Lots of comment in mail, how to score

2012-02-06 Thread Mynabbler

I seem to remember we discussed a way to figure out how much HTML comment is
in a message, but I am not able to find a decent ruleset that is trying to
count the amount of comment.

Let me elaborate with an example: http://pastebin.com/AS6kvLH2

I do realize the spamvertized site (way way down the message) is at the
moment in blacklists. But it was not at the time the message was received.
And I reckon a fresh domain will be spammed in the next batch. But they
typically all have _pages_ of comment, and behind that scattering of words,
a small block with the payload.

What would be the best way to score such an unusual amout of HTML comment in
a message?
-- 
View this message in context: 
http://old.nabble.com/Lots-of-comment-in-mail%2C-how-to-score-tp33272106p33272106.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Lots of comment in mail, how to score

2012-02-06 Thread Mynabbler


Benny Pedersen wrote:
 
   1.0 RCVD_IN_CSSRBL: Received via a relay in Spamhaus CSS
   1.6 URIBL_WS_SURBL Contains an URL listed in the WS SURBL
 blocklist
  [URIs: universmallmail.com]
 
 seems wasted :)
 

As I said, sure they are in RBL now. They were not when this message was
delivered. That's the whole point of coming up with a diffent approach here,
the amount of comment in the message.
-- 
View this message in context: 
http://old.nabble.com/Lots-of-comment-in-mail%2C-how-to-score-tp33272106p33273247.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Sought rules revisited

2011-11-22 Thread Mynabbler

Is it just me, or is the last sought_rules update November 9th? And it is not
like an update is available:

# sa-update --gpgkey 6C6191E3 -D --channel sought.rules.yerp.org
dbg: channel: attempting channel sought.rules.yerp.org
...
dbg: channel: current version is 3301199767, new version is 3301199767,
skipping channel
dbg: diag: updates complete, exiting with code 1
# _

-- 
View this message in context: 
http://old.nabble.com/Sought-rules-revisited-tp32872635p32872635.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Sought rules revisited

2011-11-22 Thread Mynabbler

Is it just me, or is the last sought_rules update November 9th? And it is not
like an update is available:

# sa-update --gpgkey 6C6191E3 -D --channel sought.rules.yerp.org
dbg: channel: attempting channel sought.rules.yerp.org
...
dbg: channel: current version is 3301199767, new version is 3301199767,
skipping channel
dbg: diag: updates complete, exiting with code 1
# _

-- 
View this message in context: 
http://old.nabble.com/Sought-rules-revisited-tp32872636p32872636.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Sought rules revisited

2011-11-22 Thread Mynabbler

Is it just me, or is the last sought_rules update November 9th? And it is not
like an update is available:

$ sa-update --gpgkey 6C6191E3 -D --channel sought.rules.yerp.org
dbg: channel: attempting channel sought.rules.yerp.org
...
dbg: channel: current version is 3301199767, new version is 3301199767,
skipping channel
dbg: diag: updates complete, exiting with code 1
$ _

-- 
View this message in context: 
http://old.nabble.com/Sought-rules-revisited-tp32872637p32872637.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Sought rules revisited

2011-11-22 Thread Mynabbler

Is it just me, or is the last sought_rules update November 9th? And it is not
like an update is available:

$ sa-update --gpgkey 6C6191E3 -D --channel sought.rules.yerp.org
dbg: channel: attempting channel sought.rules.yerp.org
[...]
dbg: channel: current version is 3301199767, new version is 3301199767,
skipping channel
dbg: diag: updates complete, exiting with code 1
$ _

Looks, other than the fact that update is from November 9th,  okay to me.

-- 
View this message in context: 
http://old.nabble.com/Sought-rules-revisited-tp32872639p32872639.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Sought rules revisited

2011-11-22 Thread Mynabbler


Mynabbler wrote:
 
 Is it just me, or is the last sought_rules update November 9th?
 
