Re: 9D character used in words to avoid detection.

2018-11-16 Thread Benny Pedersen

Mark London skrev den 2018-11-17 01:23:

Is there a way to define BODY rules, so that they will be triggered?   
Thanks.


manuel train bayes, is the only help i can give, sorry

spammers want to be detected, so let them :=)


Re: 9D character used in words to avoid detection.

2018-11-16 Thread Kevin A. McGrail
Yeah, there is a SCC SHORT WORDS rule and a KAM_ZWNJ in KAM.cf.  Please let
me know if those help.
--
Kevin A. McGrail
VP Fundraising, Apache Software Foundation
Chair Emeritus Apache SpamAssassin Project
https://www.linkedin.com/in/kmcgrail - 703.798.0171


On Fri, Nov 16, 2018 at 7:37 PM John Hardin  wrote:

> On Fri, 16 Nov 2018, Mark London wrote:
>
> > I just received a spam email with the 9D character placed inside of
> words,
> > that prevented my custom BODY rules from being hit.  I.e.:
> >
> > Obvi=9Do=9Dusly yo=9Du=9D ca=9Dn can cha=9Dnge=9D i=9Dt, o=9Dr
> a=9Dlready
> > change=9Dd it.
> >
> > Is there a way to define BODY rules, so that they will be triggered?
> > Thanks.
>
> No, that would be way too much work; take a look at __UNICODE_OBFU_ZW in
> my sandbox. It isn't performing well in masschecks so I expect this tactic
> isn't widespread (yet?)
>
> I suppose I should expose it as scored in case it becomes popular...
>
>
> --
>   John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
>   jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
>   key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
> ---
>From the Liberty perspective, it doesn't matter if it's a
>jackboot or a Birkenstock smashing your face. -- Robb Allen
> ---
>   596 days since the first commercial re-flight of an orbital booster
> (SpaceX)
>


Re: 9D character used in words to avoid detection.

2018-11-16 Thread John Hardin

On Fri, 16 Nov 2018, Mark London wrote:

I just received a spam email with the 9D character placed inside of words, 
that prevented my custom BODY rules from being hit.  I.e.:


Obvi=9Do=9Dusly yo=9Du=9D ca=9Dn can cha=9Dnge=9D i=9Dt, o=9Dr a=9Dlready 
change=9Dd it.


Is there a way to define BODY rules, so that they will be triggered? 
Thanks.


No, that would be way too much work; take a look at __UNICODE_OBFU_ZW in 
my sandbox. It isn't performing well in masschecks so I expect this tactic 
isn't widespread (yet?)


I suppose I should expose it as scored in case it becomes popular...


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  From the Liberty perspective, it doesn't matter if it's a
  jackboot or a Birkenstock smashing your face. -- Robb Allen
---
 596 days since the first commercial re-flight of an orbital booster (SpaceX)


Re: Bayes not learning, blacklist not filtering

2018-11-16 Thread John Hardin

On Fri, 16 Nov 2018, Bill Cole wrote:


On 15 Nov 2018, at 14:27, MarkCS wrote:


So I've been tasked with researching an issue with the mail server at work.
We use Spamassassin and at present, it's not blocking some pretty obvious
spam, largely from the domain qq.com. Basically email is slipping through,
being bounced back at the end receiving server, then our server tries to
bounce back to qq.com, which doesn't exist at that point and we get a 
bounce

message. Hundreds of these suckers are coming through daily.


As John said, absolutely blocking a whole domain is best done before 
SpamAssassin, in the MTA (in your case that looks like Postfix.)


In fact, all of John's reply was good. There's one thing he was probably too 
polite to mention though...



X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on 


Eh, no, I don't particularly focus on that detail...

Good point, though.

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  From the Liberty perspective, it doesn't matter if it's a
  jackboot or a Birkenstock smashing your face. -- Robb Allen
---
 596 days since the first commercial re-flight of an orbital booster (SpaceX)


9D character used in words to avoid detection.

