Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Steve Thomas
Once again, Perkel clutters the SpamAssassin list with a non-SpamAssassin
discussion. One which, IIRC, he's just rehashing from a year or so ago
(are we going to see a rehash of the the future of email storage is sql
thread, too?). There are FAR more appropriate forums for these non-SA
related things.

Is anyone else getting tired of this? Forty eight messages on the SA list
today that have nothing to do with SA. What's the point of having a
topical mailing list if nobody cares that the discussion is off-topic?

St-


 As spam keeps increasing in volume and complexity we will eventually
 lose the war on spam if we don't change the standards. I'd like to open
 a discussion about what needs to be done and how to go about doing that.
 So I'll start.

 Any changes to the standard needs to be evolutionary. If we add a new
 feature to the standard that is so compelling that people give up the
 old standard and it is phased out.

 First - I see bot nets as the biggest culprit. Not just as spammers but
 as sources for DDOS attacks. In the early days of email only the
 sharpest people had access to it. Now that consumers are using it they
 need some protection and we need protection from them. How do we isolate
 end users so that they can't get viruses as easily and spread them as
 easily?

 By default all consumers should be behind a NAT to protect them from the
 outside world. Like many of you. I'm someone who works from home and
 provides so service from home. So I would not want to be prohibited from
 running an email server from home. But if I had to got to a web panel
 that my ISP provided to open up ports that would be fine with me.

 All outgoing email from consumers should by default be required to use
 authenticated SMTP or some new authenticated protocol. At least force
 consumers to use the submission port and block off port 25 for outgoing
 SMTP by default. If consumers were forced by default to send mail on a
 different port then servers could determine if they were talking to a
 consumer or if they were talking to another server. And outgoing email
 would require a password to send, So the virus wouldn't know the
 password and the virus wouldn't be able to send email. You could also
 have the operating system register apps that are allowed to send email
 and block all apps that aren't specifically allowed.

 The idea here is that if you can reduce the mechanisms that allow
 viruses to spread then there comes a point where viruses go away. All we
 have to do is get the spreading down to that threshold.

 I believe that if we do it right that the bot army threat can be beaten.
 And if we got to that point the rest would be manageable.

 We can talk about other things but I'll stop here to focus on the bot
 army.











Re: Block wrote: spams

2006-11-08 Thread Steve Thomas
I've added three procmail rules in the last few days to combat the deluge
of these (and other) spams. I figure that these are all passing fads and
aren't worth writing SA rules. YMMV, of course, but in my case, the
procmail method works best.


:0
* ^subject:.*your concert tickets reservation
.spam.learn/

:0
* ^subject:.* here :\)
.spam.learn/

:0
* ^subject:.* wrote:$
.spam.learn/


I normally don't tweak my .procmailrc for a specific type of spam, but the
sheer volume of these three types of spams made it worth it. I've cut the
volume of spam that makes it to my inbox and spam folder in half - the
rest goes directly into the 'learn' directory, where a cron job runs once
an hour to add them to bayes.




Re: Fishing

2006-09-13 Thread Steve Thomas
 .com will, of course, be a challenge.

/htt[p|ps]:\/\/.*?\/.*\.com$/i





Re: Fishing

2006-09-13 Thread Steve Thomas
 .com will, of course, be a challenge.

 /htt[p|ps]:\/\/.*?\/.*\.com$/i

Correction! That should be:

/htt(p|ps):\/\/.*?\/.*\.com$/i

and slightly more efficient (doesn't capture backreference):

/htt(?:p|ps):\/\/.*?\/.*\.com$/i





Re: Fishing

2006-09-13 Thread Steve Thomas
 Steve Thomas wrote:

/htt(?:p|ps):\/\/.*?\/.*\.com$/i


 Why not /https?:\/\/.*?\/.*\.com$/i

Because I always forget that the question mark can be used that way, and
if I can't seem to remember it, nobody else gets to use it! That's why. :)

Nice catch.

Steve atrophying perl skills Thomas




Re: catching fake usernames?

2006-09-01 Thread Steve Thomas
 On Thu, August 31, 2006 05:41, Rick Roe wrote:
 like there should be a simpler, more automatic way to do this. Am I
 missing something?

 in postfix main.cf

 smtpd_reject_unlisted_sender = yes

In exim.conf, somewhere in acl_check_rcpt:

  require verify = sender





Re: Hacked E-Trade Phishing Site

2006-08-30 Thread Steve Thomas
 Check at the top of this E-trade Phishing site:

 http://196.1.161.115/e/t/user/login/

That's brilliant. Looks like there's a creative grey-hat out there somewhere.

Also interesting - the login form itself is a flash app. I haven't seen
that before (but I don't check many of them out, either...).

St-




Re: What changes would you make to stop spam? - United Nations Paper

2006-08-03 Thread Steve Thomas
 Why use 2
 protocols when you can use one?

Oh I don't know. Maybe because the infrastructure for it is already in
place in the form of hundreds of thousands of existing mail servers that
already require authentication if the message being transmitted isn't
destined for a local user?

