Re: Open letter to Yahoo and Hotmail concerning junkmail

2011-03-07 Thread J.D. Falk
On Mar 6, 2011, at 3:37 AM, Mynabbler wrote:

 The amount of junkmail coming from your systems is unbelievable. How hard is
 it to implement a cap on the amount of messages people can send out daily
 with your systems.

They do that.

 And that includes the number of Cc's and Bcc's one
 message generates.

And that.

 If you would cap that on, say, a 1000 users, you would be
 doing us an incredible favor. And how hard is it, if that cap is reached, to
 check the messages that are being generated and when spam (which it will be
 in 9 of 10 cases) to block the originating IP or cap the originating
 IP to a maximum of 100 addresses that can be spammed daily.

Not that, exactly (last I heard), but they do have a variety of IP-based rate 
limits.

 Oh, and while
 you are at it, to block that account  abusing your service as well.

Yep, that happens already too.

 There is no filtering in the world more effective then you taking this
 action and it would take an intern about two hours to implement.

Are you offering yourself up as the intern?  Yahoo! Mail is looking for an 
anti-spam intern right now:

http://careers.yahoo.com/jdescription.php?frm=search_resultsoid=35925

I don't see a similar listing at Microsoft, but I could ask some folks if 
you're interested.

 Sigh.

Yeah, I know it's frustrating.  It's even more frustrating to constantly work 
on implementing and improving rate limits and other features to handle outbound 
spam, and know that it's still not enough.

What's hard to see from the outside is exactly how much work the bad guys are 
putting into attacking the big webmail providers.  When I worked there, we 
watched the spammers reduce their output to fewer than five messages per fake 
or stolen account per day, each message just different enough to be hard to 
detect, rotating through an effectively infinite number of IP addresses -- and 
this was BEFORE botnets got as big and as cheap as they are now.

I'm not saying you should forgive the amount of spam that still gets through -- 
you should still block it, and outside pressure helps those teams get the 
resources they need to continue improving the systems.  But when you do 
complain, do it effectively.  Consider that they might have already thought of 
the simple stuff that's been discussed here, and on other lists, and at every 
academic anti-spam conference for years.  And, remember that the people who 
make actual decisions at big companies don't read this list.

Or if that was just a rant and not actually intended as a positive contribution 
towards reducing spam for the internet, I do understand.  Ranting is necessary 
sometimes.  The anti-spam folks at Microsoft and Yahoo! do it too.

--
J.D. Falk
the leading purveyor of industry counter-rhetoric solutions

Re: Should Emails Have An Expiration Date

2011-03-03 Thread J.D. Falk
On Feb 28, 2011, at 1:57 PM, Jay Plesset wrote:

 How about something that doesn't depend on the SENDER setting something?  
 I've set my system up to automatically empty the trash after 30 days, and 
 dump the spam folder after 2 weeks.  I could easily set up an archive 
 folder for my users and automatically expire their inbox at whatever time 
 period I want  If they want to keep something forever, move it to the 
 archive folder..

Exactly!  What's needed here is to give the user more filtering choices 
whenever they need 'em (after, yet complementing, SA's delivery-time filtering.)

http://www.returnpath.net/blog/received/2011/03/x-expires/

--
J.D. Falk
the leading purveyor of industry counter-rhetoric solutions



Re: RCVD_IN_RP_SAFE where to report spam? http://www.returnpath.net/commercialsender/certification/

2011-02-04 Thread J.D. Falk
On Jan 28, 2011, at 9:23 PM, Michael Scheidell wrote:

 that said, I still think there needs to be a easy link to report spam on 
 returnpath's web site. under contact, and/or, like most of their ESP clients 
 who have a clearly stated anti-spam link with a abuse@ address for reporting 
 spam.

It's in progress (finally.)  Once everything's ready, we'll also request 
updates to the relevant descriptions in the rulesets.

--
J.D. Falk
Director, Internet Standards and Governance
Email Intelligence Group
Return Path Inc.



Re: overlapping HABEAS_ACCREDITED_SOI and RCVD_IN_BSP_TRUSTED

2010-10-13 Thread J.D. Falk
On Oct 13, 2010, at 9:25 AM, Matus UHLAR - fantomas wrote:

 I've received a spam that his both HABEAS_ACCREDITED_SOI and
 RCVD_IN_BSP_TRUSTED. I believe it's because both BSP and HABEAS were bought
 by ReturnPath Inc. 
 
 However those two rules seems to be superflous to each other and while I can
 of course manually disable them or lower the scores, I would like ask if
 there's any plan to push updates for 3.2.5 and remove one of those.

