Re: rbl for smtp auth hosts

2023-09-15 Thread Riccardo Alfieri

On 15/09/23 17:51, Reindl Harald (privat) wrote:

limit the connections per hour on smtp-ports with iptables xt_recent 
and configure postfix properly


anvil_rate_time_unit   = 1800s
smtpd_client_connection_rate_limit = 100
smtpd_client_recipient_rate_limit  = 400
smtpd_client_message_rate_limit    = 400
smtpd_recipient_limit  = 100
Wont help much if you have 100k different IPs connecting, and you also 
have high volume legit customers


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/



Re: rbl for smtp auth hosts

2023-09-15 Thread Riccardo Alfieri

On 15/09/23 17:49, Marc wrote:


Is this a freely available list?

It's included in all DQS accounts, free ones too

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/



Re: rbl for smtp auth hosts

2023-09-15 Thread Riccardo Alfieri

On 15/09/23 17:35, Matus UHLAR - fantomas wrote:



On 15.09.23 15:31, Riccardo Alfieri wrote:
Yes, at previous $dayjob. Applied on the submission MSA, it proved to 
be useful in mitigating the fallout when users got their credentials 
compromised.


can you describe it more?

Well, I checked the connecting IP of a client againts AuthBL *before* 
"permit_sasl_authenticated" (IIRC) in postifx and when users got their 
credential compromised (that  happened more times than I would have 
liked) I'd say more than 95% of connections from auth abusing botnet 
were denied. This mitigated a lot the spam exiting from our outbounds 
and helped us not ending up being listed in the more "trigger happy" 
dnsbls around :)


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/



Re: rbl for smtp auth hosts

2023-09-15 Thread Riccardo Alfieri

On 15/09/23 17:01, Marc wrote:


Anyone have any experience with a dns blacklist specific to known smtp auth 
abuse?
Yes, at previous $dayjob. Applied on the submission MSA, it proved to be 
useful in mitigating the fallout when users got their credentials 
compromised.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/



Re: Which commercial engine to combine with SpamAssassin?

2023-03-24 Thread Riccardo Alfieri

Apologies, this was meant to be a direct email to Alessio...

On 24/03/23 11:33, Riccardo Alfieri wrote:


Buongiorno Alessio,

se ti interessa noi abbiamo un plugin per SA 
(https://github.com/spamhaus/spamassassin-dqs) e delle subscription 
commerciali per accedere a feed non pubblici.


Se ti interessa fammi sapere che ti faccio parlare con qualcuno di sales

Ciao

On 24/03/23 09:12, Alessio Cecchi wrote:


Hi,

we were using the Cyren SDK with a custom plugin for SpamAssassin, 
now we are looking for an alternative commercial SDK engine to 
combine with our SpamAssassin.


I know that Cloudmark have a plugin for SpamAssassin but in the past 
I remember it was more expensive than Cyren.


MailShell have an SDK for antispam and I will probably contact them.

Do you know any other companies developing an antispam SDK to be 
combined with spamassassin?


Thanks

--
Alessio Cecchi
Postmaster @http://www.qboxmail.it
https://www.linkedin.com/in/alessice

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/


Re: Which commercial engine to combine with SpamAssassin?

2023-03-24 Thread Riccardo Alfieri

Buongiorno Alessio,

se ti interessa noi abbiamo un plugin per SA 
(https://github.com/spamhaus/spamassassin-dqs) e delle subscription 
commerciali per accedere a feed non pubblici.


Se ti interessa fammi sapere che ti faccio parlare con qualcuno di sales

Ciao

On 24/03/23 09:12, Alessio Cecchi wrote:


Hi,

we were using the Cyren SDK with a custom plugin for SpamAssassin, now 
we are looking for an alternative commercial SDK engine to combine 
with our SpamAssassin.


I know that Cloudmark have a plugin for SpamAssassin but in the past I 
remember it was more expensive than Cyren.


MailShell have an SDK for antispam and I will probably contact them.

Do you know any other companies developing an antispam SDK to be 
combined with spamassassin?


Thanks

--
Alessio Cecchi
Postmaster @http://www.qboxmail.it
https://www.linkedin.com/in/alessice


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/


Re: Install plugins into embedded spamassassin

2023-02-27 Thread Riccardo Alfieri
If you'd like you can take inspiration from the instructions the Zimbra 
people wrote for our own plugin here: 
https://wiki.zimbra.com/wiki/Spamhaus_HBL


Just use the correct file name for yours and you should be fine

On 25/02/23 15:30, hg user wrote:

Hi,
I'd like to install at least one plugin in my embedded spamassassin, 
installed inside Zimbra.

I'm a bit afraid of breaking stuff, about missing dependencies and so on.

I'm on SA 3.4.5 and - as a test - I'd like to install ESP plugin.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/


Re: RCVD_IN_SBL_CSS FP

2023-01-11 Thread Riccardo Alfieri
46.183.103.8 is listed because it's an emitter of spam, it has been 
heloing with "host-41.36.37.63.tedata.net" and it is hitting traps. I 
could tell you exactly what botnet family these type of heloes comes 
from, but I can't. Believe me, that host is infected.


So you have an emitter that is infected by something, sending both good 
and bad traffic. We signal that by giving it a "3" score, and I don't 
know where you get that 3.6 score, as we define that by


sh_scores.cf:  score    RCVD_IN_SBL_CSS 3

If math doesn't fail me, 3 is less than 3.6 , and the total would have 
scored less than 5, so, from my POV, "working as expected"


There is also SPF_NONE and SPF_HELO_NONE that, from standard SA (3.4.6) 
rules, updated as yesterday, both scores 0.001 instead of 1.6. I can't 
understand the logic of assigning a score so high just for *not* having 
an SPF record, and I hope you didn't do it on purpose.


Of course, if you are not using DQS (meaning you are using Spamhaus 
public mirrors), you are on your own.


PSA: everyone using public mirrors should switch to free DQS

On 11/01/23 19:43, Benny Pedersen wrote:

Riccardo Alfieri skrev den 2023-01-11 18:36:

No.

it checks if an emission is done by an IP that is listed in SBL, and
add 3 points if it is (in our DQS implementation at least). IPs listed
in SBL are deemed "bad" by default, so an emission from them, even if
it's not direct to mx, is bad enough.

If you found an FP I encourage you to open a ticket through
https://check.spamhaus.org/ . We review all FPs and act accordingly.
On 11/01/23 17:56, Benny Pedersen wrote:


it should only check received last ip, not deeap all ips :/

 -lastexternal is done by ZEN


X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-14) on 
localhost.junc.eu

X-Spam-Flag: YES
X-Spam-Level: *
X-Spam-Status: Yes, score=5.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
DKIM_VALID_AU,DMARC_PASS,HEADER_FROM_DIFFERENT_DOMAINS,
MAILING_LIST_MULTI,RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H3,
RCVD_IN_MSPIKE_WL,RCVD_IN_SBL_CSS,RELAYCOUNTRY_GREY,SPF_HELO_NONE,
SPF_NONE shortcircuit=no autolearn=no autolearn_force=no 
version=4.0.0

X-Spam-Report:
* -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at 
https://www.dnswl.org/, low

*  trust
*  [168.100.1.4 listed in list.dnswl.org]
*  3.6 RCVD_IN_SBL_CSS RBL: Received via a relay in Spamhaus SBL-CSS
*  [46.183.103.8 listed in zen.spamhaus.org]
*  1.6 SPF_NONE SPF: sender does not publish an SPF Record
*  0.0 RCVD_IN_MSPIKE_H3 RBL: Good reputation (+3)
*  [168.100.1.4 listed in wl.mailspike.net]
*  1.6 SPF_HELO_NONE SPF: HELO does not publish an SPF Record
* -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
*  0.1 DKIM_SIGNED Message has a DKIM or DK signature, not 
necessarily

*  valid
* -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from 
author's

*   domain
*  0.0 RCVD_IN_MSPIKE_WL Mailspike good senders
*  0.1 RELAYCOUNTRY_GREY Relayed through at some point
*  0.2 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd 
level mail

