to only check the body section of an email? 
 This is necessary when checking for emails that haven't been sent yet. 

This is possible provided that all your users send mail through an MTA
that's under your control and that you have controls in place to prevent
them sending mail by other routes. Under these conditions messages will
contain a few headers which it may be worthwhile to scan, e.g.:
From:has the sender been forged?
To:  are there addresses which mail should not be sent to?
Subject: should a subject line always be present? 
Date:is it within, say, 5 minutes of the server's time?

If your users can send messages via other routes forget it. Its not
possible to scan messages that are sent directly to external MTAs.

Since you haven't described your mail set-up its not possible to say
more than this.


Martin




Re: Body only checking through spamc

2010-03-10 Thread yongke

Hi Martin 

Thanks a lot for the reply, the emails our clients sends are under our
control and under our MTA.  How exactly would I do this though?  What I have
is just the email body in HTML from our clients, subject, to, etc, and some
account information.  Do I need to actually get the created final email
outgoing before running spamc on it?  Or can I just run spamc on the HTML
body...

What I have is something like this:

html
text text text..
/html
-- 
View this message in context: 
http://old.nabble.com/Body-only-checking-through-spamc-tp27853336p27854454.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Bogus mails from hijacked accounts

2010-03-10 Thread Dennis B. Hopp
We seem to be having a problem where clients that we interact with
regularly are having their hotmail/gmail/yahoo accounts hijacked.  We
are receiving e-mails from their accounts that legitimately go through
the correct servers (hotmail,yahoo, etc.) and so they get passed through
our spam filters.  The messages have different bodies but basically say
the same thing that they were on vacation and had all their money stolen
so they need to have money wire transferred to them.

Obviously we just have to tell the clients that they need to deal with
the various e-mail providers, but is there an effective way that I can
filter these messages out before my users see them without blacklisting
the address?  In one case I had probably 15 users that received the same
message and naturally they freaked out.

I have put a sample at:

http://pastebin.com/9BDXrxmm

Note I did change the real e-mail address in this message but the
hotmail address used is valid just masked.

The message doesn't hit any rules of significance on my system.

BAYES_00=-1.9,FREEMAIL_FROM=0.001,HTML_MESSAGE=0.001,RCVD_IN_DNSWL_NONE=-0.0001,SPF_PASS=-0.001,T_RP_MATCHES_RCVD=-0.01,T_TO_NO_BRKTS_FREEMAIL=0.01


Thanks

--Dennis



Re: Body only checking through spamc

2010-03-10 Thread Martin Gregorie
On Wed, 2010-03-10 at 11:13 -0800, yongke wrote:
 Thanks a lot for the reply, the emails our clients sends are under our
 control and under our MTA.  How exactly would I do this though?  What I have
 is just the email body in HTML from our clients, subject, to, etc, and some
 account information.  Do I need to actually get the created final email
 outgoing before running spamc on it?  Or can I just run spamc on the HTML
 body...
 
 What I have is something like this:
 
 html
 text text text..
 /html

What, no plain text? That's guaranteed to add some spam points to the
message when its passed to SA. 

You'll need to configure your MTA so mail from your users is passed to
spamc before being passed to a post-processing program. This should let
it be sent if its ham and re-address it to the sender if its spam,
possibly as an attachment to a covering message. If you don't want to
send out mail containing SA headers, the post-processing program can
simply remove all headers that start with X-spam.  

I don't know of a program that can post-process spamc output, but if one
exists I'm certain somebody else will tell you about it. 

Martin




Re: Bogus mails from hijacked accounts

2010-03-10 Thread Martin Gregorie
On Wed, 2010-03-10 at 13:37 -0600, Dennis B. Hopp wrote:

 Obviously we just have to tell the clients that they need to deal with
 the various e-mail providers, but is there an effective way that I can
 filter these messages out before my users see them without blacklisting
 the address?

There's nothing in SA that can blacklist a sending MTA, so blacklisting
can't happen unless you've added something to your MTA set-up that does
auto-blacklisting.

The question then comes down to marking the message as spam and dealing
with it however you normally deal with spam. You'll probably need custom
rule(s) to handle that. You say the message bodies are quite variable,
but I notice that the Reply-to: header doesn't remotely match the From:
header. Is this a common factor?

If it is, and the body texts have no common features that could also be
used, the only obvious approach would be a rule for each forged sending
domain that fires if the sending domain doesn't match the Reply-to
domain. 

Only you can know if these rules would cause false positives: I can't
possibly tell from a single sample message.


