Re: BIG increase in spam today

2006-11-02 Thread Amos

On 11/2/06, Debbie D [EMAIL PROTECTED] wrote:


Yes Chris I did notice.. my server was attacked with spam yesterday
morning.. it was coming from several different ip, so fast I could not keep
it quiet



There's been a lot of chatter about this:

http://it.slashdot.org/article.pl?sid=06/11/01/1321226

Actually, it's getting to the extent that some at work are raising
questions as to whether our SA setup will be able to maintain adequate
protection from this growing onslaught. However, I have a feeling that
even the appliance vendors are going to be equally hard pressed to
deal with it.

Amos


Re: message with drug ad image only

2005-12-13 Thread Amos
On 12/12/05, Matt Kettler [EMAIL PROTECTED] wrote:
 (plus DIGEST_MULTIPLE) resulted in 6.27 points. And that's with me trimming 
 down
 the DCC_CHECK score to 1.5 from 2.17.

Any particular reason for this?


Re: SA 3.1.0, PostgreSQL 8.1.0, DBI 1.49, DBD::Pg 1.43

2005-12-10 Thread Amos
Have folks gotten things to work with previous versions of Postgres
and/or DBD-Pg? Since time is tight to fiddle with this box, looks like
I'll just continue using DB_File for now.


On 12/8/05, Amos [EMAIL PROTECTED] wrote:
 When I attempt to sa-learn a backup from another system running 3.0.4
 with DB_File for the Bayes DB, I get these:

 [5799] dbg: bayes: tok_get: SQL error: ERROR:  invalid input syntax
 for type bytea
 [5799] dbg: bayes: _put_token: SQL error: ERROR:  invalid input syntax
 for type bytea
 [5799] dbg: bayes: error inserting token for line: 
 t_3_23_1134072161_5c96df5ba0
 [5799] dbg: bayes: tok_get: SQL error: ERROR:  invalid input syntax
 for type bytea
 [5799] dbg: bayes: _put_token: SQL error: ERROR:  invalid input syntax
 for type bytea

 Looks like this may be related to this:

 http://thread.gmane.org/gmane.mail.spam.spamassassin.general/73358

 http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4640

 Bummer. Has anybody tried DBD-Pg-1.43_1?




SA 3.1.0, PostgreSQL 8.1.0, DBI 1.49, DBD::Pg 1.43

2005-12-08 Thread Amos
When I attempt to sa-learn a backup from another system running 3.0.4
with DB_File for the Bayes DB, I get these:

[5799] dbg: bayes: tok_get: SQL error: ERROR:  invalid input syntax
for type bytea
[5799] dbg: bayes: _put_token: SQL error: ERROR:  invalid input syntax
for type bytea
[5799] dbg: bayes: error inserting token for line: t_3_23_1134072161_5c96df5ba0
[5799] dbg: bayes: tok_get: SQL error: ERROR:  invalid input syntax
for type bytea
[5799] dbg: bayes: _put_token: SQL error: ERROR:  invalid input syntax
for type bytea

Looks like this may be related to this:

http://thread.gmane.org/gmane.mail.spam.spamassassin.general/73358

http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4640

Bummer. Has anybody tried DBD-Pg-1.43_1?


spamcop.net tactics

2005-11-21 Thread Amos
I must say I'm not particularly thrilled about the tactics employed by
SpamCop. At a university it is sometimes difficult to control every
single thing that everybody does on campus, unless of course perhaps
if this was a complete authoritarian state. We try hard to control and
minimize spamming events, but alas, sometimes they happen.

Just recently we discovered we've been tagged by spamcop. Since the
spamtrap is secrete, there's no way to know what incident triggered
this event, which makes it pretty damn difficult to track it down to
try to deal with it. Furthermore, a site has only one chance to delist
their server. After that, it's a permanent block.

So, if we can't tell what source is a problem, only have one chance to
delist--EVER--seems to me we're pretty screwed. Lovely.

Amos


Re: spamcop.net tactics

2005-11-21 Thread Amos
On 11/21/05, Jeff Chan [EMAIL PROTECTED] wrote:
 detect it, then yes your IPs can get blacklisted.  The best way
 to solve that is to stop the emission of spam from your network.

It's easier to do when the source is identified.

 As was already suggested, one good way to do that is to block
 direct port 25 output from your network and instead direct users

Irrelevant in this case since it would appear this incident was
instigated by an Exchange user, and Exchange itself is used for
sending the mail. (Can Exchange be viewed as virusware?)

 While SpamCop's trap addresses don't provide visible analyses of
 headers IIRC, user reports do, so that you can see how the

We never received a user report, nor was a report visible using our
account, only the indication of the IP being blocked. (Perhaps our
greylisting blocked the user report.)

 You can also sign up for an account that gives periodic reports
 for your networks.

Yup. Already have.

 As has already been noted, this is not an appropriate place to
 b!tch about SpamCop.  Better to discuss it on the SpamCop
 forums:

Thanks for the reminder, and the followups from others.

Amos