*  domains are different
* -1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen 
list

*  manager
* -0.1 DMARC_PASS DMARC pass policy
X-Spam-AWL: AWL= MEAN= COUNT= PRESCORE=
X-Spam-Relay-Country: US ** ** ** ** DE DE
X-Spam-ASN: AS3700 168.100.0.0/22
X-Fuglu-Incomingport: 10025
X-Fuglu-Suspect: 6a8f891e8b134a9f92cd83617788ebc7
X-Greylist: whitelisted by SQLgrey-1.8.0
Received: from russian-caravan.cloud9.net (russian-caravan.cloud9.net 
[168.100.1.4])

by mx.junc.eu (Postfix) with ESMTPS
for ; Wed, 11 Jan 2023 15:58:34 +0100 (CET)



/var/lib/spamassassin/4.00/spamassassin_snb_it/20_ITA.cf: 
header    __ITA_RCVD_IN_SENDERSCORE_0_29 
eval:check_rbl('senderscore0-lastexternal','score.senderscore.com.','^127\.0\.4\.([1-2]?[0-9])$')
/var/lib/spamassassin/4.00/kam_sa-channels_mcgrail_com/nonKAMrules.cf:header 
__RCVD_IN_HOSTKARMA 
eval:check_rbl('HOSTKARMA-lastexternal','hostkarma.junkemailfilter.com.')
/var/lib/spamassassin/4.00/kam_sa-channels_mcgrail_com/nonKAMrules.cf:header 
RCVD_IN_HOSTKARMA_W eval:check_rbl_sub('HOSTKARMA-lastexternal', 
'127.0.0.1')
/var/lib/spamassassin/4.00/kam_sa-channels_mcgrail_com/nonKAMrules.cf:header 
RCVD_IN_HOSTKARMA_BL eval:check_rbl_sub('HOSTKARMA-lastexternal', 
'127.0.0.2')
/var/lib/spamassassin/4.00/kam_sa-channels_mcgrail_com/nonKAMrules.cf:header 
RCVD_IN_HOSTKARMA_BR eval:check_rbl_sub('HOSTKARMA-lastexternal', 
'127.0.0.4')
/var/lib/spamassassin/4.00/updates_spamassassin_org/20_dnsbl_tests.cf:header 
RCVD_IN_SORBS_DUL    eval:check_rbl('sorbs-lastexternal', 
'dnsbl.sorbs.net.', '127.0.0.10')
/var/lib/spamassassin/4.00/updates_spamassassin_org/20_dnsbl_tests.cf:header 
RCVD_IN_XBL  eval:check_rbl('zen-lastexternal', 
'zen.spamhaus.org.', '^127\.0\.0\.

Re: RCVD_IN_SBL_CSS FP

2023-01-11 Thread Riccardo Alfieri

No.

it checks if an emission is done by an IP that is listed in SBL, and add 
3 points if it is (in our DQS implementation at least). IPs listed in 
SBL are deemed "bad" by default, so an emission from them, even if it's 
not direct to mx, is bad enough.


If you found an FP I encourage you to open a ticket through 
https://check.spamhaus.org/ . We review all FPs and act accordingly.


On 11/01/23 17:56, Benny Pedersen wrote:


it should only check received last ip, not deeap all ips :/

-lastexternal is done by ZEN

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/


Re: DQS rules for SA 4.0.0+

2022-12-28 Thread Riccardo Alfieri

On 28/12/22 15:15, Henrik K wrote:



Maybe would be even good idea to use something like this:

ifplugin Mail::SpamAssassin::Plugin::HashBL
   
else
   error: Please activate HashBL plugin in v342.pre
endif
I think I'll just add the ifplugin condition in the two .cf files and 
add a note in the README. No reason to overengineer something that it 
should be working by default, as it is in a stock SA installation.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/



Re: DQS rules for SA 4.0.0+

2022-12-28 Thread Riccardo Alfieri

On 28/12/22 14:44, Henrik K wrote:


It is enabled by default for new installs in v342.pre (old users must enable
it manually).  But like with any other loadable plugin, one MUST check use
"ifplugin" to check that it's loaded.

Ok, thanks for the clarification.

Would you then suggest to add also a:

ifplugin Mail::SpamAssassin::Plugin::URIDNSBL

to the .cf files where check_rbl , urirhssub etc are used?

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/



Re: DQS rules for SA 4.0.0+

2022-12-28 Thread Riccardo Alfieri

On 28/12/22 14:20, Kevin A. McGrail wrote:


Do you have hashbl plugin enabled?



Ah, I thought it was enabled by default in SA 4.0.

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/



Re: DQS rules for SA 4.0.0+

2022-12-28 Thread Riccardo Alfieri
Looks like you didn't replace the DQS key in the template, as it's 
outlined in the README.


You also have a lot of parsing errors that are not normal (\t should be 
a , don't know why your system renders that badly)


On 28/12/22 14:17, Benny Pedersen wrote:
Dec 28 14:12:09.837 [1461] warn: config: failed to parse line in 
/etc/mail/spamassassin/sh.cf (line 71): 
urirhssub\tSH_BODYURI_REVERSE_SBL\tyour_DQS_key.zen.dq.spamhaus.net.\tA 
127.0.0.2



--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/


Re: SA4 spamhaus/DQS "async: aborting" log messages?

2022-12-20 Thread Riccardo Alfieri
Probably asking the obvious, but did you actually substitute 
"your_dqs_key" with your *actual* DQS key, right?


On 20/12/22 17:26, PGNet Dev wrote:


Tue Dec 20 11:16:28 2022 [54384] info: async: aborting after 13.670 s, 
deadline shrunk: HASHBL, 
A/compiling.spamassassin.taint.org.your_dqs_key.dbl.dq.spamhaus.net, 
rules: SH_DBL_HEADERS



--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/


Re: How to incorporate network blocks

2022-11-10 Thread Riccardo Alfieri



Hi,

I can't speak for the other feeds, but for our (DROP), if you register a 
DQS key and install our plugin it would work out of the box




On 10/11/22 17:54, Joey J wrote:


I'm trying to incorporate:
feeds.dshield.org/block.txt <http://feeds.dshield.org/block.txt>
spamhaus.org/drop/drop.lasso <http://spamhaus.org/drop/drop.lasso>
ciarmy.com/list/ci-badguys.txt <http://ciarmy.com/list/ci-badguys.txt>
openbl.org/lists/base.txt <http://openbl.org/lists/base.txt>



--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/


Re: Spamhaus DQS usage portal update frequency?

2022-11-10 Thread Riccardo Alfieri

Hi,

the graph is daily usage over the last 14 days, so it is updated daily 
with usage from the previous 24 hours.


On 09/11/22 19:54, AJ Weber wrote:

Does anyone know how often the DQL usage tab is updated by spamhaus?

I believe my SA was misconfigured, and didn't have anything showing 
for usage.  I think this is fixed now and sent test emails from their 
"Blocklist Tester Verification" tool.  All emails were correctly 
categorized as SPAM, and I see the relevant headers referring to the 
Spamhaus rules in them.


However, I still do not see any usage reflected in the portal at all.  
So I'm just trying to determine whether my config is correct now.


Thanks in advance,

AJ


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/


SA 4.0 and DQS

2022-10-12 Thread Riccardo Alfieri

Good morning,

If anyone is interested, I have a ruleset for DQS that works with (at 
least) SpamAssassin 4.0rc2


I'm not going to publish an official ruleset for 4.0 on our Github page 
until SA reaches release status, but if you have a production server 
with SA 4.0rc* and want to test DQS, contact me offlist.


I have only a test server and because of this some real world feedback 
would be very appreciated! Thanks!