Those rules were renamed  re-scored for 3.3.0 and above.



CEAS paper on SpamAssassin

2010-07-22 Thread J.D. Falk
I hadn't seen this mentioned here yet, though perhaps I missed it.

At CEAS last week, some researchers from Brazil presented a paper where they 
tracked the evolution of spamming techniques against the parallel evolution of 
SpamAssassin rulesets.  It was heartening to see that each new SA version 
caught a whole bunch more spam for a while before the spammers caught on.

http://ceas.cc/2010/papers/Paper%2019.pdf

--
J.D. Falk
Return Path



Re: List of cell phone company hosts

2010-06-15 Thread J.D. Falk
On Jun 11, 2010, at 7:23 PM, Marc Perkel wrote:

 Also - I'd like to make a list of host names where email from celll phones 
 comes from. Does anyone have a list of domain name or host names where cell 
 phone email is sent from?

The US FCC maintains a do not email list of domains of email/sms gateways, 
which might be a start.  (Sorry, I'm on a plane and can't look up the URL just 
now.)

Thing is, my cell phone submits messages via the same authenticated relays as 
my laptop, and that's increasingly more common than the fugly old gateway 
architecture.  Maybe there's another way to achieve whatever it is you're 
trying to do?

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: List of cell phone company hosts

2010-06-15 Thread J.D. Falk
On Jun 14, 2010, at 7:33 AM, J.D. Falk wrote:

 On Jun 11, 2010, at 7:23 PM, Marc Perkel wrote:
 
 Also - I'd like to make a list of host names where email from celll phones 
 comes from. Does anyone have a list of domain name or host names where cell 
 phone email is sent from?
 
 The US FCC maintains a do not email list of domains of email/sms gateways, 
 which might be a start.  (Sorry, I'm on a plane and can't look up the URL 
 just now.)

Here it is:

http://www.fcc.gov/cgb/policy/DomainNameDownload.html

 Thing is, my cell phone submits messages via the same authenticated relays as 
 my laptop, and that's increasingly more common than the fugly old gateway 
 architecture.  Maybe there's another way to achieve whatever it is you're 
 trying to do?

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: yahoo X-YMail-OSG

2010-05-10 Thread J.D. Falk
On May 8, 2010, at 8:18 AM, Michael Scheidell wrote:

 Yahoo's own DKIM implementation? header signing?

Neither.  It's related to their anti-spam system, but not intended for end-user 
parsing.

 would adding 1 point for each 1K of header length help?

Interesting idea!  I don't know the precise semantics of the contents of that 
header, but this certainly sounds possible.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: Blacklists Compared 17 October 2009

2010-04-08 Thread J.D. Falk
On Apr 7, 2010, at 4:15 AM, Justin Mason wrote:

 he doesn't take FPs into account.  this is a very serious problem with
 the methodology.

+1

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: return-path program

2010-03-17 Thread J.D. Falk
On Mar 12, 2010, at 11:20 AM, Alexandre Chapellon wrote:

 I would like to know if someone here is part of the returnpath.net 
 (http://www.returnpath.net/emailserviceprovider/certification/) certification 
 program?
 Does it really increase deliverability of email and to which MSP?
 What are the necessary steps to get into that program and is it free or do I 
 have to pay something?

I work for Return Path, but am not directly involved with the Certification 
program.  Most of your questions are answered on the page you referenced above; 
I'll put you in touch with someone who can help with the rest.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: Yahoo Feedback Loop - off topic

2010-02-24 Thread J.D. Falk
On Feb 19, 2010, at 9:09 AM, Jeff Koch wrote:

 The only large ISP that seems to have an FBL friendly approach is AOL. We've 
 been on their FBL for years. If anyone knows of another ISP with a friendly 
 FBL I'd love to know.

What's your definition of friendly in this context?

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: Yahoo Feedback Loop - off topic

2010-02-19 Thread J.D. Falk
On Feb 18, 2010, at 10:05 PM, ram wrote:

 But for an ISP this is so painful. 

That's why they do it by IP for ISPs (if you ask them, and get a 
correctly-trained customer service agent.)

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: Yahoo Feedback Loop - off topic

2010-02-18 Thread J.D. Falk
On Feb 14, 2010, at 10:31 PM, ram wrote:

 Anyway ReturnPath operates FBL's for yahoo and they provide IP address based 
 feedback loops at Cox etc
 I dont know why this diff for yahoo.

Because that's how Yahoo! wants it.

There are a lot of advantages to routing feedback by authenticated domain: ease 
of maintenance, survives forwarding, et cetera.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: blog article on 3.3.0

2010-01-29 Thread J.D. Falk
On Jan 28, 2010, at 11:52 AM, Warren Togami wrote:

 I wasn't planning on responding to this thread, but other positive responses 
 have annoyed me.