Sorry about the double posts... It was posted using Nabble, which returned
500 errors, and yet still posted the message. Oops.
-- 
View this message in context: 
http://old.nabble.com/Sought-rules-revisited-tp32872639p32872671.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



RE: myfanbox.com

2011-11-08 Thread Mynabbler


R - elists wrote:
 
 why not just save processor cycles  make it easier... reject the below at
 smtp time
 
 sms.ac
 fanbox.com
 fanboxnotes.com
 myfanbox.com
 
We have a ruleset here, since I want to see what they send, and your list is
incomplete:

header  MN_FANBOX From =~
/(smsacfriends\.com|fanboxmail\.com|fanboxapps\.com|fanboxnotes\.com|myfanbox\.com|fanboxnotes\.com/i

... I never saw sms.ac however. Did not have a complaint about the rule
either.
-- 
View this message in context: 
http://old.nabble.com/myfanbox.com-tp32791654p32802636.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Elite Pron

2011-11-03 Thread Mynabbler


Axb wrote:
 
 Could you pastebin a sample?
 
Sure, if you insist... 

http://pastebin.com/s6CTZM2T
-- 
View this message in context: 
http://old.nabble.com/Elite-Pron-tp32764834p32771766.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Elite Pron

2011-11-03 Thread Mynabbler

 this is part of the hacked Wordpress series
 for safetly you may want to add a uri condition for /wp-content/ to
 your meta

Nope. Since they also arrive as 

###.ro/cache/rgk40/nse/xwv/
###.com/images/stories/rol76/cly/uzj/
###.com/admin/rxr82/owt/bpz/
###.com/rda67/pyi/wom/
###.com/modules/mod_wdbanners/rvs84/

So, in some cases they are using Joomla hacked sites, in others somewhat
randomly hacked crap. The subject ruleset is failsafe and I did not
encounter one false positive as of yet. Mind you, the ^FW: part at the
beginning of the ruleset is rather specfic in combination with the rest of
the subject.

-- 
View this message in context: 
http://old.nabble.com/Elite-Pron-tp32764834p32772338.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Elite Pron

2011-11-02 Thread Mynabbler

Nice one:

header  MN_ELITEPRON Subject =~ /^FW: .{5,40}
(?:Elite|Instant|Extreme|Guaranteed|Infinite|Multi|Approved|Unreal)
(?:Collection|Access|Gallery).{0,2}$/
describe MN_ELITEPRON Elite Gallery pron spam
scoreMN_ELITEPRON 18

... enjoy!
-- 
View this message in context: 
http://old.nabble.com/Elite-Pron-tp32764834p32764834.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Chickenpoxed subjects

2011-10-19 Thread Mynabbler

RW-15 wrote:

MN As I explained, even if the rule would have fired, it adds a whopping
MN 0.1 score. It only shows teeth when combined with other findings...

RW So, why isn't it worth scoring if it's a useful rule?

Because mail with odd characters is not per se spam

RW  And why score it so high with FREEMAIL?

You are kidding, right? 50% of this crap comes from FREEMAIL addresses, and
even more specific: 44% of this crap is delivered by aol.com.  The aol
deliveries have about 85% unique from@aol addresses, so they pretty much
'own' aol.

RW The danger here is that you end-up with a lot FREEMAIL  WEAK_RULE
metas
RW that are prone to high-scoring FPs that BAYES_00 can't save.

As most spammers try to find something other than BOTNET's at the moment, I
think it's only fair to be very critical about FREEMAIL.

RW  If FREEMAIL_FROM is a good indicator then score it up, and score other
rules
RW on their merits.

Well... in itself FREEMAIL isn't spam a priori. It's just that chances are a
lot higher that it is. Hence my method of meta-ing FREEMAIL with fairly low
scoring rules, like links to free blogsites, free websites, tumblr, odd
punctuation in Subject rules, stuff like that.  Interestingly enough the
most used subject from valid freemail is Re:  and none. I don't see a
problem with being picky about freemail. The only free email provider
succesfully fighting _out_going spam is gmail.com.
-- 
View this message in context: 
http://old.nabble.com/Chickenpoxed-subjects-tp32644509p32681681.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Chickenpoxed subjects

2011-10-18 Thread Mynabbler


Adam Katz wrote:
 
 On Mon, 17 Oct 2011, Adam Katz wrote:
 Time for F-U-N
 I like DD and rockroll
 /var/spool/mail is full
 
... those examples don't get a hit with the rule I cooked up (since it needs
three different odd characters), and besides, an MN_PUNCTUATION hits only
scores in meta combinations. Note I commented out [] and () since they score
too easily in valid email.