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaus.com/   



[Spamhaus Notice] Reminder about the new DBL entering production tomorrow

2022-01-31 Thread Riccardo Alfieri

Hello,

the production version of the Spamhaus Domain Blocklist (DBL) with 
hostnames will go live tomorrow at 12.00 hrs UTC. This will happen 
automatically, with no changes required to the zone you query, unless 
you changed to query dbl-beta.spamhaus.org.


We hope you benefit from the increased accuracy.

If you haven’t already done so, we recommend updating your plug-in to 
this version: https://github.com/spamhaus/spamassassin-dqs


Thanks again to all those who tested and provided feedback for the beta 
version. Please remember that if you changed your config to query, 
dbl-beta.spamhaus.org, this needs to be updated to query the production 
DBL, as dbl-beta.spamhaus.org will not be available after February 15th, 
2022.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/


[Spamhaus notice] Service update for users of Spamhaus Project's DNSBLs who query via Cloudflare DNS

2022-01-27 Thread Riccardo Alfieri

Hello,

If you currently use The Spamhaus Project's free DNSBLs and make queries 
via Cloudflare DNS resolvers, you need to change your configuration. 
This will ensure you don't have any interruption to your service.


As of Tue, February 15th, the Project will begin restricting access to 
its blocklists for those querying via Cloudflare DNS.


Why? The Spamhaus Project's Terms of Use 
(https://www.spamhaus.org/organization/dnsblusage/) outline that it 
doesn't allow users to query via DNS resolvers where there is no 
attributable reverse DNS; this includes Cloudflare.


This is to protect the free service for those it's intended for, i.e., 
non-commercial low-volume users. Some organizations try to hide behind 
unattributable DNS and make queries outside the Fair Use Principles, 
reducing the quality of the service for everyone.


To keep being protected by free DNSBLs and avoid issues with your email 
stream, we recommend that Cloudflare users start accessing the 
blocklists via the free Data Query Service (DQS), which you can sign up 
for here: 
https://www.spamhaus.com/free-trial/sign-up-for-a-free-data-query-service-account/


Changing your configuration should only take a matter of minutes. Once 
you've signed up and verified your email address, you will get access to 
a "DQS key" to include in your configuration. These config changes take 
only minutes; see our technical docs 
(https://docs.spamhaus.com/datasets/docs/source/40-real-world-usage/index.html) 
for more detail.


To provide a clear signal to users that the Project's DNSBLs are not 
protecting their email, Spamhaus will return an error code; 
127.255.255.254. If you haven't set up your email servers to accept this 
error code, all emails could be rejected and returned to their sender.


To ensure you continue being protected, for free, with our IP and domain 
DNSBLs, please move to the DQS.


If you have any questions regarding these changes, please use the 
contact form here: https://www.spamhaus.com/#contact-form


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/


Re: A lot a false negatives

2022-01-19 Thread Riccardo Alfieri

On 19/01/22 16:35, Xavier Humbert wrote:


X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5.5

tests=[AWL=0.642, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.249,
HTML_IMAGE_RATIO_04=0.001, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1,
MIME_QP_LONG_LINE=0.001, SPF_FAIL=0.001, SPF_HELO_NONE=0.001]
autolearn=ham autolearn_force=no


It looks like your bayes db is poisoned/not trained correctly.

Best course of action, IMO, is to delete it and restart training from 
scratch, with a decent corpus of ham and spam


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/


Re: [Spamhaus notice] New plug-in is now available for use with Spamhaus Domain Blocklist with hostnames which goes into production on February 1st.

2022-01-11 Thread Riccardo Alfieri

On 11/01/22 16:14, Larry Rosenman wrote:



will spamhaus-dqs be updated with this?  or should I change FreeBSD to 
pull this branch?


Yes, it will be updated as soon as the new DBL enters production

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: [Spamhaus notice] New plug-in is now available for use with Spamhaus Domain Blocklist with hostnames which goes into production on February 1st.

2022-01-11 Thread Riccardo Alfieri

On 11/01/22 14:50, AJ Weber wrote:


Sorry for not having followed as closely as maybe I should have, but...

Is there a list of "legacy" Spamhaus cf/pm/plugin entries we would 
remove if we were to install the new DBL plug-in?  I don't see 
anything on the github page, but maybe it's documented elsewhere?



Hello,

you won't need to remove anything, it should just work (TM)

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



[Spamhaus notice] New plug-in is now available for use with Spamhaus Domain Blocklist with hostnames which goes into production on February 1st.

2022-01-11 Thread Riccardo Alfieri
As promised, here is the new release of the Spamhaus plug-in. This will 
help you easily integrate Spamhaus’ Domain Blocklist (DBL) with 
hostnames into your email infrastructure when the revised blocklist goes 
into production from February 1st. You can update your configuration 
with this newly released plug-in before the blocklist goes into production.


The plugin is available here: 
https://github.com/spamhaus/spamassassin-dqs/tree/dbl-beta


Reminder: If you have changed your configuration to test the beta DBL, 
you will need to update your config to use the production DBL, which 
goes live on February 1st. If you are currently using the beta version 
of this plug-in, please do not switch to using this production version 
until February 1st. We will continue to make the beta zone available for 
two further weeks giving you additional time to make any required changes.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: [Spamhaus Notice] Reminder of changes to the Spamhaus beta Domain Blocklist & request for feedback

2022-01-04 Thread Riccardo Alfieri

On 04/01/22 13:38, Dominic Raferd wrote:



reject_rhsbl_sender 
redacted.dbl-beta.dq.spamhaus.net=127.0.[0..2].[0..255]
reject_rhsbl_reverse_client 
redacted.dbl-beta.dq.spamhaus.net=127.0.[0..2].[0..255]

reject_rhsbl_helo redacted.dbl-beta.dq.spamhaus.net=127.0.[0..2].[0..255]


A quick addon to what I wrote before..  I noticed that you are using the 
wrong hostname :) The correct one, for the time being and up until the 
beta ends, is dbl-beta.spamhaus.org


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: [Spamhaus Notice] Reminder of changes to the Spamhaus beta Domain Blocklist & request for feedback

2022-01-04 Thread Riccardo Alfieri

On 04/01/22 13:38, Dominic Raferd wrote:

I haven't tried using the new plug-in with SA, but I have been using 
the list in a postfix restriction list (in place of 
redacted.dbl.dq.spamhaus.net) on several of my mailservers:


reject_rhsbl_sender 
redacted.dbl-beta.dq.spamhaus.net=127.0.[0..2].[0..255]
reject_rhsbl_reverse_client 
redacted.dbl-beta.dq.spamhaus.net=127.0.[0..2].[0..255]

reject_rhsbl_helo redacted.dbl-beta.dq.spamhaus.net=127.0.[0..2].[0..255]

Since I started in early December 2021 these restrictions have not 
caught any incoming mail, whereas the same but using 
dbl.dq.spamhaus.net on another of my mail servers continue to pick up 
many (with minimal fps).


Am I doing something wrong, or is this expected behaviour?


Hi,

you are not supposed to use the abused-legit component of DBL in 
Postfix, because the target of that DNSBL is to list abused websites 
mostly seen in the email body, that are often used as redirectors to 
more spammy domains. Doing the rejections your way can unfortunately 
only lead to more FPs


The correct way to do it is by checking the URLs in the email body, 
either by using our plugin or in some other ways.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: [Spamhaus Notice] Reminder of changes to the Spamhaus beta Domain Blocklist & request for feedback

2021-12-16 Thread Riccardo Alfieri

Hi Grant,

On 15/12/21 22:42, Grant Taylor wrote:


I've noticed a small down turn in the amount of spam entering my 
personal systems.  My personal systems are small enough that I don't 
have good counters of before / after to share.

Good to hear


Will free / non-commercial DQS subscribers need to do anything other 
than upgrading the plugin come January 11th?

You will just need to update the plugin


Am I correct in assuming that you will be sending out notification(s) 
around the time you make the changes on January 11th?
We'll send probably another reminder before 11/01 , and for sure one on 
the 11th itself.


