Re: Bypass RBL checks for specific address

2020-12-22 Thread Axb

whitelist_to ?

On 12/23/20 12:56 AM, Grant Taylor wrote:

Is there a way to bypass RBL checks for a specific address?

I've tried the all_spam_to option, but it looks like it artificially 
lowers the score and still runs normal tests.


I'd like to disable RBL checks for one address.




Re: Bypass RBL checks for specific address

2020-12-22 Thread Bill Cole

On 22 Dec 2020, at 18:56, Grant Taylor wrote:


Is there a way to bypass RBL checks for a specific address?

I've tried the all_spam_to option, but it looks like it artificially 
lowers the score and still runs normal tests.


I'd like to disable RBL checks for one address.


Do you have a setup that supports per-user preferences? e.g.: real 
system accounts.


If so, you can disable off individual rules for a user by giving them a 
score of 0 in ~/.spamassassin/user_prefs if they have a real account or 
in whatever you use for per-user prefs if they are virtual users.



--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire


Re: More undetected hidden test spam signs

2020-12-22 Thread Loren Wilton
Right, but __STY_INVIS is currently tag-blind (it only looks for the 
style="" clause), so it hits that, and if lots of ham is hiding tracking 
images that way that might explain the poor S/O.


I suspect that might be the case.

The vast majority of invisible garbage I see is hidden in a  ... 
 pair, typically two per spam and about 50K in each one. Looking at 
the definition of the 

Re: More undetected hidden test spam signs


On Tue, 22 Dec 2020, Loren Wilton wrote:


On 16 Dec 2020, at 23:21, Loren Wilton  wrote:

I just got a batch of spams containing




Such rules are there. Unfortunately, for whatever reason, lots of ham uses 
"invisible" text so it's not useful as a spam sign by itself and it's hard 
to come up with any useful combination rules.


I think I may have figured it out - tracking images. Like:

style="visibility: hidden !important; display:none !important; max-height: 
0; width: 0; line-height: 0; mso-hide: all;">


Note in your example the display:none is in a contained tag and not in an 
opening tag of a span. The tag is probably fairly long because the URL is 
probably huge, but it is still the one item that is hidden.


Right, but __STY_INVIS is currently tag-blind (it only looks for the 
style="" clause), so it hits that, and if lots of ham is hiding tracking 
images that way that might explain the poor S/O.



I put in a local rawbody rule for
  m'.{100,}(?:$|)'is
and so far I haven't gotten any hits on ham.


How much spam hits that very simple case? I had a __SPAN_INVIS rule 
(currently commented out) but IIRC it also had poor S/O. It wasn't as 
simple as yours, though - perhaps I'm allowing for too many 
syntactically-valid cases to try to avoid trivial avoidance by spam?



Of course that is a pretty heavy rule


It would be lighter if you didn't look for the tag closing. Is there a 
reason you care about the closing for that?


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.org pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  "Bother," said Pooh as he struggled with /etc/sendmail.cf, "it never
  does quite what I want. I wish Christopher Robin was here."
   -- Peter da Silva in a.s.r
---
 3 days until Christmas


Re: Bypass RBL checks for specific address


On 12/22/2020 6:56 PM, Grant Taylor wrote:
Is there a way to bypass RBL checks for a specific address? I've tried 
the all_spam_to option, but it looks like it artificially lowers the 
score and still runs normal tests. I'd like to disable RBL checks for 
one address.



Grant,

First, I'm NOT an expert on all of this - so somebody might be able to 
follow up with BETTER information, but this will hopefully point you in 
the right direction.


So at some point, I think 10+ years ago, I needed to do this, and 
instead of doing this at the spam filter level - I found that it worked 
well to do this via BIND - so this works if you're using your own 
locally-hosted BIND server for resolving DNSBL queries. So, for example, 
if you qualified for use of the free version of SpamCop (as an example), 
and you wanted to whitelist the IP 1.2.3.4, you could add the following 
to your named.conf file:


   zone "4.3.2.1.bl.spamcop.net" in { type master; notify no; file
   "master/null.zone"; };

Then add another such record for each DNSBL that you use. Then the 
"master/null.zone" file can be the following EMPTY zone (or something 
like this - change as desired! This might not even be the best or 
"right" way to do this - this is just what I had in that null.zone file 
when I was doing this 10+ years ago):


   $TTL 52w
   @   IN  SOA root.localhost.  root.localhost (
    2005012001 ; serial
    52w ; refresh
    52w ; retry
    52w ; expire
    52w ; ttl
    )

   @    IN  NS  localhost
   localhost IN    A 127.0.0.1


So by referencing an empty zone file, that way, each "zone" entry just 
points to this one file, for maximum efficiency and caching, and you 
don't have to reenter this for each zone. In the named.conf file, I 
think each zone statement (my 1st example abovw) would go AFTER the 
"options" section, but before the "includes" section. Obviously, if you 
suddenly needed to do this for 10s of thousands of IPs or hostnames, 
then maybe it would then start to have resource/maintenance issues - but 
on a smaller scale, this works great!