header  __MN_PUNC00 Subject =~ /~/
header  __MN_PUNC02 Subject =~ /`/
header  __MN_PUNC03 Subject =~ /\#/
header  __MN_PUNC04 Subject =~ /\$/
header  __MN_PUNC05 Subject =~ /%/
header  __MN_PUNC06 Subject =~ /\^/
header  __MN_PUNC07 Subject =~ //
header  __MN_PUNC08 Subject =~ /\*/
# header  __MN_PUNC09 Subject =~ /\(|\)/
header  __MN_PUNC10 Subject =~ /\?/
header  __MN_PUNC11 Subject =~ /\+/
header  __MN_PUNC12 Subject =~ /=/
header  __MN_PUNC13 Subject =~ /\{|\}/
# header  __MN_PUNC14 Subject =~ /\[|\]/
header  __MN_PUNC15 Subject =~ /\|/
header  __MN_PUNC16 Subject =~ /\/
header  __MN_PUNC17 Subject =~ /\;/
header  __MN_PUNC18 Subject =~ /\:/
header  __MN_PUNC19 Subject =~ /\//
header  __MN_PUNC20 Subject =~ /_/
meta  MN_PUNCTUATION (__MN_PUNC01 + __MN_PUNC02 + __MN_PUNC03 +
__MN_PUNC04 + __MN_PUNC05 + __MN_PUNC06 + __MN_PUNC07 + __MN_PUNC08 + 
__MN_PUNC10 + __MN_PUNC11 + __MN_PUNC12 + __MN_PUNC13 + __MN_PUNC15 +
__MN_PUNC16 + __MN_PUNC17 +  __MN_PUNC18 + __MN_PUNC19 + __MN_PUNC20 = 3)
score MN_PUNCTUATION 0.1
#
# Now, let's go hunt with this:
meta  MN_PUNCS1 (MN_PUNCTUATION  (FREEWEB || HAS_SHORT_URL ||
MN_TUMBLR))
score MN_PUNCS1 6 
describe  MN_PUNCS1 Garbled subject with free website or blogsite, SHORT_URL
or tumblr link
meta  MN_PUNCS2 (MN_PUNCTUATION  FREEMAIL)
score MN_PUNCS2 3 
describe  MN_PUNCS2 Garbled subject from a free mail address
-- 
View this message in context: 
http://old.nabble.com/Chickenpoxed-subjects-tp32644509p32672891.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Chickenpoxed subjects

2011-10-18 Thread Mynabbler


RW-15 wrote:
 
 It would hit:
 Re: Did you pick-up the dry-cleaning?
 
Nope. Scores just two (one ':' and a '?') and the rule needs three different
odd characters.

RW-15 wrote:
 
 I think it needs more work, maybe combine it with tests for lots of
 very short words or adjacent punctuation pairs.
 
As I explained, even if the rule would have fired, it adds a whopping 0.1
score. It only shows teeth when combined with other findings...
-- 
View this message in context: 
http://old.nabble.com/Chickenpoxed-subjects-tp32644509p32677140.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Why doesn't anything at all get these botnet spammers?

2011-10-17 Thread Mynabbler


John Hardin wrote:
 
 On Sat, 2011-10-15 at 15:38 -0700, John Hardin wrote:
 Check out SUBJ_OBFU_PUNCT in my sandbox. Awaiting masscheck, but we'll
  have to be quick to see the actual results... :)
 
I wrote a couple a days ago about these subjects, did not get a response
however. I came up with something rather straightforward:

header  __MN_PUNC00 Subject =~ /~/
header  __MN_PUNC02 Subject =~ /`/
header  __MN_PUNC03 Subject =~ /\#/
header  __MN_PUNC04 Subject =~ /\$/
header  __MN_PUNC05 Subject =~ /%/
header  __MN_PUNC06 Subject =~ /\^/
header  __MN_PUNC07 Subject =~ //
header  __MN_PUNC08 Subject =~ /\*/
header  __MN_PUNC09 Subject =~ /\(|\)/
header  __MN_PUNC10 Subject =~ /\?/
header  __MN_PUNC11 Subject =~ /\+/
header  __MN_PUNC12 Subject =~ /=/
header  __MN_PUNC13 Subject =~ /\{|\}/
# header  __MN_PUNC14 Subject =~ /\[|\]/
header  __MN_PUNC15 Subject =~ /\|/
header  __MN_PUNC16 Subject =~ /\/
header  __MN_PUNC17 Subject =~ /\;/
header  __MN_PUNC18 Subject =~ /\:/
header  __MN_PUNC19 Subject =~ /\//
header  __MN_PUNC20 Subject =~ /_/
meta  MN_PUNCTUATION (__MN_PUNC01 + __MN_PUNC02 + __MN_PUNC03 +
__MN_PUNC04 + __MN_PUNC05 + __MN_PUNC06 + __MN_PUNC07 + __MN_PUNC08 +
__MN_PUNC09 +  __MN_PUNC10 + __MN_PUNC11 + __MN_PUNC12 + __MN_PUNC13 +
__MN_PUNC15 + __MN_PUNC16 + __MN_PUNC17 + __MN_PUNC18 + __MN_PUNC19 +
__MN_PUNC20 = 3)
score MN_PUNCTUATION 0.1