What will happen to the beta zone after the two week window?  Will it 
remain with increasingly stale data?  Will the zone be emptied to 
start answering as if nothing was listed?  Will it have a wildcard to 
start inducing false positives a la. fail hard / fail fast?  Again, 
just trying to set my expectations.
We'll follow what is suggested here: 
https://datatracker.ietf.org/doc/html/rfc6471#section-3.4


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/


[Spamhaus Notice] Reminder of changes to the Spamhaus beta Domain Blocklist & request for feedback

2021-12-15 Thread Riccardo Alfieri
We’d like to say a big “thank you” to all of you who have been testing 
the beta version of the Spamhaus Domain Blocklist (DBL) with hostnames.


How are you getting on with it? Have you encountered issues? Are you 
noticing a reduction in false positives with the abused-legit component 
of the DBL? How’s the plug-in (with the recommended configuration 
changes) working for you?


If you could find the time to let us know we would really appreciate it.

REMINDER - Access to the beta version of the DBL with hostnames is 
through the free Public Mirrors until January 31st, 2022. However, when 
it moves to production on February 1st, 2022, it will only be available 
via the Data Query Service (DQS) or rsync, i.e., not the Public Mirrors. 
The DQS is available for free to non-commercial users; 
_https://www.spamhaus.com/free-trial/sign-up-for-a-free-data-query-service-account/_. 



This means that if you have changed your plug-in config to test the beta 
DBL you will need to upgrade it to use the production DBL. An updated 
plug-in will be released on Jan 11^th , 2022. We will continue to make 
the beta zone available for two weeks after the Production version of 
the blocklist goes live to provide time to ensure these config changes 
are made.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Invitation to test our latest beta domain blocklist

2021-11-17 Thread Riccardo Alfieri

Hi,

We’d like to invite the SpamAssassin community to test our beta domain 
blocklists with hostnames.


We’ve developed this version of the DBL to provide increased accuracy 
when using the abused-legit component of the DBL (listings of 
compromised websites). 
https://www.spamhaus.com/resource-center/hostnames-for-spamhaus-domain-blocklist/


The beta blocklist is available via our public mirrors 
“dbl-beta.spamhaus.org”. It will be available until Jan 31st, 2022. 
After this time, it will be moved to production and will only be 
available via our Data Query Service or rsync.


If you are a non-commercial user of the Spamhaus Project’s blocklists 
(via its Public Mirrors), we recommend moving to a free DQS account with 
access to additional blocklists. 
https://www.spamhaus.com/free-trial/sign-up-for-a-free-data-query-service-account/


For the SpamAssassin community using our specially developed plug-in, 
we’ve put together some configuration updates to use with this beta 
version; 
https://github.com/spamhaus/spamassassin-dqs/blob/master/HOWTO_DBL_with_hostnames.md. 
After making a few amends and additions to the code, you will be able to 
use the beta zone immediately.


We’d love to get your feedback on the beta DBL with hostnames. You can 
reach us either in this forum, via our contact form 
https://www.spamhaus.com/#contact-form, or on Twitter 
https://twitter.com/SpamhausTech.


Thanks for your support!

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/


Re: heads up for false uribl black hits

2021-05-20 Thread Riccardo Alfieri

On 20/05/21 18:59, Benny Pedersen wrote:




Is that not working correctly?


only place i find it https://spameatingmonkey.com/lookup/libera.chat


Hi,

by checking: http://multirbl.valli.org/lookup/libera.chat.html

it looks like that is indeed listed on URIBL too: 
http://lookup.uribl.com/?domain=libera.chat


Ot at least it is *now* , maybe it comes and goes for some reasons

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Enforcing of new return codes for Spamhaus RBLs

2021-02-15 Thread Riccardo Alfieri

On 14/02/21 16:09, RW wrote:



What does "generic unattributable rDNS" mean?

I presume it will block me because I'm querying through a VPN with no
rDNS for the shared egress IP address.

If I have the queries bypass the VPN, will it also block me for having
ISP dynamic pool rDNS.


Hello RW,

you are correct. That return code will be triggered if Spamhaus is 
unable to identify who is the original querier, and with a VPN endpoint 
that is most likely the case.


If you still need to do queries over VPN, then you can simply subscribe 
for a free DQS account, as DQS accounts are not blocked in any way, 
except if you go over quota.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Enforcing of new return codes for Spamhaus RBLs

2021-02-12 Thread Riccardo Alfieri

Hello everyone,

this is just a friendly heads up for everyone using our RBLs through the 
public mirrors. Beginning in March Spamhaus will start to enforce the 
return codes for these three new conditions announced in late 2019:


127.255.255.252 - Typing error in DNSBL Name
127.255.255.254 - Query via public/open resolver/generic unattributable rDNS
127.255.255.255 - Excessive Number of Queries

SpamAssassin already has the codes in it's ruleset, so there is nothing 
really to do except check the logs in March to see that your are not 
hitting on any on them.


Please see the article at 
https://www.spamhaus.org/news/article/807/using-our-public-mirrors-check-your-return-codes-now 
for more informations


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: HEADS UP: SPAMCOP MIA

2021-01-31 Thread Riccardo Alfieri

On 1/31/21 8:28 PM, Arne Jensen wrote:

Spamhaus (blacklist) will return 127.255.255.x responses, if you're 
over quota, using public resolvers or otherwise incorrect queries.




Hi,

this is not completely true. As stated here: 
https://www.spamhaus.org/news/article/788/spamhaus-dnsbl-return-codes-technical-update 
we are giving 127.255.255.254 return codes if you are using public 
resolver, but this is not completely enforced.


This means that if you are using *very common* public resolvers (or if 
your VM uses common VPS provider DNSs) you'll get a NXDOMAIN response, 
that will dramatically lower spam detection, while not giving useful 
response too. This had to be done because some (misconfigured) MTAs 
interprets any response different than NXDOMAIN as "LISTED". And we 
really don't want to cause unnecessary FPs.


We always recommend to register a free DQS key 
(https://www.spamhaus.com/product/data-query-service/), that will work 
even with *very common* open resolvers.


Our SpamAssassin plugin (https://github.com/spamhaus/spamassassin-dqs) 
is written taking in account all of the different edge cases, and 
everyone is encouraged to try it.


Sorry for vendor spam, but I felt this had to be outlined

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Update for Composite Blocklist (CBL) Users

2021-01-26 Thread Riccardo Alfieri

On 1/25/21 9:16 AM, Axb wrote:


Posting this to avoid surprises:

As of the first week of 2021, the Composite Blocklist (CBL) is being 
retired.


See:
https://www.spamhaus.org/news/article/803/


Hi,

thanks Axb for pointing this out, but, just to be clear, the CBL itself 
is not being retired in the sense that the data will not be available 
anymore.


CBL has been integrated in XBL (and thus in ZEN) for years, so the 
default SA setup is already ok to deal with this change, that is 
basically transparent for everyone using the default ruleset.


This is relevant only for people that have custom rules that directly 
query cbl.abuseat.org. If this is your case then please switch to 
xbl.spamhaus.org asap, and check if your query volume respects our terms 
and condition (https://www.spamhaus.org/organization/dnsblusage/) 
because they are going to be enforced.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: spamhaus.net. type=A class=IN) failed: a domain name contains a null label

2020-10-07 Thread Riccardo Alfieri

Please use only the latest github package before submitting bugs.

We are really community focused, but, as already said, we can support 
only the latests release


On 07/10/20 15:04, Damian wrote:

That is indeed v1.0.1


It's old, 20190704


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: spamhaus.net. type=A class=IN) failed: a domain name contains a null label

2020-10-06 Thread Riccardo Alfieri

On 07/10/20 05:55, Chris wrote:


I checked my sh.cf in /etc/mail/spamassassin Riccardo and see no extra
'.' anywhere.


I tested your email in my 3.4.4 installation with DQS and I don't see 
issues.