2018-11-16 Thread Mark London
I just received a spam email with the 9D character placed inside of 
words, that prevented my custom BODY rules from being hit.  I.e.:


Obvi=9Do=9Dusly yo=9Du=9D ca=9Dn can cha=9Dnge=9D i=9Dt, o=9Dr 
a=9Dlready change=9Dd it.


Is there a way to define BODY rules, so that they will be triggered?   
Thanks.


Mark




Re: Bayes not learning, blacklist not filtering

2018-11-16 Thread Bill Cole

On 15 Nov 2018, at 14:27, MarkCS wrote:

So I've been tasked with researching an issue with the mail server at 
work.
We use Spamassassin and at present, it's not blocking some pretty 
obvious
spam, largely from the domain qq.com. Basically email is slipping 
through,
being bounced back at the end receiving server, then our server tries 
to
bounce back to qq.com, which doesn't exist at that point and we get a 
bounce

message. Hundreds of these suckers are coming through daily.


As John said, absolutely blocking a whole domain is best done before 
SpamAssassin, in the MTA (in your case that looks like Postfix.)


In fact, all of John's reply was good. There's one thing he was probably 
too polite to mention though...



X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on 


Upgrade SA. 3.3.2 is antique and hasn't seen any updates in (as note) 7+ 
years. Each 3.4.x release has added useful functionality. Substantial 
parts of the default ruleset are wrapped in version checks because they 
demand 3.4.x features.


--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Available For Hire: https://linkedin.com/in/billcole


Re: unexpected FN, how to improve/tune to catch

2018-11-16 Thread RW
On Fri, 16 Nov 2018 08:48:56 -0800
Ian Zimmerman wrote:


> 1. Am I correct in assuming that SA decodes base64 MIME parts so it
> does act on these links?  Reading the -D output surely indicates so.

I think you've already answered that.
 
> 2. I remember some discussion here about following shortener links
> like bitly.  What is the resolution of that?  Does SA currently (as
> of 3.4.2) follow such links, to see (for example) that the link in my
> spample led to Facebook?
 
See

https://github.com/smfreegard/DecodeShortURLs

but Facebook isn't going to be listed anywhere. There is a test for
bitly links that have already been blocked.

> 3. The documentation for the HashBL plugin shows how to set it up to
> check addresses from headers.  Is there a way to also check addresses
> from mailto links in the body?  

It's already supposed to do that. It doesn't actually say it only
checks headers.

If you are thinking of:

header   HASHBL_EMAIL   eval:check_hashbl_emails('ebl.msbl.org')

AFAIK that 'header' is just a matter of syntax and  taxonomy and the
only practical difference it makes is that HASHBL_EMAIL's score counts
towards the 3 header points needed for auto-learning.


Macros now replaced by XML

2018-11-16 Thread Alex
Hi,

It seems spammers are now using XML Word documents instead of ones
containing macro viruses. Virtually no antivirus scanners are catching
this now.

These are hacked Outlook accounts sending virus/phish attachments.

https://pastebin.com/8QxujfAt


Re: unexpected FN, how to improve/tune to catch

2018-11-16 Thread Ian Zimmerman
On 2018-11-16 09:52, Matus UHLAR - fantomas wrote:

> such spam should be filtered at mailing list level before this happens.

And it almost always is.  Not in this case.

> what can help you

> - BAYES

understood, I am trying to do without Bayes for now, because I want to
avoid the maintenance (training and, especially, expiring).

> - network rules

those are on

> - URI blacklists

those are on

> did you enable/install razor, pyzor, dcc, spf and dkim libraries?

not dcc, but it would be useless in this case (mailing list is bulk by
definition).  The others are on.

> apparently it does not contain any URI.

It does.  Two web (bitly, masking a redirection to Facebook; plus
wecareusa) and one mailto.

Three followup questions about this last point:

1. Am I correct in assuming that SA decodes base64 MIME parts so it does
act on these links?  Reading the -D output surely indicates so.

2. I remember some discussion here about following shortener links like
bitly.  What is the resolution of that?  Does SA currently (as of 3.4.2)
follow such links, to see (for example) that the link in my spample led
to Facebook?