PUNC14 gave too much false positives with forums and such where [ForumName]
is send in the subject. The actual score for this kind of punctuation is
low, I use the rule in a meta with URL shortening, free websites, free
blogs, stuff like that, and it is hovering above the kill switch. Also note
that is does not choke on subjects like ===, where a multiple would.


-- 
View this message in context: 
http://old.nabble.com/Why-doesn%27t-anything-at-all-get-these-botnet-spammers--tp32659169p32668643.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Interword capitalization - solved and improved

2011-05-11 Thread Mynabbler


jdow wrote:
 
 header   __MN_IWCAPSubject =~ /[a-z][A-Z][a-z]/
 Help! My iPad does not work on FaceBook.
 Bet that hits it as a subject.
 

Nope. Matches only two times..., on the P from iPad and the B from FaceBook.
It does not match the F.

Getting back to the matter at hand: is someone able to put that ruleset in a
sandbox for the daily run?

A 'yahoo groups' would be:

header __MN_YHGRP   Return-path =~ /returns\.groups\.yahoo\.com/

and the better meta with ruleset and not yahoogroups could be:

# Gibberish subjects like: Cap su lesOr de rsMad eFo rRar ePro du cts
header   __MN_IWCAPSubject =~ /[a-z][A-Z][a-z]/
tflags   __MN_IWCAPmultiple
meta   MN_IWCAP__MN_IWCAP = 3  !__MN_YHGRP
score  MN_IWCAP0.01

meta   MN_FMIWCAP  MN_IWCAP  FREEMAIL_FROM
score  MN_FMIWCAP  3

-- 
View this message in context: 
http://old.nabble.com/Interword-capitalization-tp31521819p31593215.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Interword capitalization - solved

2011-05-10 Thread Mynabbler


Mynabbler wrote:
 
 Does someone have a rule for interword capitalization?
 
Unfortunately no takers for the question. I came up with this:

# Gibberish subjects like: Cap su lesOr de rsMad eFo rRar ePro du cts
header   __MN_IWCAPSubject =~ /[a-z][A-Z][a-z]/
tflags   __MN_IWCAPmultiple
meta   MN_IWCAP__MN_IWCAP = 3
score  MN_IWCAP0.1
meta   MN_FMIWCAP  (MN_IWCAP  FREEMAIL_FROM)
score  MN_FMIWCAP  3
describe   MN_FMIWCAP  Found thRee intErword caPitalizations from a free
mail address

It searches for three or more occurrences in the subject and scores it when
coming 
from a freemail address (just hotmail would have been enough... sigh).

-- 
View this message in context: 
http://old.nabble.com/Interword-capitalization-tp31521819p31584892.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Interword capitalization - solved

2011-05-10 Thread Mynabbler


Bowie Bailey wrote:
 
 header   __MN_IWCAPSubject =~ /[a-z][A-Z][a-z]/
 tflags   __MN_IWCAPmultiple
 meta   MN_IWCAP__MN_IWCAP = 3
 
 So hopefully you aren't expecting any emails from a Hotmail user
 discussing iPods or iPadsor McDonalds  :)
 

It searches for three occurrences or more. So, they would ought to compose a
subject like Shall I bring my iPod or my iPad to McDonalds, and daft
enough to be using a free mail provider. Yes. In the meantime I only see the
rule hitting spam:

Subject: Typ eOfCap sule sSa tis fac tor yForVerySt ric tBuy er s  
Subject: SeeLate stPill sAma zingAdv ant ages
Subject: TakeAdv an tag eOfToda y' sNe wTabl ets  
Subject: No velPillOff erAHoli sti cPro ce ssToHe al th  

... and it is interesting to see how long it takes for the ruLese tTob ecoMe
oBso letE because of changed tactics after publicly publishing a specific
rule.
-- 
View this message in context: 
http://old.nabble.com/Interword-capitalization-tp31521819p31585518.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Interword capitalization - solved

2011-05-10 Thread Mynabbler


Bowie Bailey wrote:
 
 Ah.  I missed the meta limiting it to 3 or more hits.  If it works well,
 maybe we can add it to the stock ruleset.
 