HOWEVER - This was so long ago, that I don't know if this STILL works in 
more recent version of BIND without causing issues? It is possible that 
in more recent version of BIND, DNSSEC might interfere with being able 
to do this?


So ANOTHER option might be to use the newer "response-policy" feature - 
my first idea was a sort of hack - but this "response-policy" might be 
more intended for exactly this purpose. So do a search on the following:


"response-policy" "BIND" "NXDOMAIN"
...with each in quotes, as shown, for instructions on how this is done.

So I think the example above, if implemented using "response-policy", 
would be the following:


   response-policy {
  4.3.2.1.bl.spamcop.net IN CNAME .
   };

Or something like that. Double-check my syntax. It might be wrong! So, 
again, I've never done the "response-policy", so this is just to get you 
started and point you in the right direction. If someone comes along and 
corrects my possible mistakes, or provides BETTER info - that is 
excellent - in the meantime, hopefully this will point you in the right 
direction, or give you some ideas.


-- Rob McEwen, invaluement



Bypass RBL checks for specific address


Is there a way to bypass RBL checks for a specific address?

I've tried the all_spam_to option, but it looks like it artificially 
lowers the score and still runs normal tests.


I'd like to disable RBL checks for one address.



--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature


Re: More undetected hidden test spam signs


On 16 Dec 2020, at 23:21, Loren Wilton  wrote:

I just got a batch of spams containing




Such rules are there. Unfortunately, for whatever reason, lots of ham 
uses "invisible" text so it's not useful as a spam sign by itself and 
it's hard to come up with any useful combination rules.


I think I may have figured it out - tracking images. Like:

style="visibility: hidden !important; display:none !important; max-height: 
0; width: 0; line-height: 0; mso-hide: all;">


Note in your example the display:none is in a contained tag and not in an 
opening tag of a span. The tag is probably fairly long because the URL is 
probably huge, but it is still the one item that is hidden.


I put in a local rawbody rule for
   m'.{100,}(?:$|)'is
and so far I haven't gotten any hits on ham.

Of course that is a pretty heavy rule, but it would seem to indicate that 
hidden spans may not be that common in ham.




Re: More undetected hidden test spam signs


On Thu, 17 Dec 2020, John Hardin wrote:


On Thu, 17 Dec 2020, @lbutlr wrote:


On 16 Dec 2020, at 23:21, Loren Wilton  wrote:

I just got a batch of spams containing




Interesting. I remember in the early days of html spam there were various 
rules to tag messages as spam when they had content that did not display. 
(Possibly pre-SpamAssasin or at least pre my use of SpamAssasin).


Such rules are there. Unfortunately, for whatever reason, lots of ham uses 
"invisible" text so it's not useful as a spam sign by itself and it's hard to 
come up with any useful combination rules.


I think I may have figured it out - tracking images. Like:



The src link gets visited to retrieve the image so the message is tracked, 
but the display of the image is suppressed.



--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.org pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  "Bother," said Pooh as he struggled with /etc/sendmail.cf, "it never
  does quite what I want. I wish Christopher Robin was here."
   -- Peter da Silva in a.s.r
---
 3 days until Christmas


Re: Do the Yahooniverse domains share email address space?


On Mon, 21 Dec 2020, Axb wrote:


On 12/21/20 7:19 PM, John Hardin wrote:

Quick question for anyone who knows:

Are the email addresses in the various domains in the yahoo family (e.g. 
yahoo.com, yahoo.com.hk, yahoo.com.my, yahoo.com.sg, yahoo.com.vn, 
yahoo.co.jp, yahoo.co.nz, yahoo.co.th, yahoo.co.uk, yahoo.es, yahoo.fr, 
etc.) all shared (i.e. which domain you use doesn't matter)?


Or is  a mailbox/account separate and distinct from 
?


Only yahoo.co.jp run their own setup and don't share with the rest of the 
world.


...so  and  and  are 
all the same mailbox, but  is separate from them?



--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.org pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  "Bother," said Pooh as he struggled with /etc/sendmail.cf, "it never
  does quite what I want. I wish Christopher Robin was here."
   -- Peter da Silva in a.s.r
---
 3 days until Christmas