There were positive responses?

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






blog article on 3.3.0

2010-01-28 Thread J.D. Falk
http://www.returnpath.net/blog/2010/01/spamassasin-rarely-misses.php

Yeah, it's partly self-serving, but that's what corporate blogs are for.  The 
people who read this blog are mostly marketers with very little exposure to the 
open source community, so this should help them understand a bit more of how 
the real email ecosystem operates.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: semi-legit senders in DNSWL and habeas - a hard problem

2010-01-06 Thread J.D. Falk
On Jan 5, 2010, at 6:01 PM, Greg Troxel wrote:

 Thanks.  A link like report spam in the top bar, alongside marketers

I'll pass all of this along to the appropriate folks.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc


Re: [sa] Re: semi-legit senders in DNSWL and habeas - a hard problem

2010-01-06 Thread J.D. Falk
On Jan 5, 2010, at 3:52 PM, Michael Scheidell wrote:

 or an industry standard, RFC REQUIRED abuse@ address.
 
 Section 1 of RFC2142

abuse@ works, but it isn't the fastest method for reaching the correct team.

What I think a lot of y'all are missing is that we have more than one product, 
and (unfortunately) a lot of legacy domain names, so anything sent to abuse@ 
goes into a general queue which gets sorted later.  Neil and I have been trying 
to give you the fastest method for resolving issues, but if you'd rather take 
it slow... *shurg*

One of the things I've noticed about the anti-spam community over the years is 
that we'll always heap way more abuse on anyone who is willing to listen than 
we do on the spammers who aren't listening at all.  That's never a good idea, 
because it chases away people who might otherwise be listening -- or even 
helping.

(Oh BTW, take a look at the acknowledgements section of RFC 2142.)

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: semi-legit senders in DNSWL and habeas - a hard problem

2010-01-05 Thread J.D. Falk
On Jan 5, 2010, at 10:10 AM, Greg Troxel wrote:

 Once again I went to returnpath and senderscorecertified's web pages,
 and found no link to an email address to report being spammed by one of
 their customers.

Is the font size for Contact Us and Support too small?

I'll forward your report to the appropriate team.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: bondedsender return path? emediausa?

2009-12-29 Thread J.D. Falk
On Dec 28, 2009, at 3:18 PM, Michael Scheidell wrote:

 its in their email

Why would you trust ANY claim made by a spammer?

 found email address to report it to, thanks

That report you made was full of kooky threats.  I understand that you're 
angry, but that's not very professional.

Our customer service representative, on the other hand, answered entirely 
appropriately:

 If they're including references to our program in mail delivered via 
 non-certified IPs they're in violation of our program standards and will be 
 dealt with accordingly. We appreciate you informing us of this.


--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: bondedsender return path? emediausa?

2009-12-28 Thread J.D. Falk
On Dec 24, 2009, at 1:23 PM, Michael Scheidell wrote:

 where do we report spam from emediausa.com? in their url's they claim (and 
 publish) 'certified' www.bondedsender.com
 from their web site, it looks like they 'inherit' the email addresses from 
 their clients.

I couldn't find the link you're referring to, but it's safe to assume that 
anyone still claiming to be on Bonded Sender is either mistaken or lying.  It 
was replaced by Return Path's Certified program in 2006.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: habeas - tainted white list

2009-12-21 Thread J.D. Falk
On Dec 18, 2009, at 2:26 PM, Justin Mason wrote:

 it can be measured by finding the WL rule's page on ruleqa.spamassassin.org, 
 then examining the OVERLAP section for overlaps with BL rules. 

I'd expect that most whitelist operators will automatically de-list any IP 
which appears on a respected blacklist, so it's likely there's some unseen 
feedback here as well.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: Whitelists, not directly useful to spamassassin...

2009-12-17 Thread J.D. Falk
Very interesting data indeed -- and a testament to the accuracy of the 
SpamAssassin rules weighting process.

On Dec 16, 2009, at 4:10 PM, Warren Togami wrote:

 While whitelists are not directly effective (statistically, when averaged 
 across a large corpus), whitelists are powerful tools in indirect ways 
 including:
 
 * Pushing the score beyond the auto-learn threshold for things like Bayes to 
 function without manual intervention.
 * The albeit controversial method where some automated spam trap blacklists 
 use whitelists to help determine if they really should list an IP address.

Another indirect benefit (according to other users of our whitelists) is that 
when they implement a new spam-blocking method, the whitelists serve as kind of 
a safety valve to let legitimate mail through even when the new rule turns out 
to have false positives.