Step 1 would be a check in someone's sandbox. And maybe a better meta than
freemail, since I do see some false positives in yahoo groups:

Spamassassin found from x...@returns.groups.yahoo.com at
n73c.bullet.mail.sp1.yahoo.com [98.136.45.72] HELO
n73c.bullet.mail.sp1.yahoo.com to XXX
...snip,DKIM_SIGNED,DKIM_VALID,FREEMAIL_FROM,CAPSNOSPACE,MN_FMIWCAP,snip...
Subject: Re: [RebornDollsArtistCircle] Hello 

so... a freemail post to a yahoo group that has three interword capitals in
the groupname is a false positive (in this case, by the way, the group
message _was_ spam).

A not 'CAPSNOSPACE' or a not yahoogroups would be in order to solve that.

CAPSNOSPACE is:

# Junk with CapsCrapMessageSubjects
header   MN_CAPSNOSPACE  Subject =~ /(?:[A-Z][a-z]+){4}/
describe MN_CAPSNOSPACE Subject ContainsFourWordsLikeThis
scoreMN_CAPSNOSPACE  1

-- 
View this message in context: 
http://old.nabble.com/Interword-capitalization-tp31521819p31586088.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Interword capitalization

2011-05-02 Thread Mynabbler

Does someone have a rule for interword capitalization? Or more specific,
something to score stuff like:

Subject = At tai nWel l- bei ngGoa lsVeryEf fe ctiv eTabl et


-- 
View this message in context: 
http://old.nabble.com/Interword-capitalization-tp31521819p31521819.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Open letter to Yahoo and Hotmail concerning junkmail

2011-03-07 Thread Mynabbler


Warren Togami Jr. wrote:
 
 I'd agree, but users wont rebel against Yahoo unless they begin to see 
 actual bounces to their sent mail.
 
I don't know about your end users, but ours typically get flummoxed if mail
from this well known and trusted free mail providers would not arrive to
them... There's just too many users actually using their services, mixed
with too many spammers abusing it.


Warren Togami Jr. wrote:
 
 I do agree that we should have FROM_HOTMAIL and FROM_YAHOO so we can 
 independently decide how to treat their mail separate from typical
 FREEMAIL.
 
Been there, tried that. It is like stopping a river. I've tried metas with
the originating source (FROM_AFRICA rules), metas with keywords, metas with
short_urls... the list of junk coming out of Yahoo and Hotmail is just
endless. And again, the solution would be fairly simple, if only Microsoft
and Yahoo administrators actually cared about the mail leaving their
systems. I get frustrated every time I read the 'Tired of spam in your
inbox, come to Hotmail/Yahoo' tagline in spam send to us _from_ Yahoo and
Hotmail. Frustrated, because it is so easy to target the abuse at the
source... if only they cared.

Setting a default score of 3 or 4 to mail coming from Hotmail and/or Yahoo,
would only be efficient if we would start a campaign and proclaim a Tired
of spam send by Hotmail and Yahoo-day at like May 4th, and our endusers
getting wind of this special
Microsoft-and-Yahoo-dont-care-about-spam-awareness event going on that
particular day. There's just too much collateral damage.
-- 
View this message in context: 
http://old.nabble.com/Open-letter-to-Yahoo-and-Hotmail-concerning-junkmail-tp31079893p31087123.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Open letter to Yahoo and Hotmail concerning junkmail

2011-03-06 Thread Mynabbler

Dear Microsoft administrators, dear Yahoo administrators,

The amount of junkmail coming from your systems is unbelievable. How hard is
it to implement a cap on the amount of messages people can send out daily
with your systems. And that includes the number of Cc's and Bcc's one
message generates. If you would cap that on, say, a 1000 users, you would be
doing us an incredible favor. And how hard is it, if that cap is reached, to
check the messages that are being generated and when spam (which it will be
in 9 of 10 cases) to block the originating IP or cap the originating
IP to a maximum of 100 addresses that can be spammed daily. Oh, and while
you are at it, to block that account  abusing your service as well.