So, if you want, send me your .cf files and I'll have a look at them, 
but before that be absolutely sure that you are running the latest rules 
from:


https://github.com/spamhaus/spamassassin-dqs

We only support the latest version

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: spamhaus.net. type=A class=IN) failed: a domain name contains a null label

2020-10-06 Thread Riccardo Alfieri

Hi Chris,



spamd[435769]: dns: new_dns_packet
(domain=o279.send.iheartdogs.com..xx/db
l.dq
.spamhaus.net. type=A class=IN) failed: a domain name contains
a null
label



Can you check how the DQS lookups are defined in the .cf files?

The correct sytax would be, ie:

urirhssub URIBL_DBL_SPAM .dbl.dq.spamhaus.net. A 127.0.1.2

From what appears in the logs it may be that you have an extra dot 
somewhere, possibly before the DQS key


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Zero-point garbage text that isn't caught by the small-font rules

2020-08-21 Thread Riccardo Alfieri

On 21/08/20 11:52, Matus UHLAR - fantomas wrote:



I have noticed those some time ago.
I wonder what's the point of sending such mail.

Perhaps trying to fool the bayesians? I remember some spam emails that 
cyclically appear (mostly dating spam) that have a lot of hidden text at 
the end of the body with just entire sentences from classic books or 
random common words chained.


Just an hypothesis :)

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Why the new changes need to be "depricated" forever

2020-07-23 Thread Riccardo Alfieri

On 23/07/20 16:53, Benny Pedersen wrote:



so rspamd cant make support to spamassassin rules without permission 
to change rules names ?, but thay did, wonderfull world of help each 
other
I think that rspamd's approach is correct. Rspamd just takes SA rules 
and use them. It doesn't provide the rules, meaning that you most likely 
need to have an installation of at least sa-update on the same machine 
that runs rspamd to keep rules updated.
SA rules are also distributed under Apache 2.0 license and I guess that 
license permits reuse of existing code in other projects, but IANAL :)


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Thanks to Guardian Digital & LinuxSecurity for the nice post about SpamAssassin's upcoming change

2020-07-22 Thread Riccardo Alfieri

On 22/07/20 16:00, RW wrote:



I'd missed that it was your testing. So when testing speed did you
measure throughput with enough concurrent tests and spamd child
processes to keep all the CPU cores fully occupied?


I have two VMs with same HW (2vCPU, 4GB RAM), one SA 3.4.4 and one 
Rspamd 2.6, being fed by the same mail stream (20-30k mail/day).


Rspamd is, I'd say, more than 50% light on CPU and memory. And also 
orders of magnitude quicker in doing checks. But to truly compare SA and 
Rspamd you should run Rspamd with the SpamAssassin compatibility module 
(https://rspamd.com/doc/modules/spamassassin.html) and have it load all 
SA rules too.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: URL Scanning in html attachments

2020-07-22 Thread Riccardo Alfieri

On 22/07/20 15:46, Paul Fowler wrote:


Hi All,

I have a general question regarding URL scanning in attachments.

I don't think SpamAssassin has a way to do that out of the box, but it's 
something that could be done inside a dedicated plugin. It would help 
also to get URLs from PDF attachments since some malware is using this 
approach (ie: Emotet in the past days)


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: IMPORTANT NOTICE: Rules referencing WHITELIST or BLACKLIST in process of being Renamed

2020-07-20 Thread Riccardo Alfieri

On 20/07/20 19:31, John Hardin wrote:



Apologies for not clarifying that detail; I was aware of it. I did 
hedge by saying "(potentially) subject to renaming".



No apologies necessary, it wasn't directed to you :)

I'm just trying to raise awareness that, while changing things is 
possible, it must be done with proper testing and communication to all 
the parties involved


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: IMPORTANT NOTICE: Rules referencing WHITELIST or BLACKLIST in process of being Renamed

2020-07-20 Thread Riccardo Alfieri

On 20/07/20 19:01, Martin Gregorie wrote:


Repeating previously posted info for completeness: one of my private
rules uses URIBL_BLACK as a subrule. I have no other potential conflicts
with SA rule name changes and no postprocessing that's dependent on SA
rule names.


Here just to say that URIBL Black is the official name that URIBL use 
for that blocklist (http://uribl.com/usage.shtml). If there will be a 
name change then a proposal should come from the URIBL team, not SA. If 
SA is not satisfied with the name it should drop the list from the rules 
if the URIBL team is not willing to comply to the name change.


I don't want to enter the discussion about what is good or not, I'm only 
concerned that these changes could impact other products in the SA universe


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Detecting SendGrid shared IPs

2020-07-16 Thread Riccardo Alfieri

Bumping a little the score for shared IPs? Could make sense..

On 16/07/20 14:10, m...@junc.eu wrote:

Why?


From: Pedro David Marco 
Date: Thu, Jul 16, 2020 at 09:18 AM
Subject: Detecting SendGrid shared IPs
To: Users 

Is there any way to know whether a Sendgrid IP is shared or dedicated?

Thanks in advance!



Pedro


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: spamhaus enabled by default

2020-07-15 Thread Riccardo Alfieri

On 14/07/20 19:33, Charles Sprickman wrote:


Since the consensus is that this is kind of a “turn it loose out of the box” 
situation, I think a nice compromise would be huge commented chunks around 
settings that would disable any commercial services that will start sending 
nastygrams if you are outside of their (sometimes complex and kind of opaque 
“free” use case).

I do so wish some of those folks would take spamtraps in trade. We see spam 
from sources even the most expensive lists don’t see for at least 15-20 minutes 
- valuable data, IMHO. :)


Well, we do have a "data sharing" program and are open to discussion of 
trading services for spamtraps/live traffic. We are especially 
interested in non US email traffic.


If you or anyone else think that they have valuable data to share, 
please contact me offlist with details and I'll escalate to the relevant 
people


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: spamhaus enabled by default

2020-07-11 Thread Riccardo Alfieri

On 10/07/20 22:51, Charles Sprickman wrote:



That’s unrealistic. Many ISPs these days that aren’t the “big boys” with 
dedicated staff for every facet of ISP operations, they are one and two man 
shops running WISPs in rural areas or developing countries. It’s not the 90’s 
anymore. It’s a terrible default, even home users should have to take an effort 
to enable a commercial service.
I'm not going to make comments about running an ISP without a basic 
knowledge of email/hosting/networking

And spamhaus should just replace the sales pitch email with instructions on how 
to comment their stuff out if they don’t want small ISPs (a small business, 
actually!) to use it. :)


Excuse me but isn't it at least "fair" that, if you use a service 
provided by others for commercial purposes, you pay for that service 
that contributes to your income?


And I don't know where you got a quote of "hundreds of dollars per 
month" for 1000 mailboxes, but it's not really the case if you use DQS.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: spamhaus enabled by default

2020-07-10 Thread Riccardo Alfieri

On 10/07/20 18:01, Philipp Ewald wrote:


Am 10.07.20 um 13:54 schrieb Kevin A. McGrail:

Here's the policy:
https://cwiki.apache.org/confluence/display/spamassassin/DnsBlocklistsInclusionPolicy 



This was active since 2018?

Maybe it would be better to ask if your are commercial or not... AFIK 
you got problem if your running spamhaus and have no license so any 
mail got marked as SPAM (or got hit SMAPMHAUS rule on any domain?)



Hi,

sorry but this will never happen. We are not going to use a "list the 
world" response to queries from anyone. There are dedicated return codes 
for that (already included in SpamAssassin): 
https://www.spamhaus.org/news/article/788/spamhaus-dnsbl-return-codes-technical-update


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: handling spam from gmail.