3. The documentation for the HashBL plugin shows how to set it up to
check addresses from headers.  Is there a way to also check addresses
from mailto links in the body?  If not now, is anything like that
planned for upcoming releases?

Thanks

-- 
Please don't Cc: me privately on mailing lists and Usenet,
if you also post the followup to the list or newsgroup.
To reply privately _only_ on Usenet and on broken lists
which rewrite From, fetch the TXT record for no-use.mooo.com.


Re: Forgery with SPF/DKIM/DMARC

2018-11-16 Thread RW
On Fri, 16 Nov 2018 10:39:47 -0500
Kris Deugau wrote:

> From: John D. Smith  
> ... 
> Looking at a couple of other examples, there are also some in the
> form:
> 
> From: =?UTF-8?B?[encoded stuff]= 
> 
> where [encoded stuff] decodes to:
> 
> Some User 

I think this is worth a try:

header  FROM_NO_COMMA   From =~ />\s*<[^"]*$/






Re: Forgery with SPF/DKIM/DMARC

2018-11-16 Thread Robert Fitzpatrick

Dominic Raferd wrote on 11/16/2018 8:50 AM>

Please clarify what you mean by 'even though SPF and DKIM is setup
with DMARC to reject'? I presume that 'company.com' does not have a
DMARC p=reject policy, or else your DMARC program (e.g. opendmarc)
should block forged emails from them.



Oh yes, sorry, the names changed to protect the innocent. But now that I 
am confirming, I don't see the _dmarc record setup by the DNS company as 
requested. So, this message with would fail DMARC if setup for 
company.com to reject as you noted? I'll send them the request again and 
see, thanks.


--
Robert



Re: Forgery with SPF/DKIM/DMARC

2018-11-16 Thread Dominic Raferd
On Fri, 16 Nov 2018 at 15:54, Robert Fitzpatrick  wrote:
>
> Dominic Raferd wrote on 11/16/2018 8:50 AM>
> > Please clarify what you mean by 'even though SPF and DKIM is setup
> > with DMARC to reject'? I presume that 'company.com' does not have a
> > DMARC p=reject policy, or else your DMARC program (e.g. opendmarc)
> > should block forged emails from them.
> >
>
> Oh yes, sorry, the names changed to protect the innocent. But now that I
> am confirming, I don't see the _dmarc record setup by the DNS company as
> requested. So, this message with would fail DMARC if setup for
> company.com to reject as you noted? I'll send them the request again and
> see, thanks.

In principle I recommend that everyone set up dmarc with p=reject for
their domains, but it is not to be undertaken lightly because it can
lead to rejection of their genuine but misconfigured emails (and cause
particular problems on mailing lists). I think your request to the
third party is unlikely to have any effect, and the problem you are
having needs to be tackled a different way.


Re: Forgery with SPF/DKIM/DMARC

2018-11-16 Thread Kris Deugau

RW wrote:

On Fri, 16 Nov 2018 08:44:52 -0500
Robert Fitzpatrick wrote:


We're having an issue with spam coming from the same company even
though SPF and DKIM is setup with DMARC to reject. Take this
forwarded email for instances


[ fake invoice email ]

SPF and DKIM rarely return "fail" on these because the envelope sender 
either doesn't publish either, or publishes them and they match.  SPF in 
particular would usually have nothing to do with the "obvious" From: 
address that most people would look at.



This is a pretty confusing question because it has nothing to do with
DMARC, SPF, or DKIM, and "same company" reads like "consistent
spammer".

I think what you're getting at is the use of a local address in the
author display name:


From: User  
To: other.u...@company.com


Did you actually mean that precise form, which looks invalid,


This certainly sounds like a series of fake invoice mails I've been 
getting a trickle of reports for, and if so, then yes, that is literally 
exactly what's in the original.


