Re: Spammers, IPv6 addresses, and dnsbls
Philip skrev den 2018-03-07 21:12: Providers like Linode assign a single IPv6 address from a /64. I had to request my own block of /64 to use on my server as my IP neighbors you can masq your ipv6 if you have 2 /64 in your ifconfig info dont blame linode for sleeping with slaac :=) new vps does not have 2 /64 in ifconfig
Re: Spammers, IPv6 addresses, and dnsbls
Hi there, Providers like Linode assign a single IPv6 address from a /64. I had to request my own block of /64 to use on my server as my IP neighbors were always getting the /64 blocked... since I've had my own I've been all good. Before this my IPv6 IP was getting blocked daily because of someone else on that /64. It was quite annoying for myself. Phil ps your server blocks .nz domains :P On 03/03/2018 00:54, Daniele Duca wrote: Hello list, apologies if this is not directly SA related. "Lately" I've started to notice that some (not saying names) VPS providers, when offering v6 connectivity, sometimes tends to not follow the best practice of giving a /64 to their customer, routing to them much smaller v6 subnets, while still giving to them the usual /30 or /29 v4 subnets. What It's happening is that whenever a spammer buys a VPS with those providers and get blacklisted, most of the time the dnsbls list the whole v6 /64, while still listing only the single ipv4 address. This makes some senses, as it would be enormously resource intensive to track each of the 18,446,744,073,709,551,616 addresses in the /64, but unfortunately not respecting basic v6 subnetting rules causes reputation problems also for the other customers that have the bad luck of living in the same /64 and are using their VPS as an outgoing mail server. While I'm not judging the reasons why VPS providers are doing this type of useless v6 subnetting (micronetting?), I've started to deploy some countermeasures to avoid FPs. Specifically I wrote a rule that identifies if the last untrusted relay is a v6 address, and then is subsequently used in other meta rules that subtract some points in dnsbl tests that check the -lastexternal ip address on v6-aware lists. I know that probably is not the best solution, but I've started to see real FPs that worried me. I've even pondered if it could have sense to go back to v4 only connectivity for my inbound mtas. If you are in a similar situation I would like very much to discuss what would be the best approach to balance spam detection while avoiding fps Regards Daniele Duca
Re: Extremely persistent sex/make money spam with very little text in the body
On 07/03/2018 17:32, Jakob Curdes wrote: Since I get the majority of these emails in italian, I've written a meta rule that takes in account: Hello Duca, would you share this rule with us? I would be interested in looking at the resulst, as we also have lots of these messages here. JC Hi, I believe my rule wouldn't be as useful for you because a part of it is related to mispelled italian words (i believe they sloppily translated from english) However, I'll drop an email to you offlist with the other relevant parts to avoid eventual spammers lurking here ;) Daniele
Re: The "goo.gl" shortner is OUT OF CONTROL (+ invaluement's response)
Just FYI, it does add 3.0 points as soon as it sees any chaining at all. The other 5.0 points get added at 10 redirections. That said, I think you're guess is right that redirections start to look really suspicious after just 3 or 4. On Sat, 3 Mar 2018, @lbutlr wrote: On Feb 26, 2018, at 09:55, sha...@shanew.net wrote: This is why the DecodeShortURLs plugin has an explicit limit of 10 lookups (and penalizes such with a total of 8 points). I’d guess more than one redirect is highly suspicious and more than two is probably a waste of time, just score 5.0 and be done with it. Has anyone done any analysis on multi-redirects? -- Public key #7BBC68D9 at| Shane Williams http://pgp.mit.edu/| System Admin - UT CompSci =--+--- All syllogisms contain three lines | sha...@shanew.net Therefore this is not a syllogism | www.ischool.utexas.edu/~shanew
Re: Extremely persistent sex/make money spam with very little text in the body
Since I get the majority of these emails in italian, I've written a meta rule that takes in account: Hello Duca, would you share this rule with us? I would be interested in looking at the resulst, as we also have lots of these messages here. JC
Re: Extremely persistent sex/make money spam with very little text in the body
On 07/03/18 11:25, Leandro wrote: 2018-03-07 5:52 GMT-03:00 Sebastian Arcus>: 6. The links they include in the body of the email are almost never flagged up either by Clam or Spamassassin - and they point to a different domain in every single message. Although they use multiple domains in the URLs at body, many of these URLs are addressed to the same IPv4/IPv6 address or IP ranges, that is just one shared web server or a group of shared web servers of the spammer. The key to solving this problem is that you all start to cross the data and start scoring the URL host IP, that is the exact fiscal place they want to you visit even fired by many hacked mail servers at world and many distinct domains. The mail services and domains are very disperse but the web servers are very concentrated. As far as I can tell, the URL's in the spam I see point to php scripts on various compromised servers - which, maybe, further redirect to the final payment servers. But thank you for the suggestion - I will keep an eye on it.