2020-06-11 Thread Riccardo Alfieri

On 11/06/20 10:19, Marc Roos wrote:



I am sick of this gmail spam. Does anyone know a solution where I can do
something like this:

1. received email from adcpni...@gmail.com
2. system recognizes this email address has been 'whitelisted', continue
with 7.
3. system recognizes as this email never been seen before
4. auto reply with something like (maybe with a wait time of x hours):


Respectfully, this is a recipe for disaster. I've lost count of 
misconfigured antispam appliances that do something like you want to and 
ended up either


- Having the outbound queue full of undeliverables
- Bounceback spamming innocent users

So, no, please don't do that :)

As others suggested, start by upgrading your SA and do some targeted 
training to the bayes.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: google as biggest botnet, no kidding

2020-05-12 Thread Riccardo Alfieri

On 12/05/20 01:12, Benny Pedersen wrote:



is others see spam from googleapis.com urls ?

its currently url skipped, but i unskipped it localy to see tracking 
of it


i have maked my clamav reject html attachments from today


Yes, we are seeing an awful lot of phishing sites hosted under 
https://firebasestorage.googleapis.com


I'd say that 99% of them can be catched by a simple regex though, but I 
don't know how common those firebasestorage URLs are in normal emails.. 
I personally have still to see a legit one.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: New Spamhaus zone and updates to the plugin

2020-04-30 Thread Riccardo Alfieri

On 30/04/20 12:07, Dominic Raferd wrote:



Thanks Riccardo this is a great tool and I have updated our SA plugin 
as advised. I think it is a pity we small-scale users can't benefit 
from the new HBL :( what was the logic here?


I don't know anything about the decisions behind the usage policy sorry 
:) Try emailing the sales dept as advised in the README, maybe you'll 
work something out.
It might be worth posting on the postfix users list about the benefits 
of a dqs account; I use it with postscreen and smtpd to good effect.


I thought about that, but there are some issues I think.

If you put ZEN/DBL in postfix and reject at SMTP level you are basically 
crippling what spamassassin is doing in postqueue, because it will never 
see emails coming ie: from bots, probably giving problems to the 
autolearn algo and other things like I think meta rules based on 
Spamhaus zones.


You could still do prequeue rejections with SpamAssassin if you use a 
milter, and if you keep ZEN shortcircuiting I don't think the overall 
load avg would increase very much.


Oviously YMMV :)

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



New Spamhaus zone and updates to the plugin

2020-04-30 Thread Riccardo Alfieri

Hello,

I'm happy to announce to the SpamAssassin community that Spamhaus has 
released an updated version of our plugin that solves minor issues and, 
more importantly, adds support for a new dataset we just released.


The new zone is called HBL (Hash BlockList) and deals with three 
different email scenarios previously not covered by the plugin:


- Dropbox emails: emails - mostly on freemail providers - used in 
419-like scams, sextortions and the like
- Cryptowallets: malicious crypto addresses used mainly in extortion 
scams. Currently supports BTC,BCH,LTC,XRP,XMR and ETH

- Filehash: hashes of suspicious or confirmed malicious attachments

All the relevant technical information is available at 
https://docs.spamhaustech.com/10-data-type-documentation/datasets/030-datasets.html#hbl 



HBL is a zone available only to paid-for DQS users, but we do offer a 
free trial; just follow the instructions at 
https://github.com/spamhaus/spamassassin-dqs


Even if you are not planning to use HBL, we strongly suggest you to 
update the plugin to the latest release for general security.


We'd love some feedback and I'm always open for suggestions or 
discussion. Thank you!


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Question on early detection for relay spam

2020-03-03 Thread Riccardo Alfieri

On 03/03/20 08:54, Benny Pedersen wrote:


Ted Mittelstaedt skrev den 2020-03-03 08:26:


What do other people do for this problem?

Hi Ted,



What I can suggest you is to look at our DQS product 
(https://www.spamhaustech.com/dqs/), that even in it's free subscription 
model includes AuthBL, a list made of botnet's known to be used to spam 
with abused credentials. A simple 5xx if a client connect to your 
submission port using a listed IP would take care of *most* of your 
problems.




After that, just running a daily report with a table like:

sasl_username - number of different ips observed in the latest 24h.

Can help you find out abused credentials that were being used by bots 
(still) not in AuthBL.


I've observed in the field that this is an approach that works when you 
have up to 20-30k users; after this threshold you may want to write 
something to automate warnings and/or automatically block accounts if 
they exceed a defined threshold of (different_ips per sasl_username) per 
hour.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: URIBL_SBL_A - Spamhaus false positive..

2020-01-23 Thread Riccardo Alfieri

On 23/01/20 18:56, RW wrote:



I'm curious as to what's actually going on here. If I use

dig ns fluent.ltd.uk @

some caches give the 2 servers supplied by Nominet, others give the 3
servers from  dns[1-3].fluent.ltd.uk (an extra round-trip).

If I look on Google's 8.8.8.8 I get a random result with random TTLs.
Perhaps the TTLs can be explained by Google's higher-level caching
not coping with the conflict and leaving the individual servers to
handle it, but their software is still producing two different results.
If I would have to guess, I'd say someone removed dns3.fluent.ltd.uk 
from the zone without updating the serial number, so now if you happen 
to hit a resolver that never queried that domain you'll get only 
dns[1-2] , while the others will keep the cached response until expiration.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: URIBL_SBL_A - Spamhaus false positive..

2020-01-23 Thread Riccardo Alfieri

On 23/01/20 14:48, RW wrote:


On Thu, 23 Jan 2020 13:06:01 +
Jonathan Gilpin wrote:


Hi,

It seems that SpamAsassin is giving out a false positive on a
Spamhaus SBL lookup:

*  0.1 URIBL_SBL_A Contains URL's A record listed in the
Spamhaus SBL

I'm not seeing this at present.


I guess it's because you are running 3.4.3+. On previous versions it 
would hit because, as stated in 25_uribl.cf:


(URIBL_SBL_A) # Only works correctly from 3.4.3, earlier versions 
basically run as URIBL_SBL duplicate


I can also confirm that, as you properly pointed out, 195.78.94.20 is 
listed and that triggers URIBl_SBL.


Jonathan has been given instructions on how to request a removal and 
this issue will be likely to be solved as soon as the removal request 
comes in.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: URIBL_SBL_A - Spamhaus false positive..

2020-01-23 Thread Riccardo Alfieri

Hello Jonathan,

if you would care to forward me offlist a complete sample that triggers 
the FPs I'll be happy to investigate


On 23/01/20 14:51, Jonathan Gilpin wrote:
Our local resolver is 195.78.94.4 and this was verified by another 
Spamasassin user who has their own resolver on another network.
It has been like this for at least 4 days that I know of and yes it is 
still happening.


This seems to be the case for all spam-assassin users, that is, I 
haven’t found anyone using spamassassin that is not getting the same 
result


Jonathan



--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: v3.4.3 RBL lookups on the domain in Reply-to

2019-12-12 Thread Riccardo Alfieri

On 12/12/19 18:44, John Schmerold wrote:

On the Postfix listserv, KAM informed the Postfix community that 3.4.3 
has the ability to do RBL lookups on the domain in Reply-to address.


How do we take advantage of this new capability?

If I interpret the documentation correctly (still didn't try the new 
release), you could something like:


header SH_HEADERS_DBL_SPAM    eval:check_rbl_headers('dbl', 
'dbl.spamhaus.org.', '127.0.1.2')

tflags SH_HEADERS_DBL_SPAM domains_only
score SH_HEADERS_DBL_SPAM   XXX

To check all the domains found in the default headers 
(EnvelopeFrom,Reply-To,Disposition-Notification-To,X-WebmailclientIP,X-Source-IP) 
in the DBL looking for spam domains. I'd also suggest to add Message-ID 
to the list of default headers, so a line like:


rbl_headers 
EnvelopeFrom,Reply-To,Disposition-Notification-To,X-WebmailclientIP,X-Source-IP,Message-ID


should be added somewhere in the local.cf file.

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Spamassassin reporting

2019-12-04 Thread Riccardo Alfieri

On 04/12/19 17:22, Dave Goodrich wrote:


Can anyone recommend a ready to run OSS script, or set of scripts, for basic 
maillog stats concerning Spam? Just thought I would ask before I wrote 
something. Internet searching is not turning up anything for me.


Did you take a look at 
https://cwiki.apache.org/confluence/display/SPAMASSASSIN/StatsAndAnalyzers ?