Site-specific whitelists are important for this, too.

 That being said, whitelists should be constantly policed to maintain their 
 reputation and trust levels.

Agreed.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: Whitelists in SA

2009-12-17 Thread J.D. Falk
On Dec 16, 2009, at 8:35 AM, LuKreme wrote:

 The fact is I *AM* their customer. The people writing them checks are not, 
 they're just their funders. Whitelist companies ha to convince admins to use 
 their list. The only way to do that is to have really really really high 
 quality lists that really do prevent spam delivery. If I don't use their 
 whitelist, and others don't use their whitelist, then their model falls apart 
 and they don't make money

Exactly what Return path has been saying (and acting upon) for years.

(We could debate whether Habeas followed that rule before we bought the 
company, but it's impolite to speak ill of the dead.)

 but no company is enlightened enough to realise this.

Heh.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: emailreg.org - tainted white list

2009-12-17 Thread J.D. Falk
On Dec 16, 2009, at 8:11 AM, Christian Brel wrote:

 It's also fair to say any ESP such as Return Path taking money to
 deliver mail should be optimising it {or offering advice on
 optimisation) so it does *not* score high. Otherwise what are their
 customers paying them for?

Return Path is not an ESP by any of the common definitions.

http://en.wikipedia.org/wiki/ESP

(No wonder you're confused.)

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: emailreg.org - tainted white list

2009-12-15 Thread J.D. Falk
On Dec 15, 2009, at 12:04 PM, Charles Gregory wrote:

 Which finally brings us back to the core questions which seem to go 
 unanswered:

They've all been answered many times, in other threads.  Habeas wasn't involved 
in emailreg.org, though.  No connection at all.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc




hacking whitelists (was Re: [sa] RE: emailreg.org - tainted white list)

2009-12-14 Thread J.D. Falk
On Dec 14, 2009, at 1:35 PM, Charles Gregory wrote:

 I ask again, on the issue of whitelists, is there a serious issue with 
 spammers targetting white-listed IP's as favored candidates for hacking?
 I'm okay with the answer being 'no'. I'm sure people with large servers and 
 good statistics could answer this question. But I get no answer at all. I 
 don't think it is because of any conspiracy. But perhaps the people who know 
 are just too busy?

We're fairly certain the bad guys haven't been targeting whitelists (ours, or 
others) -- yet.  Occasionally some spam will come from a whitelisted IP after a 
server gets infected, but then that IP doesn't stay whitelisted for very long 
-- and there's no proof that the botnet operator had any idea the IP was 
whitelisted.

Besides, there's not all that much value for them.  When the big ISPs use 
whitelists like ours, they'll give IPs on the list a lot of leeway -- but not a 
free pass forever.  There are still volume limits (though higher than for 
non-whitelisted IPs), and they're still watching complaint rates.  If there's a 
problem, they'll let us know.

It's very similar to how SpamAssassin uses whitelists: enough points are 
subtracted to override /some/ spam rules, but not all.  When a message is 
extremely spammy, the whitelist won't be enough to rescue it.  And that's how 
it should be.

All that said, I think it's only a matter of time until the bad guys DO 
intentionally go after whitelisted IPs, or (worse) whitelisting services.  
We'll detect if spam suddenly starts coming from any IP we're monitoring, and 
it won't stay whitelisted for long -- that's the core of our program.  We've 
also put a lot of effort into the security of our own systems.  I've been 
involved with computer security issues for too long to say it could never ever 
happen, but I can say we're always watching.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc


actual facts (was Re: HABEAS_ACCREDITED SPAMMER)

2009-12-04 Thread J.D. Falk
On Dec 4, 2009, at 1:18 AM, jdow wrote:

 And JD, I don't see on your site what it costs people to get listed
 on your DNS approval lists other than some tests and documentation. Is
 it possible spammers simply submit some buttered up documentation, get
 approved, and accept getting it knocked back off your lists rapidly as
 a business time expense?

No, there's a lengthy application process and a lot of monitoring involved.  
I'd be happy to ask someone from the Certification team to join the list and 
explain further as soon as I can be certain they won't be harassed and insulted 
here.  In the meantime I'll answer as well as I can, considering that I work on 
entirely different products at Return Path.

 I note that JD is quite willing to discuss (and seemed to recommend)
 a lowered default score. That seems quite reasonable.

The current defaults for both the HABEAS and BSP rules were set long before 
Return Path operated either service, so we have no clue where they came from 
either.


On Dec 4, 2009, at 9:08 AM, Charles Gregory wrote:

 As soon as any whitelist service like 'returnpath' accepts a client, they 
 perform the following:
 
 1) Review the client's address list - look for honeypot addresses.
   If any are found, clearly the client has not vetted their list.