Martin
 




Re: Bogus mails from hijacked accounts

2010-03-10 Thread Dennis B. Hopp

On Wed, 2010-03-10 at 20:22 +, Martin Gregorie wrote:
 On Wed, 2010-03-10 at 13:37 -0600, Dennis B. Hopp wrote:
 
  Obviously we just have to tell the clients that they need to deal with
  the various e-mail providers, but is there an effective way that I can
  filter these messages out before my users see them without blacklisting
  the address?
 
 There's nothing in SA that can blacklist a sending MTA, so blacklisting
 can't happen unless you've added something to your MTA set-up that does
 auto-blacklisting.
 

I meant blacklisting the sender address, not the MTA.

 The question then comes down to marking the message as spam and dealing
 with it however you normally deal with spam. You'll probably need custom
 rule(s) to handle that. You say the message bodies are quite variable,
 but I notice that the Reply-to: header doesn't remotely match the From:
 header. Is this a common factor?
 

The ones that I have seen the reply-to doesn't match the from and I
think the reply-to have all been something.jp

 If it is, and the body texts have no common features that could also be
 used, the only obvious approach would be a rule for each forged sending
 domain that fires if the sending domain doesn't match the Reply-to
 domain. 
 

There isn't anything in common that I can see that wouldn't be
susceptible to false positives.  One even left the clients signature
intact.  I've written fairly simple custom rules before but I'm not sure
how to do conditional rules.  I'll have to dig into the docs a little
more.
 
 Only you can know if these rules would cause false positives: I can't
 possibly tell from a single sample message.
 

I wasn't expecting anybody to give me a magic rule that would fix it,
just suggestions since I would only be able to blacklist the sender
address after the e-mail had been received and I was notified of the
problem.  And obviously blacklisting all of gmail/hotmail/yahoo isn't an
option.

Thanks,

--Dennis



Re: Bogus mails from hijacked accounts

2010-03-10 Thread Martin Gregorie
On Wed, 2010-03-10 at 15:08 -0600, Dennis B. Hopp wrote:
 I meant blacklisting the sender address, not the MTA.
 
From what you're describing the senders are all forged by somebody who
bought or stole a list of valid hotmail etc. addresses and the
corresponding addresses in your domain, so blacklisting anything is
probably a bad idea because it wouldn't do anything except annoy the
actual owner of the address.
 
 There isn't anything in common that I can see that wouldn't be
 susceptible to false positives.  One even left the clients signature
 intact.  I've written fairly simple custom rules before but I'm not sure
 how to do conditional rules.  I'll have to dig into the docs a little
 more.

Its not conditional, just using a meta rule and negating the Reply-to
test in the meta:

describe FORGED_HOTMAIL   Hotmail with non-Hotmail Reply-to address
header   __FORGED_HM1 From ~= /\...@hotmail\.com/i
header   __FORGED_HM2 Reply-to ~= /\...@hotmail\.com/i
meta FORGED_HOTMAIL   (__FORGED_HM1  !__FORGED_HM2)
scoreFORGED_HOTMAIL   5.0

and write cookie cutter rules for Yahoo and Gmail. 

OTOH if you're happy that a Japanese test won't generate FPs you can
cover all three ISPs with one rule:  

describe FORGED_FROM Hotmail,Yahoo or Google with Japanese Reply-to 
header   __FF1   From ~= /\@(hotmail|yahoo|gmail)\.com/i
header   __FF2   Reply-to ~= /\.jp/i
meta FORGED_FROM (__FF1  __FF2)
scoreFORGED_FROM 5.0

Of course, if its just a few Japanese ISPs being used you can easily
make _FF2 more specific.


Martin




My First Spam Mail Today

2010-03-10 Thread Carlos Mennens
OK so today I got my 1st spam email from someone at a yahoo.com email
address. Basically SA didn't score it at all and 'Postgray' did it's
job. Below are the headers from SA:

X-spam-checker-version: SpamAssassin 3.3.0 (2010-01-18) on mail.iamghost.com
X-spam-level:
X-spam-status: No, score=0.0 required=6.3 tests=FREEMAIL_FROM,
RCVD_IN_DNSWL_NONE,TVD_SPACE_RATIO,T_DKIM_INVALID autolearn=ham
version=3.3.0
Received: from web51707.mail.re2.yahoo.com
(web51707.mail.re2.yahoo.com [206.190.38.225]) by mail.iamghost.com
(Postfix) with SMTP id 094744059 for car...@iamghost.com; Wed, 10
Mar 2010 11:04:04 -0500 (EST)
Received: (qmail 55813 invoked by uid 60001); 10 Mar 2010 12:04:03 -
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com;
s=s1024; t=1268222643;
bh=40eDTxXUsGn0fMF8GraXJhuKKlHlm9is5R5TfWxrsTY=;
h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type;
b=AB7PjrgviIl6G8eoxtXEYsRV0r/L744GYWgtL8pwpEOkKQPQPIarPNrd7csXfXc5Xl1AZyABQy8cx26ljNyrhAz90LdRHzFIZ+4cXTwqfiGz4ep/fGOyTjIeYW642wtUbtGCskCF5x0ffoTaBDD5Zk0WTARijt/0sGXnoFAb/6w=
Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com;
h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type;
b=Tyd/oHsBFk0RvLYTw+I5/poGilD24lzOF6hzQ0wPGB2dGz1yn/HruU+3Rb69gzKVSiW3RXuBNn4XdBB5t2mrPXq67Ji2p0+pUAirHbnCun3csbsVQBRnsrmylQdZon8im+yZPT9OEGZrd3mBoPaedYsDteMW82yXCnSnxx64cQk=;
Message-id: 903238.54368...@web51707.mail.re2.yahoo.com

My question is what do you recommend I do to avoid this? I don't know
how this person (spammer) got my email address but regardless its out
there and I can't block all Yahoo servers because some of my friends
do have legit Yahoo accounts and send me email. Is there something I
should tweak / change on my server? I added my Postfix mail log for
anyone who cares to see it but I am just asking for advice on what to
do since this is a new email server and I don't want to start getting
spam. I hope someone can please point me in the right direction...

Mar 10 11:04:04 mail postfix/smtpd[4563]: connect from
web51707.mail.re2.yahoo.com[206.190.38.225]
Mar 10 11:04:05 mail postgrey[1146]: action=pass, reason=client
whitelist, client_name=web51707.mail.re2.yahoo.com,
client_address=206.190.38.225, sender=marathoner...@yahoo.com,
recipient=car...@iamghost.com
Mar 10 11:04:05 mail postgrey[1146]: cleaning up old logs...
Mar 10 11:04:05 mail postfix/smtpd[4563]: 094744059:
client=web51707.mail.re2.yahoo.com[206.190.38.225]
Mar 10 11:04:05 mail postfix/cleanup[4567]: 094744059:
message-id=903238.54368...@web51707.mail.re2.yahoo.com
Mar 10 11:04:05 mail postfix/qmgr[1143]: 094744059:
from=marathoner...@yahoo.com, size=2372, nrcpt=1 (queue active)
Mar 10 11:04:05 mail postfix/smtpd[4563]: disconnect from
web51707.mail.re2.yahoo.com[206.190.38.225]
Mar 10 11:04:10 mail postfix/pickup[4556]: 8DA03405C: uid=5001
from=marathoner...@yahoo.com
Mar 10 11:04:10 mail postfix/cleanup[4567]: 8DA03405C:
message-id=903238.54368...@web51707.mail.re2.yahoo.com
Mar 10 11:04:10 mail postfix/pipe[4568]: 094744059:
to=car...@iamghost.com, relay=spamassassin, delay=5.9,
delays=0.66/0.01/0/5.3, dsn=2.0.0, status=sent (delivered via
spamassassin service)
Mar 10 11:04:10 mail postfix/qmgr[1143]: 094744059: removed
Mar 10 11:04:10 mail postfix/qmgr[1143]: 8DA03405C:
from=marathoner...@yahoo.com, size=2722, nrcpt=1 (queue active)
Mar 10 11:04:10 mail postfix/local[4572]: 8DA03405C:
to=car...@iamghost.com, relay=local, delay=0.12,
delays=0.07/0.01/0/0.04, dsn=2.0.0, status=sent (delivered to maildir)
Mar 10 11:04:10 mail postfix/qmgr[1143]: 8DA03405C: removed


Re: Bogus mails from hijacked accounts

2010-03-10 Thread Kris Deugau

Dennis B. Hopp wrote:

On Wed, 2010-03-10 at 20:22 +, Martin Gregorie wrote:

On Wed, 2010-03-10 at 13:37 -0600, Dennis B. Hopp wrote:

Obviously we just have to tell the clients that they need to deal with
the various e-mail providers, but is there an effective way that I can
filter these messages out before my users see them without blacklisting
the address?


There's nothing in SA that can blacklist a sending MTA, so blacklisting
can't happen unless you've added something to your MTA set-up that does
auto-blacklisting.