IIRC, years ago I used the SARE sa-stats.pl on a Zimbra installation, as 
it processes amavis logs out of the box (assuming Zimbra still uses amavis)


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: What Rules Am I Missing

2019-11-21 Thread Riccardo Alfieri

On 21/11/19 22:02, Benny Pedersen wrote:



thats why is say not using spamassassin, spamassassin add headers that 
begin with X-Spam


I think he is calling spamc, that connects to spamd, that by default in 
many distributions starts with "--local" (never understood why)


Headers are probably added by a wrapper or something like that.

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: What Rules Am I Missing

2019-11-21 Thread Riccardo Alfieri

On 21/11/19 19:02, Jerry Malcolm wrote:



X-SpamAssassin_109: Content preview:  Just to Say 
Hellohttp://www.eyestrongpro.icu/l/lt172P21166EE1247K/1884YQ6160P10097IT163UE64992145HF620698297
X-SpamAssassin_110:Unsubscribe Here [...]


It looks to me that you are not using network checks. eyestrongpro[.]icu 
has been listed in DBL for a lot of time now and your installation 
should have hit on it.


Check here for hints: 
https://cwiki.apache.org/confluence/display/spamassassin/UsingNetworkTests


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: new emotet campain

2019-09-18 Thread Riccardo Alfieri

On 18/09/19 21:05, Amir Caspi wrote:



Since the return code for the domain is specifically regarding 
malware, shouldn't the score be higher?  I would imagine the purpose 
of the unique Spamhaus return codes is to enable such granularity in 
scoring on the user end...



I can't speak about SA scoring politics because we are not directly 
involved in the project. What I can say is that we flag legitimate 
domains that are abused to distribute malware. In example:


http://drapart[dot]org/Prensa/k0viv68-5v5-2137/

The website itself is legit, but that particular path is hosting Emotet. 
As of now SA checks only the drapart[dot]org domain against DBL (and 
others) and gives you back a score according to masschecks. You can't 
outright say that *every* drapart[dot]org urls are malicious, because 
most of them really aren't.


So, as of now, if you don't care so much about FPs, just shortcircuit 
DBL responses to spam. There are some new functions in SA 3.4.3 that 
could help with better sniping, but that's something that has still to come.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: new emotet campain

2019-09-18 Thread Riccardo Alfieri

On 17/09/19 20:54, Amir Caspi wrote:

Based on https://feodotracker.abuse.ch/mitigate/, it looks like both 
Spamhaus DBL and SURBL are fed by URLhaus.  Spamhaus returns 
127.0.1.105 for URLs fed from URLhaus.  Doesn't SA already handle 
this, then, for URLs it processes, since it uses the DBL?


I know Riccardo sent an email about a new plugin for SA, but I don't 
know if it's yet implemented in release... but maybe that's not 
required since the DBL doesn't require DQS.


You are correct, URLhaus domains enter DBL as abused legit malware, but 
the default SA score is not enough to mark the email as spam (and that's 
correct as it checks only the domain).


The recommended way would be to use Clamav signatures, or, if you really 
can't, create uri rules based on https://urlhaus.abuse.ch/downloads/csv/


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: new emotet campain

2019-09-17 Thread Riccardo Alfieri

On 17/09/19 11:59, Blason R wrote:


If possible please share it here?

On Tue, Sep 17, 2019 at 3:20 PM hg user <mailto:mercurialu...@gmail.com>> wrote:


A new emotet campain is in progress
(https://twitter.com/Cryptolaemus1) and I created a rule... I
don't know if is it possible to share (via pastebin) the rule I
created to have feedback from the experts...


Hi,

not really SpamAssassin related, but for anyone concerned about Emotet, 
I suggest using URLhaus Clamav signatures: 
https://urlhaus.abuse.ch/api/#clamav


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Score in subject differs from score in headers

2019-09-06 Thread Riccardo Alfieri

On 06/09/19 19:36, Bill Cole wrote:



Since pretty much forever, IF it is told to do so...

See the documentation of 'rewrite_header' in 'perldoc 
Mail::SpamAssassin::Conf'



Thanks for pointing that out, I never realized template tags could be 
used on the subject rewriting too.


I guess my fault was/is using SA with amavisd, that redefines subject 
rewriting in it's own way (maybe it could add scores in subject too out 
of the box? Don't know, better RTFM ;) )


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Score in subject differs from score in headers

2019-09-06 Thread Riccardo Alfieri

On 06/09/19 17:45, David Galloway wrote:


For example, I'm looking at an e-mail now with "* SPAM 5.4 *" in
the subject but "X-Spam-Status: No, score=3.2 required=5.0"


Hi,

since when does SpamAssassin also writes the scores in the subject? It's 
a cool feature that I probably missed completely :)


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Spamhaus Technology contributions to SpamAssassin

2019-07-04 Thread Riccardo Alfieri

On 04/07/19 09:16, @lbutlr wrote:


On 3 Jul 2019, at 05:08, Stephan Seitz  
wrote:

By the way is this plugin necessary if you are using postfix/postscreen with 
your DQS key?

That was my question as well.


If you use Spamassassin I am surely suggesting to use it, even if you 
use ZEN to do rejections at smtp level with your MTA.


The rest of the checks will take care of what ZEN missed (well, most of 
them at least :) )


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Spamhaus Technology contributions to SpamAssassin

2019-07-03 Thread Riccardo Alfieri

On 03/07/19 20:02, David Gibbs wrote:

I downloaded the version that was on the install page.  It has a date 
tag of 20190621.


https://docs.spamhaustech.com/40-real-world-usage/SpamAssassin/020-SpamAssassin.html 



I'll update to the github version.

Yes please take the github version as the latest one, we are in the 
process of updating the docs.spamhaustech.com website but it is taking 
some time :)


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Spamhaus Technology contributions to SpamAssassin

2019-07-03 Thread Riccardo Alfieri

On 03/07/19 18:01, Larry Rosenman wrote:



I'm seeing the following:

...
<20>1 2019-07-03T10:59:51.00-05:00 thebighonker.lerctr.org spamd 
80260 - - Use of uninitialized value $_ in pattern match (m//) at 
/usr/local/etc/mail/spamassassin/SH.pm line 139.


Is this a bug in my setup or a bug in the plugin?


FYI, this has been solved offlist with Larry's help.

If you use Exim you should download the latest plugin version

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Spamhaus Technology contributions to SpamAssassin

2019-07-03 Thread Riccardo Alfieri

On 03/07/19 17:59, atat wrote:


You say in documentation:

 You should also drop, by default, all Office documents with macros.

What plugin / method do You reccomend for that ?


I'm no expert in detecting macros, but there at least two ways of doing 
that that comes to mind:


- Clamav with the option OLE2BlockMacros

- This package https://github.com/bigio/spamassassin-vba-macro

Or you could patch something up with python oletools

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Spamhaus Technology contributions to SpamAssassin

2019-07-03 Thread Riccardo Alfieri

On 03/07/19 18:05, Chris Conn wrote:


Hello,

I am having a quick look over the config as am intrigued by this 
plugin; what is the motivation to change the RCVD_IN_XXX dnsbl lookups 
to utilize the per-user key system?  Is this a pre-cursor to an 
eventual phase-out of the typical 20_dnsbl_tests.conf mecanisms?



Hi,

public mirrors will stay there for a*long* time, don't worry :)

The whole point of using DQS instead of them is how fast DQS is updated 
compared to the mirrors. Mirrors can take up to a minute to have fresh 
data pushed to, and, while 60 seconds could seem like an acceptable 
time, it is *not* when dealing with hailstormers. DQS is updated in 
nearly true real time and starts serving listings as soon as we start 
detecting new sources.


You can theoretically use the plugin with public mirror's data, but the 
detection rate will not be comparable to DQS. Also public mirrors don't 
have ZRD and AuthBL.