There is no filtering in the world more effective then you taking this
action and it would take an intern about two hours to implement.

By the way, if you are a Yahoo administrator, the cap from
%account%---%numb...@att.net need to be set to 10 messages daily.

Sigh.
-- 
View this message in context: 
http://old.nabble.com/Open-letter-to-Yahoo-and-Hotmail-concerning-junkmail-tp31079893p31079893.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



SHORT_URL, searchresult-g.php and DOTZUP.COM or keywordtraffic.info

2011-02-21 Thread Mynabbler

It is quite amazing how much crap is being send with a SHORT_URL pointing to
somesite.com/searchresult-g.php?someresult all pointing to some stupid NBC10
report about how a work-at-home-mom makes 13k9 a month.

What is interesting is that most of these domains point to domains that are
being managed by Dotzup.com or have an affiliation to keywordtraffic.info in
the whois lookup.

Is dotzup the shady outfit here? Or a mere coincident that their crappy
domain park service is hosting stuff with a template that contains an easy
hackable searchresult-g.php? 

In any case, for those using DecodeShortURLs, an interesting meta is a short
url and a uri /searchresult-g\.php/, or maybe just outright block
searchresult-g.php, I have not come across a ham message containing a
reference to searchresult-g.php as of yet...

For your info, some examples of domains that are a used (disquised in a
SHORT_URL) are:

steelpipes.com/searchresult-g.php?CS=aH...
bahammashotels.com/searchresult-g.php?CS=aH...
bodywrapping.com/searchresult-g.php?CS=aH...
funnyqoutes.com/searchresult-g.php?CS=aH...
-- 
View this message in context: 
http://old.nabble.com/SHORT_URL%2C-searchresult-g.php-and-DOTZUP.COM-or-keywordtraffic.info-tp30975770p30975770.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Optional argument in regex

2010-08-16 Thread Mynabbler

I think everybody and their dog made a ruleset regarding 'your email address
has won'. Something like:

MN_YEAHRIGHT /\bYour (?:email|e-mail) (?:address|account) (?:has won|just
won you)\b/

How do you make the second argument optional? So it also hits 'your email
has won'?
-- 
View this message in context: 
http://old.nabble.com/Optional-argument-in-regex-tp29448754p29448754.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Count length subject

2010-04-26 Thread Mynabbler

We experience quite a bit of spam with subjects like:

- SexyCoedHoneysGetWildInTheseRealgfsPhotos
- Make*each*of*your*intimate*acts*unforgettable*for*your*partner
- HotGi'rlP,us'syF,u'c.kedByPigs
-
We-are-the-only-manufacturer-who-offers-a-FREE-test-bottle-of-enlargement-pills

Now, some of these could be targeted with a ruleset like

header  __DASHES Subject =~ /-/
tflags  __DASHES multiple
meta  MN_DASHES __DASHES = 4
score MN_DASHES 2

... but it is quite a bit of cat and mouse. However, other than these weird
subjects, there's not a lot to target in the message body.

Would it be possible to use the length of the subject, combined with the
absence of spaces in a subject? Can we count the subject length and 'not
space' in a ruleset?

-- 
View this message in context: 
http://old.nabble.com/Count-length-subject-tp28367879p28367879.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: svn rules and viewvc

2009-11-02 Thread Mynabbler


John Hardin wrote:
 Karsten beat me to it. Check out what you want using SVN and pull it into 
 your local config

I feel rather stupid here... I tried that, and it barfs on me:

# svn checkout
http://svn.apache.org/viewvc/spamassassin/trunk/rulesrc/sandbox/jhardin/
svn: PROPFIND request failed on
'/viewvc/spamassassin/trunk/rulesrc/sandbox/jhardin'
svn: PROPFIND of '/viewvc/spamassassin/trunk/rulesrc/sandbox/jhardin': 302
Found (http://svn.apache.org)

What gives?