Our staff doesn't review their list, but we do operate a great many honeypots 
of our own -- and we receive feeds of honeypot messages from ISPs and other 
data partners.  So, spammers can't hide that way.

We also get feeds of complaints, where users click this is spam in a partner 
ISP's webmail interface.  Spammers can't hide that way, either.

(You can see the results of much of this data at senderscore.org.)

I saw some other interesting ideas in the conversation, but they all assume the 
accreditor is able to change messages or otherwise interrupt the sender's 
mailstream.  We don't have that ability, and don't want to.  They have to 
police themselves, or else they get kicked off the list.  Simple, neh?


On Dec 4, 2009, at 10:06 AM, Greg Troxel wrote:

 Probably SOI should be entirely dropped.

There's only one Safe list (which SA still calls Habeas.)  In other words: no 
difference between the SOI and COI lists.  Or at least, that's how it's 
supposed to be -- so Kris's results were somewhat surprising.


On Dec 4, 2009, at 11:08 AM, Charles Gregory wrote:

 By the by, I think I posted on this list a while ago on a similar question, 
 as to whether we could really trust *any* whitelists, as they simply made for 
 a *deliberate* target of botnet owners. No one made a fuss about it before, 
 but what about now? Maybe, once again, the flaw is in having a whitelisting 
 system that relies upon third party servers with unknown security.

We're EXTREMELY concerned about this as well, and we've got a 24x7 operations 
staff keeping an eye on things.  That's one of the reasons we charge money for 
the service: it lets us buy hardware and software and hire staff to keep it 
running smoothly, and securely.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc


Re: actual facts (was Re: HABEAS_ACCREDITED SPAMMER)

2009-12-04 Thread J.D. Falk
On Dec 4, 2009, at 12:24 PM, John Hardin wrote:

 On Fri, 4 Dec 2009, J.D. Falk wrote:
 
 The current defaults for both the HABEAS and BSP rules were set long before 
 Return Path operated either service, so we have no clue where they came from 
 either.
 
 J.D., may I suggest you open a SA Bugzilla ticket suggesting that the scores 
 be reviewed in light of this large change in how HABEAS operates?

Glad to.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Richard's baseless insults (Re: HABEAS_ACCREDITED SPAMMER)

2009-12-03 Thread J.D. Falk
On Dec 2, 2009, at 12:59 AM, rich...@buzzhost.co.uk wrote:

 As for
 insulting you - grow up. You work in the business of sending unwanted
 junk email.

You haven't done any research at all, have you?

http://www.cauce.org/about/bod.html
http://www.circleid.com/members/3217/

I expect an apology.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: HABEAS_ACCREDITED SPAMMER

2009-12-01 Thread J.D. Falk
On Nov 30, 2009, at 12:38 PM, rich...@buzzhost.co.uk wrote:

 So please, spare me the sob story about what a wonderful idea HABEAS is.
 Talk is cheap, action speaks louder than words.

Who's sobbing?  I'm merely explaining how it works today.

If you disagree with a particular entry on either the (formerly Habeas) Safe 
list or the Certified list, we've made it extremely easy for you to tell the 
people who operate those lists.  Hint: insulting me on this mailing list has no 
effect.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: HABEAS_ACCREDITED SPAMMER

2009-11-30 Thread J.D. Falk

On Nov 25, 2009, at 9:03 AM, Matus UHLAR - fantomas wrote:

 On 25.11.09 03:23, jdow wrote:
 Having a little help might help them maintain a better product.
 But (that bitter word), the basic concept is broken. If the spammer
 can make more money than it costs to get on the Habeas whitelist
 then they will pull the same trick I've seen here in California in the
 construction trades.
 
 Some time ago they used to sue spammers, according to discussion here they
 don't anymore. Maybe that's one of their biggest problems.

Actually, the legal threat over the old X-Habeas header never accomplished 
anything.  It's been much more effective to simply stop whitelisting anyone who 
is sending spam.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: HABEAS_ACCREDITED SPAMMER

2009-11-30 Thread J.D. Falk
On Nov 25, 2009, at 3:57 AM, Hajdú Zoltán wrote:

 Then whos job? :) Habeas doesnt monitor Your Inbox.
 
 If You have the time to write here just for 'flaming' against a ~good 
 concept...
 ...Maybe it would be a better idea to spend that time on supporting them with 
 Your feedback.