I meant blacklisting the sender address, not the MTA.


Welcome to Whack-A-Spammer!  Here's your pea-shooter;  the targets are 
behind 3 feet of concrete on the other side of this mile-wide canyon.


Sarcasm aside, there are two problems with blacklisting the sender to 
block spam:


1)  Spammers rotate sender addresses and hijacked account info more 
often than most of us change our underwear.  An account *may* get 
reused;  chances are it'll be months before it does, and the spammers 
will have rotated through hundreds or thousands of others - both 
phish-cracked and those set up just to send their junk.  Blacklisting a 
sender is reduced to blocking the persistent friend-of-a-friend who 
refuses to remove you from the endless stream of chain-forwards, and 
legitimate-but-totally-clueless mailing list operators who can't figure 
out how to unsubscribe you from their list.  :(


2)  You noted originally that these appear to be fully legitimate 
freemail accounts, legitimately used in the past to correspond with your 
customers/clients, that have been compromised and then used to send 
spam.  How do you propose to still allow the legitimate account holders 
to email your clients if you blacklist the sender?



The question then comes down to marking the message as spam and dealing
with it however you normally deal with spam. You'll probably need custom
rule(s) to handle that. You say the message bodies are quite variable,
but I notice that the Reply-to: header doesn't remotely match the From:
header. Is this a common factor?



The ones that I have seen the reply-to doesn't match the from and I
think the reply-to have all been something.jp


If it is, and the body texts have no common features that could also be
used, the only obvious approach would be a rule for each forged sending
domain that fires if the sending domain doesn't match the Reply-to
domain. 



There isn't anything in common that I can see that wouldn't be
susceptible to false positives.  One even left the clients signature
intact.  I've written fairly simple custom rules before but I'm not sure
how to do conditional rules.  I'll have to dig into the docs a little
more.


Martin's suggestion followup should point you in the right direction. 
Sets of phrase rules (how similar are these messages?  do you have ten 
or fifteen you can compare sentence-by-sentence?) with low scores will 
likely help some too.  Meta rules that bump the score up depending on 
how many phrases hit, or phrase+mismatched-sender/reply also work 
tolerably well on this class of spam... if you can get enough samples to 
build a complete enough set of phrase rules.


You'll have to decide how to balance aggressiveness on the content vs 
still allowing legitimate messages through.


Feeding these to Bayes should also help some.

-kgd


Re: My First Spam Mail Today

2010-03-10 Thread Martin Gregorie
On Wed, 2010-03-10 at 22:17 +, Carlos Mennens wrote:
 OK so today I got my 1st spam email from someone at a yahoo.com email
 address. Basically SA didn't score it at all and 'Postgray' did it's
 job. Below are the headers from SA:
 
Thats not a lot to go on: only a few headers and no message body. If
postgray did its job, why have you got any headers to show? 

Post the entire message to pastebin or a similar site and send the URL
here together with your explanation of what happened so we have
something to work with.


Martin




Re: Bogus mails from hijacked accounts

2010-03-10 Thread David B Funk
On Wed, 10 Mar 2010, Dennis B. Hopp wrote:

 We seem to be having a problem where clients that we interact with
 regularly are having their hotmail/gmail/yahoo accounts hijacked.  We
 are receiving e-mails from their accounts that legitimately go through
 the correct servers (hotmail,yahoo, etc.) and so they get passed through
 our spam filters.  The messages have different bodies but basically say
 the same thing that they were on vacation and had all their money stolen
 so they need to have money wire transferred to them.

 Obviously we just have to tell the clients that they need to deal with
 the various e-mail providers, but is there an effective way that I can
 filter these messages out before my users see them without blacklisting
 the address?  In one case I had probably 15 users that received the same
 message and naturally they freaked out.

 I have put a sample at:

 http://pastebin.com/9BDXrxmm

 Note I did change the real e-mail address in this message but the
 hotmail address used is valid just masked.

Look at that X-Originating-IP: [41.155.87.236] header, its a dial-up
pool in Lagos Nigeria.

It may seem stereotyped, but it's amazing the percentage of this kind
of spam that -does- come out of that part of the world.

Does anybody have an SA plugin that will grab those X-Originating-IP
headers and throw the address at an RBL? Points for hits by CBL
or a ip-geolocation table for Central Africa.

-- 
Dave Funk  University of Iowa
dbfunk (at) engineering.uiowa.eduCollege of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include std_disclaimer.h
Better is not better, 'standard' is better. B{