-- 
View this message in context: 
http://old.nabble.com/svn-rules-and-viewvc-tp25920485p26156667.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Shortcircuit Rules

2009-10-30 Thread Mynabbler


Alex-325 wrote:
 I'm interested in experimenting with shortcircuiting, and wondered if
 anyone had some examples they're using that they could share?
We are using it to shortcircuit HAM and prevent blowing CPU cycles on
newsletters that people expect to never contain spam. So, there is a
'shortcircuit.cf' that lives in /etc/mail/spamassassin and looks like this:

loadplugin Mail::SpamAssassin::Plugin::Shortcircuit
report Content analysis details:   (_SCORE_ points, _REQD_ required, s/c
_SCTYPE_)

ifplugin Mail::SpamAssassin::Plugin::Shortcircuit

# always log shortcircuit status
add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ tests=_TESTS_
shortcircuit=_SCTYPE_ autolearn=_AUTOLEARN_ version=_VERSION_

# Note: add_header statement should be on one line..., your browser might
snap that in two

# Trusted newsletters
meta  SC_NEWSLETTER (HAM001||HAM002||HAM003)
priority  SC_NEWSLETTER -500
shortcircuit SC_NEWSLETTER on
score SC_NEWSLETTER 0.1

# JADA Newsletter 
header  __HAM001_FROM Return-Path =~ /.*nce\.j\...@b\.jada\.com/
header  __HAM001_SNDR Received =~ /123\.234\.123\./
meta  HAM001  (__HAM001_FROM  __HAM001_SNDR)
score HAM001  0.1
describe  HAM001  Newsletter from jadajada

# YON YetAnotherNewsletter
header  __HAM002_FROM From =~ /.*munication-brie...@yon\.com/
header  __HAM002_SNDR Received =~ /12\.13\.14\.1/
meta  HAM002  (__HAM002_FROM  __HAM002_SNDR)
score HAM002  0.1
describe  HAM002  Newsletter from YetAnotherNewsletter

# MoreNice stuff (debugged)
header  __HAM003_FROM Return-Path =~
/@mail\.morenice\.com|bounce\.j\...@.*/
header  __HAM003_SNDR Received =~ /198\.99\.245\./
meta  HAM003  (__HAM003_FROM  __HAM003_SNDR)
score HAM003  0.1
describe  HAM003  Newsletter delivered by MoreNice stuff

endif

So, a check on Return-Path, combined with the ip address where it comes
from, to reasonably prevent any abuse of the shortcut, and a hit results in
no more handling by SA and prevent any further CPU load. Given the nature of
'pushy' newsletter-senders, it prevents CPU spikes when some newsletters
come in bulk on the electronic doormat. Other then shortcircuiting and
saving CPU cycles, it also prevents any false positives on the few selected
'special' newsletters here.

-- 
View this message in context: 
http://old.nabble.com/Shortcircuit-Rules-tp26116110p26127045.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: SA needs a new paradigm for rule structure

2009-10-10 Thread Mynabbler


Marc Perkel wrote:
 I think you are missing my point. Here's an example.
 
 Mentions God/Christianity = 0
 Mentions Nigeria = 0
 Mentions Bank = 0
 Mentions Funds = 0
 
 Mentions all 4 = 100
 
 This is simplistic but it makes my point.
I think you are missing our point. Your simplistic example translates to:

body   __GOD /\bGod\b/
body   __NIGERIA /\bNigeria\b/
body   __BANK /\bBank\b/
body   __FUNDS /\bFunds\b/
body   __SWIFT /\bSwift response\b/
meta RAISEFLAG (__GOD + __NIGERIA + __BANK + __FUNDS + __SWIFT = 4)
describe RAISEFLAG 4 out 5 bad words fround, surely a 419 scam
scoreRAISEFLAG 100

__GOD does not score, __NIGERIA neither, etc, 4 out of 5 does, a 100 a per
your request.


-- 
View this message in context: 
http://www.nabble.com/SA-needs-a-new-paradigm-for-rule-structure-tp25822909p25838064.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Porn-portal spammers

2009-08-31 Thread Mynabbler


LuKreme wrote:
 
 On 29-Aug-2009, at 07:41, Mynabbler wrote:
 They typically originate from hotmail.com,
 
 Er, do they really originate from hotmail servers, or are they simply  
 spoofing a hotmail return address? Are you using zen?
 

Ow yes. Zen is not an option.

Aug 31 14:52:04 mail filter[22000]: n7VCpx0l031457: Spamassassin found from
prismesiti...@hotmail.com at snt0-omc2-s10.snt0.hotmail.com [65.55.90.85]
HELO snt0-omc2-s10.snt0.hotmail.com to victim hits: 9.52, names:
FREEMAIL_FROM,PORTAL_ABUSE
Subject: amanda righetti showing her nice big tits

This one had a yahoo groups portal link... Genuine hotmail originated crap.