Think of DQS like an upgrade from the public mirrors that only cost the 
time to register :)


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Spamhaus Technology contributions to SpamAssassin

2019-07-03 Thread Riccardo Alfieri

On 03/07/19 17:10, David Gibbs wrote:


On 7/3/19 7:54 AM, Riccardo Alfieri wrote:
apparently I missed to write on the documentation that you need also 
Perl's List::MoreUtils installed.


And 'Data::Validate::Domain'.

david


That was for an older version of the plugin, it's now not needed anymore.

Get the code from the github repository to have the latest version.

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Spamhaus Technology contributions to SpamAssassin

2019-07-03 Thread Riccardo Alfieri

On 03/07/19 16:53, @lbutlr wrote:


On 3 Jul 2019, at 06:54, Riccardo Alfieri  wrote:

If you have a debian based distriution, do an

# apt-get install liblist-moreutils-perl

or, if you use something RPM based, the correct command should be

# yum install perl-List-MoreUtils

portmaster lang/p5-List-MoreUtils

or

pkg install p5-List-MoreUtils


Thanks, this is for FreeBSD right?

If that's the case I'll update the documentation

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Spamhaus Technology contributions to SpamAssassin

2019-07-03 Thread Riccardo Alfieri

Hi,

apparently I missed to write on the documentation that you need also 
Perl's List::MoreUtils installed.


If you have a debian based distriution, do an

# apt-get install liblist-moreutils-perl

or, if you use something RPM based, the correct command should be

# yum install perl-List-MoreUtils


On 03/07/19 14:47, AJ Weber wrote:

Trying to follow the instructions, I got the following error:

spamassassin --lint
Jul  3 08:29:08.089 [26120] warn: plugin: failed to parse plugin 
/etc/mail/spamassassin/SH.pm: Can't locate List/MoreUtils.pm in @INC 
(@INC contains: lib /usr/share/perl5/vendor_perl 
/usr/local/lib64/perl5 /usr/local/share/perl5 
/usr/lib64/perl5/vendor_perl /usr/lib64/perl5 /usr/share/perl5) at 
/etc/mail/spamassassin/SH.pm line 32.
Jul  3 08:29:08.089 [26120] warn: BEGIN failed--compilation aborted at 
/etc/mail/spamassassin/SH.pm line 32.


Are there more pre-requisites that I'm not aware of?

Thanks,

AJ


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: Spamhaus Technology contributions to SpamAssassin

2019-07-03 Thread Riccardo Alfieri

Thanks for pointing that out.

I warned the webmaster, in the meantime a temporary fix is to go back 
with the browser "back" arrow and submit the registration again


On 03/07/19 13:23, Noel Butler wrote:


We would sign up if we could, but after clicking continue of 
name/email page it goes to a blank WP page.



--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Spamhaus Technology contributions to SpamAssassin

2019-07-03 Thread Riccardo Alfieri

Hello everyone,

I'm sure that many of you are aware that our datasets are already in use 
with SpamAssassin's default config, but I wanted to reach out and let 
you know that we have developed a SpamAssassin plugin that helps you get 
more out of our DNSBLs.


The plugin works with our Data Query Service (DQS). The DQS provides you 
with additional feeds: Zero Reputation Domain & AuthBL, and it also 
receives updates in 'realtime.' This last point is key, because, as you 
can see in the latest Virus Bulletin report 
(https://www.virusbulletin.com/testing/results/latest/vbspam-email-security), 
DQS catches 42% more spam than our RSYNC service or public mirrors.


Last but not least, the usage terms for the DQS are the same as for our 
public mirrors, meaning that if you already use our public mirrors, you 
can register for a personal DQS key free of charge.


You can find all the needed files here: 
https://github.com/spamhaus/spamassassin-dqs


Have fun with our data, and if there are difficulties in installing the 
plugin, or if you have suggestions, you can drop us a line at 
datafeed-supp...@spamteq.com or post here. I'll try to keep the list 
monitored to deliver as much help as I can.


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: check_rbl digging too deep

2019-06-25 Thread Riccardo Alfieri

On 25/06/19 17:42, Matus UHLAR - fantomas wrote:


On 25.06.19 07:52, John Hardin wrote:
I'll let others address SA issues with this, I just want to point out 
an alternative:


Many sites consider Zen reliable enough for it to be used at the SMTP 
level as a poison-pill DNSBL.


That would avoid any chance of it being used "too deeply"...


no.  Many people consider Zen reliable enough to reject connections from
listed IP.  Deep header scanning is something very different.

ZEN is safe enough to reject at SMTP level if you can do it on your MTA 
(avoiding unnecessary CPU usage by SA)


It's also useful for deep header scanning, just remember to avoid PBL 
return codes when you do that :)


AuthBL also proved to be useful and doesn't create FPs even if you 
weight it 80% of your required_score


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: check_rbl digging too deep

2019-06-25 Thread Riccardo Alfieri

On 25/06/19 14:42, Benny Pedersen wrote:



https://docs.spamhaustech.com/10-data-type-documentation/datasets/040-zones.html 



add 9 to sbl test ? 


I'd add a rule like

RCVD_IN_SBL_DROP   eval:check_rbl_sub('zen', '127.0.0.9')

With a score of at least 4



possible aswell new test for authbl ?


Well AuthBL (and ZRD) are zones available to people that register with 
our Data Query Service. We are just in talks with the Apache Foundation 
to have our plugin that uses our new datasets added to Spamassassin.


If you are curious about DQS, it's a service that anyone can subscribe 
to with a "free for most" license [1], and for which we developed a 
Spamassassin plugin under Apache license that you can freely download 
from 
https://docs.spamhaustech.com/40-real-world-usage/SpamAssassin/000-intro.html


We have just been featured on Virus Bulletin [2], where they tested the 
differences between DQS and Rsync (that are basically our public 
mirrors). The difference in catch rate is quite substantial.


If anyone want to test the plugin I'll do my best to give support either 
on list (that may benefit others) or our support team is available 
offlist at datafeed-supp...@spamteq.com


[1] https://www.spamhaustech.com/data-access/
[2] 
https://www.virusbulletin.com/testing/results/latest/vbspam-email-security


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: check_rbl digging too deep

2019-06-25 Thread Riccardo Alfieri
Sorry guys, I don't know what happened, my client sent a lot of emails 
during drafting :(


Apologies

--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: check_rbl digging too deep

2019-06-25 Thread Riccardo Alfieri

Hi,

On 25/06/19 11:00, Matus UHLAR - fantomas wrote:



header RCVD_IN_XBL  eval:check_rbl('zen-lastexternal', 
'zen.spamhaus.org.', '^127\.0\.0\.[45678]$')


I take this opportunity to point out that the correct rule for XBL 
should be:


header RCVD_IN_XBL eval:check_rbl('zen-lastexternal', 
'zen.spamhaus.org.', '^127\.0\.0\.[4567]$')


The return code 127.0.0.8 has been dropped a long time ago.

More infos on 
https://docs.spamhaustech.com/10-data-type-documentation/datasets/030-datasets.html#xbl


--
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/



Re: check_rbl digging too deep

2019-06-25 Thread Riccardo Alfieri

Hi

On 25/06/19 00:15, John Schmerold wrote:
We had an inbound message get rejected because it was sent from a cell 
phone, shouldn't SA be checking the most recent hop? Is there a way to 
make this the default?


I have this in local.cf:
header    RCVD_IN_rbl2spamhausz   eval:check_rbl('spamhausz', 
'zen.spamhaus.org.')

score RCVD_IN_rbl2spamhausz   3.5

Please do *not* use ZEN in all the received chain without checking 
return codes 
(https://docs.spamhaustech.com/10-data-type-documentation/datasets/040-zones.html)


ZEN includes PBL, that is a list mantained by ISP all over the world, 
and it is perfectly legit to find the first public IP in the received 
chain to be listed in PBL. You should only reject mail from ZEN if you 
use the -lastexternal flag


--
Best regards,
Riccardo Alfieri

Spamhaus Technologies
https://www.spamhaustech.com/