Re: Extremely persistent sex/make money spam with very little text in the body
On 07/03/18 09:08, Daniele Duca wrote: On 07/03/2018 09:52, Sebastian Arcus wrote: I have this one email account receiving, for more than a year, a very specific type of spam which I find very difficult to block: 1. The messages are all kept very short, generally below 20 words - I assume so that Bayes is less efficient at classifying them? 2. Although they are all invitations to sex, or making money - they are phrased differently every time and use different words - so Bayes scores are consistently low. Hi Sebastian, I perfectly know what type of email you are talking about, I've seen them written at least in italian, english and spanish. If you click the link you are being redirected to shady dating websites or bitcoin/investment scams sites (at least in my experience). Since I get the majority of these emails in italian, I've written a meta rule that takes in account: - Common mispelled words/phrases - Body lines must be < 5 - The common pattern in all the urls. Take a close look at them, there IS a pattern, not writing it here for obvious reasons :) Thank you so much for that! The emails I see don't usually have spelling mistakes, but you are right, it seems that the url is the way to go. I've been looking for patters in the headers and source servers all along - it never crossed my mind to check the body! Thanks again
Re: Extremely persistent sex/make money spam with very little text in the body
2018-03-07 5:52 GMT-03:00 Sebastian Arcus: > > 6. The links they include in the body of the email are almost never > flagged up either by Clam or Spamassassin - and they point to a different > domain in every single message. > Although they use multiple domains in the URLs at body, many of these URLs are addressed to the same IPv4/IPv6 address or IP ranges, that is just one shared web server or a group of shared web servers of the spammer. The key to solving this problem is that you all start to cross the data and start scoring the URL host IP, that is the exact fiscal place they want to you visit even fired by many hacked mail servers at world and many distinct domains. The mail services and domains are very disperse but the web servers are very concentrated. We are doing this technique here and the problem has been mitigated to our customers. > > The bizarre thing is that I only see them coming to this one particular > email account, at a single domain of all the ones I administer. Based on > the above whoever sends them really know what they are doing, and must have > significant resources at their disposal - but I still have no idea why they > only hit this particular email address. I can only assume that greylisting > wouldn't help much, as they seem to arrive from properly configured smpt > servers, which would retry like any other regular smtp server and bypass > greylisting. Has anybody else seen these, and is there anything else that I > could try to block them? >
Re: Extremely persistent sex/make money spam with very little text in the body
On 07/03/2018 09:52, Sebastian Arcus wrote: I have this one email account receiving, for more than a year, a very specific type of spam which I find very difficult to block: 1. The messages are all kept very short, generally below 20 words - I assume so that Bayes is less efficient at classifying them? 2. Although they are all invitations to sex, or making money - they are phrased differently every time and use different words - so Bayes scores are consistently low. Hi Sebastian, I perfectly know what type of email you are talking about, I've seen them written at least in italian, english and spanish. If you click the link you are being redirected to shady dating websites or bitcoin/investment scams sites (at least in my experience). Since I get the majority of these emails in italian, I've written a meta rule that takes in account: - Common mispelled words/phrases - Body lines must be < 5 - The common pattern in all the urls. Take a close look at them, there IS a pattern, not writing it here for obvious reasons :) If all these conditions are matched the email is flagged. So far (about 6 months), no complaints. If you have only one address that receives these emails I'd add a test to see if the recipient is that specific one for more precision Hope it helps Daniele
Extremely persistent sex/make money spam with very little text in the body
I have this one email account receiving, for more than a year, a very specific type of spam which I find very difficult to block: 1. The messages are all kept very short, generally below 20 words - I assume so that Bayes is less efficient at classifying them? 2. Although they are all invitations to sex, or making money - they are phrased differently every time and use different words - so Bayes scores are consistently low. 3. They come from servers all around the world - possibly compromised, or maybe quickly setup and taken down - so they are usually not flagged by blacklists 4. Pyzor tends to flag most of them up though. 5. In most cases, DKIM is correct, SPF is fine, and the headers are all correct - so they don't hit any other rules. 6. The links they include in the body of the email are almost never flagged up either by Clam or Spamassassin - and they point to a different domain in every single message. The bizarre thing is that I only see them coming to this one particular email account, at a single domain of all the ones I administer. Based on the above whoever sends them really know what they are doing, and must have significant resources at their disposal - but I still have no idea why they only hit this particular email address. I can only assume that greylisting wouldn't help much, as they seem to arrive from properly configured smpt servers, which would retry like any other regular smtp server and bypass greylisting. Has anybody else seen these, and is there anything else that I could try to block them?