Aug 31 14:57:19 mail filter[23165]: n7VCvEnb030505: Spamassassin found from
chasza9...@hotmail.com at blu0-omc3-s32.blu0.hotmail.com [65.55.116.107]
HELO blu0-omc3-s32.blu0.hotmail.com to anothervictim hits: 12.206, names:
FREEMAIL_FROM,PORTAL_ABUSE,TRACKER_ID 
Subject: GorgeousCelebrityShowsHerNicePussyAndPerfectBoobs

and that one has a livejournal link, brought to us by the same fine company.

Comment by the hotmail abuse desk on a previous attempt to close the gate
upstream: we are not responsable for the content on yahoo groups and our
users communicating about it. Pfff. k-thank-you-bye-bye. :( At the moment
the source is primarily hotmail, although other addresses have been used
during the last two months. 

So, PORTAL_ABUSE is a meta consisting of the existence of a link to a portal
provider in the message, and a slew of trics to be found in the subject,
regardless of the source being either hotmail or some poor sod giving his
credentials to a spammer.
-- 
View this message in context: 
http://www.nabble.com/Porn-portal-spammers-tp25203019p25223292.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Porn-portal spammers

2009-08-29 Thread Mynabbler

I am getting rather tired from messages spamming porn-portals. They typically
originate from hotmail.com, and advertise a porn-portal based on
google.com/groups, google.com/reader, groups.yahoo.com, pipes.yahoo.com,
spaces.live.com, docs.google.com, sites.google.com and livejournal.com.

Up until now the vermin could be stopped decently by checking the subject
(with obvious porn related terms or farm/animal related subjects) and the
existence of a URL pointing to one of these portalproviders. But the vermin
has (as always) adapted. They now toss gibberish in the subject line,
creating subjects like f,arm ani,mals get the taste of real har,dc,ore. If
made an example available here:

http://pastebin.com/m5c18ffdd

The combo 'Portal link found' and subject could still be used, provided I
have a rule that is able to count the number of comma's in a subject. Is
there a way to do such a thing?

-- 
View this message in context: 
http://www.nabble.com/Porn-portal-spammers-tp25203019p25203019.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Porn-portal spammers

2009-08-29 Thread Mynabbler


Karsten Bräckelmann-2 wrote:
 
 header __COMMA  Subject =~ /,/
 tflags __COMMA  multiple
 meta __COMMA_4  __COMMA = 4
 

Works wonders. I chose three, and was almost inclined to score on just this
rule, if it wasn't for people discussing Dave Dee, Dozy, Beaky, Mick  Tich
:) It scores however on non-intended fudder like Purify, Clense, Look
Better, Feel Better and a Google Reader hit.

As for the suggestion to run an RFC-ignorant check on hotmail.com... Another
solution in that category would be starting a blacklist giving a hit on ipv4
range 0.0.0.0 to 255.255.255.255...
-- 
View this message in context: 
http://www.nabble.com/Porn-portal-spammers-tp25203019p25204657.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Porn-portal spammers

2009-08-29 Thread Mynabbler


Karsten Bräckelmann-2 wrote:
 
 Yes, it is indeed likely prone to FPs on its own, unless very strictly
 meta'ed for some special cases, and it actually also is likely bound to
 expire soon. Obfuscation techniques like this usually are subject to
 change, quite rapidly, and I'd bet you'll soon find yourself playing
 whack-a-mole.
 
You are correct about FPs on its own, that is why I meta'ed the ruleset with
the existence of a URL to these portal providers. And you are correct about
obfuscation techniques: the amount of changes is fairly high, but slow
enough to be helpful in fighting it. And to prevent the whack-a-mole battle
I lined up rulesets for a fair amount of expectable crap. Here's a recent
change:

Aug 29 21:46:24 mail filter[22469]: n7TJkJ03026851: Spamassassin found from
hosmanzmjmcyhroytxc1...@hotmail.com at blu0-omc3-s14.blu0.hotmail.com
[65.55.116.89] HELO blu0-omc3-s14.blu0.hotmail.com to victim hits: 10.168,
names: FREEMAIL_FROM,PORTAL_ABUSE,HTML_MESSAGE 
Subject: Seeixy brunette fu-icks and suuicks on camera 
-- 
View this message in context: 
http://www.nabble.com/Porn-portal-spammers-tp25203019p25205909.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.