Thanks for the support, but there's no point.  Some of the folks on this list 
are way too angry to ever do anything that might be helpful to others.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc






Re: HABEAS_ACCREDITED SPAMMER

2009-11-23 Thread J.D. Falk
On Nov 23, 2009, at 6:14 AM, Matus UHLAR - fantomas wrote:

 You should complain to ReturnPath. Iirc, HABEAS used to sue spammers
 misusing their technology. Don't know if ReturnPath continues prac ticing
 this.

Actually, you're confusing Habeas's first technology (which involved suing 
misuse of their copywritten header, and was abandoned years ago) with their 
safe list whitelist product, which Return Path now operates.  Rather than 
suing them, we'll simply kick 'em off the list if they don't meet our standards.

http://wiki.apache.org/spamassassin/Rules/HABEAS_ACCREDITED_COI has some basic 
info, including an address to complain at if you're receiving spam from a 
safelisted IP.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc



Re: More of a philosophical question

2009-11-17 Thread J.D. Falk

Jason Bertoch wrote:

I've been hit with that response on a number of occasions.  However, 
I've found that if I reply, pointing out their obvious error, I get a 
positive response.  Probably wasted effort, though.


Customer service drones get measured on how quickly they can make the 
questioner go away, so when someone replies it reflects negatively on them. 
 When that happens enough times, their bosses notice, and they get 
reeducated or replaced.


Have any of you ever worked in large-scale customer service?  It sucks, and 
there's a LOT of turnover -- which means a lot of newbies making newbie 
mistakes.


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: Auth questions

2009-10-28 Thread J.D. Falk

Adam Katz wrote:


Messages2 and/or mkt058.com have been thorough in working to ensure
their mail gets delivered cleanly, using SPF, DKIM, and Habeas (which
are all sender verification tools, the last of which is a sort of we
promise this isn't spam tool).  The message also has a
List-Unsubscribe header while lacking a Precedence header (hmm...).


Anyone can add a Habeas header.  At best, it means they've got an outdated 
configuration; at worst, it means they're spammers trying to get past filters.


https://senderscore.org/lookup.php?lookup=208.85.50.30 reveals that the 
208.85.50.30 is not currently accredited under the Return Path Safe 
program criteria, which used to be Habeas before Return Path borged 'em.


The IP has a very high Sender Score, which indicates that it doesn't send 
particularly spammy mail most of the time.


Beyond that, I'll let you decide for yourself.

--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: Other DNSBL's

2009-10-16 Thread J.D. Falk

Warren Togami wrote:

I'm looking to add other DNSBL's to tomorrow's weekly mass check.  I 
realize most of them probably are too broken to bother, but it would be 
nice to get some real numbers to confirm it so since the Internet lacks 
any real DNSBL comparisons that include Ham FP safety.


http://www.dnsbl.com/ has some test results which aren't bad, though his ham 
corpus does include some legitimate commercial email (which I know some 
folks on this list would claim could never, ever, ever, ever not be spam.)


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: White lists and white rules

2009-10-13 Thread J.D. Falk

Ted Mittelstaedt wrote:


Thus, any reputable blacklist service will ALSO need to constantly
monitor to make sure that any IP that's listed still deserves to be
there.


Absolutely.  I keep forgetting that anyone would think otherwise; major spam 
sources haven't been stationary in years.


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: White lists and white rules

2009-10-12 Thread J.D. Falk

Aaron Wolfe wrote:


Not true. There are servers that say send out bank statements and 100% of
what it sends is bank statements.


Until the day those servers get hacked, or they take on a new client
who sends a different type of mail, etc.


That's why any serious 3rd party whitelist service will constantly monitor 
to make sure that any IP that's listed still deserves to be there.


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: Backscatter.org used as RBL??

2009-08-06 Thread J.D. Falk

Marc Perkel wrote:


If someone is doing sender address
verification then they are filtering spam and those who filter spam are
not sending spam.


Do you have any stats on that?

--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: privacy policy updates?

2009-08-03 Thread J.D. Falk

LuKreme wrote:


I haven't gone to any of the sites, and it could all be coincidence, but
it seemed a little suspicious to me.

Over-reaction?


I'd be suspicious, too, but there are regulations (in some jurisdictions, 
for some industries) stating that companies have to alert you when their 
privacy policy changes.  These still hold true after the company gets bought 
out or changes names, and may even apply to info which was harvested or 
purchased from shady list brokers.


What you're describing sounds like they may have even outsourced the 
notification process to some other company, and this 3rd party doesn't know 
how to make their mail look less phishy.


(This isn't to say that the mail isn't spam, of course.)

--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: Return Path Safe whitelist UPDATE [was: Opt In Spam]

2009-07-20 Thread J.D. Falk

Robert wrote:


the thing is, the SA community and the world at large should not be your
free customer compliance labor force.