I dug through my reporting account's history and found one that came 
directly to my own account:


Delivered-To: kdeu...@vianet.ca
Return-Path: 
Received: from mail.vianet.ca [209.91.128.17]
by pod.pem-lan with POP3 (fetchmail-6.3.26)
	for  (single-drop); Tue, 06 Nov 2018 09:05:12 -0500 
(EST)

Received: from rla3.dizinc.com (rla3.dizinc.com [72.29.77.172]) by
 mx1.vianet.ca (Postfix) with ESMTPS id 83FE2E24D6 for ;
 Tue,  6 Nov 2018 09:03:08 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 d=corpmaqplast.com; s=default; 
h=Content-Type:MIME-Version:Subject:Message-ID

 :To:From:Date:Sender:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:

Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc

:Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=+EAmfCv8FqMxiASYoMWTcRGrgS++5JXOIOM7h8kgXyw=; 
b=n/4UOgM/LfvfnVl8gzWrv7uU/P


6GL1HJgU4KMmU/hsZR6sG5y/ijG09RLmuMK1OAoYULC8P4BewtmtfsDElVGXHU9P3EG6poaMliWeM

RRxcaV8/DMUiFOa2O8Y1Q9F4OXpI8t19pAchCaR+OFs34+Npjwad/wkX/+E82uWs57gs0VJMH76z9

UVynTFc+hRbwEFGdYPi+Gnc+fpvtbO7RN0pqcNOjLQWdEr2RcO2yg1hCPUs6z8HJ7gNYT1Wx7DQEj

y6adnz0tG+sLmqsYYC/67cJYdgHuEfUvUIlCCRVgV38BXGJiDoRSsz6txHAaCYa7bXHZ892FN9EbC
 CIVnco0Q==;
Received: from [187.217.80.180] (port=3340 helo=10.1.34.37) by
 rla3.dizinc.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) 
(Exim

 4.91) (envelope-from ) id 1gK1wg-00073v-8J for
 kdeu...@vianet.ca; Tue, 06 Nov 2018 08:03:07 -0600
Date: Tue, 06 Nov 2018 14:03:06 +
From: John D. Smith  
To: kdeu...@vianet.ca
Message-ID: <35706717752563516902.8f4660866aa84...@vianet.ca>
Subject: John D. Smith Factures 0611-KDG47168618-939

In this instance SPF and DKIM passed, so whatever policies richland.edu 
might publish they're irrelevant and not checked.


This particular subseries also has an attached Word document, which is 
now getting flagged by ClamAV, but IIRC there have been a few that were 
either "just" phishing, or linked to malware instead of attaching it to 
the message.


Looking at a couple of other examples, there are also some in the form:

From: =?UTF-8?B?[encoded stuff]= 

where [encoded stuff] decodes to:

Some User 

-kgd


Re: Forgery with SPF/DKIM/DMARC

2018-11-16 Thread RW
On Fri, 16 Nov 2018 08:44:52 -0500
Robert Fitzpatrick wrote:

> We're having an issue with spam coming from the same company even
> though SPF and DKIM is setup with DMARC to reject. Take this
> forwarded email for instances

This is a pretty confusing question because it has nothing to do with
DMARC, SPF, or DKIM, and "same company" reads like "consistent
spammer".

I think what you're getting at is the use of a local address in the
author display name:

> From: User  
> To: other.u...@company.com

Did you actually mean that precise form, which looks invalid, or did you
mean one of:

From: "User " 
From: User , 


Re: unexpected FN, how to improve/tune to catch

2018-11-16 Thread RW
On Fri, 16 Nov 2018 09:52:05 +0100
Matus UHLAR - fantomas wrote:

> On 15.11.18 09:42, Ian Zimmerman wrote:

> >  # This one disables Bayes.  ...
> > tiny detail. use_learner 0  
> 
> 1. this description is invalid. use_bayes disables bayes.


use_learner 0, in theory, disables all machine learning plug-ins.  


> 2. bayes is the best to help you to detect spam. Don't complain when
> you have disabled it.
> 
> >Where are all the other scores?  I would have expected at least
> >something for bit.ly and for the misspelled closing line, which is a
> >dead spam give-away to a human ...  

It has a missing letter, I'm a poor typist, I miss letters often.
Spelling mistakes are most useful for Bayes, which you turned-off.