Of course not!  The SA community isn't part of the formal compliance process 
at all; there are automated processes running 24x7, and an human enforcement 
team investigating both alerts from our systems and complaints from outside. 
 We like SpamAssassin, and we know that many of the participants on this 
list are good at recognizing spammy behavior, so when someone complains here 
we always take it seriously.


If you don't want to tell our compliance team that you've seen a problem, 
that's fine.  Keep it to yourself.  Adjust your scoring as you feel is 
appropriate.  But when you complain out loud -- here, or elsewhere in public 
-- we're likely to ask why, because it's important to us to keep the list 
clean and the list's users satisfied.


There's nothing disingenuous going on here.

--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: Hostkarma Blacklist Climbing the Charts

2009-07-10 Thread J.D. Falk

Charles Gregory wrote:


A more interesting comparison would be to see how much stuff is NOT
caught by spamhaus, but caught by your list or others :)


Right -- that gives you more of a sense of the value of a new list for a 
system which already checks other lists.


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: Freelotto.com

2009-07-06 Thread J.D. Falk
I AM NOT DEFENDING FREELOTTO.COM, merely discussing the theory behind the 
Certified service which is queried in the BSP rules in SpamAssassin.



RobertH wrote:


shouldnt you folks know that your customers are spamming before we do?


How can a 3rd party automatically discern whether or not you subscribed to a 
particular bit of mail?  Or whether or not you consider the mail to be 
living up to your expectations for those messages?


I can think of a few ways, but they'd all involve serious privacy violations 
-- and possibly brain surgery.  Much better for all concerned if you'd be 
willing to tell us when you're unhappy about one of the IPs on the list.



or at least charge them a lot more for abusing your services  ;-)


Nope.  If they're proven to be violating the standards, they're no longer 
part of the program.



maybe it isnt the smartest idea in the world, yet shouldnt your types of
companies have several stealth email addresses on yourt customers lists
that get email from them just like everyone else that is getting spammed?

and then actually have eyeballs on your clients workings ???


Of course we do -- but those addresses /did/ subscribe to the list, and they 
don't make value judgments.


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: constantcontact.com

2009-07-06 Thread J.D. Falk

rich...@buzzhost.co.uk wrote:


sorry, I am on several private lists. Lists I have been on for 10
years through a few different employers.  If I signed up for those
lists with my @constantcontact.com address my employer would own that
mail.  I don't really think they'd read my mail, but I'm still not
comfortable with that so I sign up for all lists (even the public ones
like this) with my own personal domain.  Its just my family domain,
the website is nothing more than that.

Well, I can only take you at face value that you are here representing
Constant Contact. If I call up the office switchboard Tara, can I speak
with you there? It's just I've called up Constant Contact and hit #9 for
the directory and your name is not in there? Perhaps there is a
misspelling or something?


You probably won't trust this, either, but here goes: I've met Tara and 
other Constant Contact employees at conferences many times, and they all say 
she works there.


(I'm similarly not using my employer's domain, because none of the 
available Exchange-compatible clients have appropriate message threading for 
discussion lists.)


But who are /you/, Richard?  How do we know you're /really/ a SpamAssassin 
user, and not just pretending?


--
J.D. Falk


Re: Freelotto.com

2009-07-02 Thread J.D. Falk

Kasper Sacharias Eenberg wrote:


Is this site spamming?

I really can't figure it out! (They have full names/addresses) and hit
the 'RCVD_IN_BSP_TRUSTED -4.30' rule.

But the mails look obviously like spam to me.


If you've got any proof of spam from any BSP_TRUSTED IP, please report it to 
senderscorecertified@abuse.net or via the web form at 
http://www.returnpath.net/support/ and our compliance team will take 
appropriate action.  Thanks!


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: SORBS bites the dust

2009-07-01 Thread J.D. Falk

Arvid Picciani wrote:

Michael Grant wrote:

Unless I've missed a message... this is the 100th reply to this
thread. This has to be one of the longest threads I've seen on this
list in years.


Shows there is much to discuss on this matter. Isn't there a generic
spam related mailing list?


There are many.

--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: SORBS bites the dust

2009-06-25 Thread J.D. Falk

DAve wrote:


Jack Pepper wrote:

How long will this go before Godwin's law finally kicks in? Now I'm
just watching for the fun of it .


Yea, this is why when my bosses ask where I get my information I tell
them from a closed forum. If they read the adolescent ramblings that got
posted on email/spam lists they wouldn't allow us to use half the
software we do.


One of my co-workers was recently talking as if he thought SpamAssassin was 
some businesslike organization we could negotiate with.  I've been tempted 
to send him this thread.


(Not sure what he wanted to negotiate /for/, either.)

--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


whitelists (was Re: Barracuda Blacklist)

2009-05-29 Thread J.D. Falk

Rob McEwen wrote:


Additionally, I'd like to ask, other than being a superb cash-generating
machine, what good is a whitelist built upon pay-to-enter and NOT based
on editorial decisions made by non-biased e-mail administrators?


Those two aren't necessarily exclusive.  The standards for inclusion in a 
whitelist can (and in many cases do) include the same performance metrics 
that help e-mail administrators stay non-biased, such as user complaint 
rate, spamtrap hits, and so forth.


(I don't know whether Barracuda's whitelist includes those metrics.)

The additional value to admins is that they don't have to keep watch over 
the whitelisted IPs -- the whitelist operator handles that.  The fees cover 
that monitoring, and consulting on improving practices where necessary.


And, of course, if the whitelist operator is lying or slow or otherwise not 
living up to expectations, the admin simply stops using that whitelist. 
Lists that nobody uses don't get much business, so there's a direct 
incentive for the whitelist operator to keep their list squeaky-clean.


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: Barracuda Blacklist

2009-05-28 Thread J.D. Falk

Karsten Bräckelmann wrote:


Enabled = on the whitelist
Suspended = removed from the whitelist, live in the client account
Disabled = removed from the client account


Suspended on request by the client, suspended due to complaints pending
investigation, or forcefully suspended due to abuse and violating the
terms of accreditation?


Could be any of those.  Why does it matter?  Suspended IPs aren't on the list.

--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: Personal SPF

2009-05-05 Thread J.D. Falk

John Hardin wrote:

On Tue, 5 May 2009, Jonas Eckerman wrote:


I can't speak for others, but this is one reason why I haven't given
my opinions about your proposed PSPF.


+1.

If this OT discussion is going to get discourteous, please take it
somewhere more appropriate.


+1

If it were to become courteous again, one of the IETF lists might be 
appropriate -- that's where the standard would be developed, after all.


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


automated reporting plugin (was Re: HABEAS_ACCREDITED_COI)

2009-03-17 Thread J.D. Falk

RobertH wrote:


there is bound to be some way that those (of us or the SA Team) that want to
participate, can help you and help us at the same time.

some type of automated plugin that needs to be created that reports to us
and returnpath info relevant to stopping the bad eggs yet allowing the good
eggs!

something that does not toss internal security in the trash...


We already receive copies of user complaints from most of the ISPs who 
utilize our data (and some who don't.  We also receive aggregate statistics 
from an even wider network.  I'd love to find a way to participate with the 
SA community in a similar way.


We've been scratching our heads over how to implement it, though.  What do 
you have in mind?


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: spam bots guessing mx???

2009-03-09 Thread J.D. Falk

Bazooka Joe wrote:


Last week I got a client that wanted me to spam virii filter for their
in house exchange server.

I changed the mx from mail.domain.tld (their exchange) to
mail2.domain.tld (my sa box) which relayed to mail.domain.tld.

Last week all worked as expected.  The hundreds of spam droped to 0;
until this weekend.  Looking at the headers, mail is going directly to
the mail.domain.tld even though it isn't listed as mx anywhere.

I can tell the exchange server to only except mail from my server but
has anyone else experienced this?


Yeah, I've heard other stories of spam bots caching old MX records for 
months after they've been changed in the DNS.


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: List-Post: NO

2009-03-06 Thread J.D. Falk

LuKreme wrote:


The consistent part is the List-Post header.


I hadn't seen this in the wild before, but it looks like NO is valid per 
RFC 2369 (http://www.ietf.org/rfc/rfc2369.txt):


] 3.4. List-Post
]
]The List-Post field describes the method for posting to the list.
]This is typically the address of the list, but MAY be a moderator, or
]potentially some other form of submission. For the special case of a
]list that does not allow posting (e.g., an announcements list), the
]List-Post field may contain the special value NO.

So, it's possible (but I'd expect unlikely) that you'd catch some non-spam 
mail, too.


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/


Re: ReturnPath, Habeas, BondedSender

2009-03-02 Thread J.D. Falk

Jason Bertoch wrote:


That being said, maybe the rule description should include the reporting
addresses.  Why would I look on the SA wiki for a place to report
ReturnPath, Habeas, and BondedSender complaints?


What's the process for updating rule descriptions?

(BTW, a quick visit to your favorite search engine should alleviate any 
fears that either Neil or I are marketers.)


--
J.D. Falk
Return Path Inc
http://www.returnpath.net/