Re: Forgery with SPF/DKIM/DMARC

2018-11-16 Thread Dominic Raferd
On Fri, 16 Nov 2018 at 13:45, Robert Fitzpatrick  wrote:
>
> We're having an issue with spam coming from the same company even though
> SPF and DKIM is setup with DMARC to reject. Take this forwarded email
> for instances
>
> >  Original message 
> > From: User 
> > Date: 11/15/18 10:42 AM (GMT-07:00)
> > To: Other User 
> > Subject: OVERDUE INVOICE
> >
> > Sorry for the delay…. This is an invoice reminder. The total for your item 
> > is $1,879.17.
> >
> > THX,
> >
> > -
> >
> > User
> > T 123.456.7890 | O 123.456.7891
> > EMail:u...@company.com
>
> However, the raw headers show as this...
>
> > Date: Thu, 15 Nov 2018 18:35:35 +0100
> > From: User 
> > 
> > To: other.u...@company.com
> > Message-ID: <860909106225419267.2007038e08376...@company.com>
> > Subject: OVERDUE INVOICE
>
> Could someone suggest a rule to match the signature with the last From
> email or envelope from? Or another suggestion how this could be resolved.
>
> Thanks!

Please clarify what you mean by 'even though SPF and DKIM is setup
with DMARC to reject'? I presume that 'company.com' does not have a
DMARC p=reject policy, or else your DMARC program (e.g. opendmarc)
should block forged emails from them.


Forgery with SPF/DKIM/DMARC

2018-11-16 Thread Robert Fitzpatrick
We're having an issue with spam coming from the same company even though 
SPF and DKIM is setup with DMARC to reject. Take this forwarded email 
for instances


 Original message  
From: User  
Date: 11/15/18 10:42 AM (GMT-07:00) 
To: Other User  
Subject: OVERDUE INVOICE 

Sorry for the delay…. This is an invoice reminder. The total for your item is $1,879.17. 

THX, 

- 

User 
T 123.456.7890 | O 123.456.7891 
EMail:u...@company.com


However, the raw headers show as this...


Date: Thu, 15 Nov 2018 18:35:35 +0100
From: User 

To: other.u...@company.com
Message-ID: <860909106225419267.2007038e08376...@company.com>
Subject: OVERDUE INVOICE


Could someone suggest a rule to match the signature with the last From 
email or envelope from? Or another suggestion how this could be resolved.


Thanks!

--
Robert



Re: unexpected FN, how to improve/tune to catch

2018-11-16 Thread Matus UHLAR - fantomas

On 15.11.18 09:42, Ian Zimmerman wrote:

This little pearl got through upstream filter on a mailing list.


such spam is very hard to detect, because mailing lists tend to clear
negative-scoring rules and add some positive-scoring.

such spam should be filtered at mailing list level before this happens.


My scores for it were:

 RCVD_IN_DNSWL_MED=-2.3,SPF_HELO_PASS=-0.0,MAILING_LIST_MULTI=-1.0,TOTAL=-3.3


these are standard rules, and since the mail came from a mailing list, it's
expected to score negatively.

what can help you
- BAYES
- network rules
- URI blacklists

Do you have those enabled?


Here is my user_prefs file:

 # This one disables Bayes.  If you want to use Bayes remove or comment
 # out this line.  You'll need to manage your Bayes database with a
 # cronjob or something.  I can help but I won't do the last tiny detail.
 use_learner 0


1. this description is invalid. use_bayes disables bayes.

2. bayes is the best to help you to detect spam. Don't complain when you
have disabled it.


Where are all the other scores?  I would have expected at least
something for bit.ly and for the misspelled closing line, which is a
dead spam give-away to a human ...


did you enable/install razor, pyzor, dcc, spf and dkim libraries?


I have run spamassassin -D on it and everything seems to work as
designed i.e. the tests including URIBL run fine, they just don't catch
anything.  It's disappointing.


apparently it does not contain any URI.


Maybe the KAM rules would have got this one?


no. They can help, but hardly help you to push -3.3 scoring mail received
via mailing list over spam threshold.


--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Chernobyl was an Windows 95 beta test site.