 There would have to be a POP SEND as well.

I see. So you're advocating the complete rewrite of two of the most widely
used protocols on the Internet, plus the addition of your solution to
the hundreds or thousands of perfectly good MUAs out there, and for what?
So end users don't have to click three or four times in their client while
setting up a new account?

You're just not getting it. Your idea is bad. Not just bad, but really,
really bad. Actually, it's worse than that. It's incredibly stupid. You
haven't provided one single advantage to be gained by implementing it,
other than end users not having to turn on SMTP AUTH. You're talking about
a complete overhaul of the global mail system with no discernable
advantage to be gained. Even if the UN (who shouldn't even be bothered
with something like this) were to praise your suggestion and recommend its
use, you wouldn't get anybody to implement it. It's a horrible, useless
idea.

Kudos for trying to come up with something revolutionary to address the
spam problem, but you failed miserably. Toss this one in the shredder and
try again. We'd all like to see a real solution to the problem, and if you
can come up with it, fantastic. This isn't it, though.

St-




Re: Allowing IMAP/POP to Send Email

2006-08-03 Thread Steve Thomas
 Spam is never eliminated - just reduced. Most spam comes from virus
 infected zombies that talk SMTP. If end users were by default set up so
 that they can only send email by IMAP then you can block off SMTP ports
 for end users isolating them from the SMTP world. That would take a huge
 bite out of the spam problem.

Which is something that many ISPs and corporations already do. What makes
you think that any more of them will do it if your plan were to be
implemented?

Responsible networks are already blocking port 25, while irresponsible
networks (generalizing to make a point) aren't. What's going to happen to
make the irresponsible networks change their ways? Why hasn't it happened
already? What kind of incentive does your plan specifically provide to
help change those network owners' minds?




Re:

2006-07-18 Thread Steve Thomas
 unsubscribe
 end

list-unsubscribe: mailto:[EMAIL PROTECTED]





Re: question about SpamAssassin

2006-07-14 Thread Steve Thomas
 We use a MTA package called Extremail (http://www.extremail.com) and I was
 wondering if SpamAssasin is compatible with it.

Did you check their forums at http://extremail.monsterserver.de/main.php ?
They have a forum dedicated to integrating anti-spam products with their
server, although it requires a login before you can view any posts, so I
don't know if SA is discussed in there.

HTH,
St-




Re: using spamdc/spamd getting better results?

2006-07-14 Thread Steve Thomas
Hi Yossi,

 My mail relay is built on sendmail and MailScanner configured
 wit SA 3.1.1.
 ...
 How do i start spamc?

IIRC, MailScanner loads the SpamAssassin perl modules directly - it
doesn't use spamc/d, nor does it use the spamassassin script.

HTH,
St-




RE: outlook email is beeing flag as spam...

2006-06-26 Thread Steve Thomas
 -1.8 ALL_TRUSTEDPassed through trusted hosts only via SMTP
 -0.2 BAYES_40   BODY: Bayesian spam probability is 20 to 40%
 [score: 0.3371]
  0.1 HTML_90_100BODY: Message is 90% to 100% HTML
  1.8 HTML_IMAGE_ONLY_24 BODY: HTML: images with 2000-2400 bytes of
 words
  1.0 HTML_MESSAGE   BODY: HTML included in message
  1.7 MSGID_DOLLARS  Message-Id has pattern used in spam
  1.9 RATWARE_MS_HASHBulk email fingerprint (msgid ms hash) found
  2.8 RATWARE_OUTLOOK_NONAME Bulk email fingerprint (Outlook no name)
 found

FWIW, I just sent myself a test message using Outlook and these are the
only rules that fired:

  -1.8 ALL_TRUSTED
  -2.6 BAYES_00
  -0.0 AWL

I'm using Outlook 2003 (11.8010.6568) SP2 and SA 3.1.0.




Re: The Future of Email is SQL

2006-06-14 Thread Steve Thomas
 So - like I said - this is visionary stuff. Think SQL - think outside
 the box.

It's not all that visionary. Microsoft's been working on WinFS - a SQL
based system for storing files - for years. It's supposed to have been
released as a part of longhorn (vista), but they're pushing it back.

I'm still confused as to why this is even being discussed on this list,
though. SA is just a system for identifying and labeling certain types of
messages. It has nothing whatsoever to do with where or how those messages
are stored.

St-




Re: The Future of Email is SQL

2006-06-09 Thread Steve Thomas
While this is quite an interesting topic, I have to ask why it's on the
spamassassin list. Message stores aren't spamassassin specific and this is
already a pretty high-volume list. Does this discussion really belong
here?

St-




Re: is there a way to block email coming from

2006-06-07 Thread Steve Thomas
 country, other than USA?  How would you look up the network block on
 country
 such as Romania, China, Taiwan,Thailand, Korea, and so on...

 Thanks.

Check out http://countries.nerd.dk/ and http://www.blackholes.us/





Re: 3.1.2?

2006-04-27 Thread Steve Thomas
 On Wed, Apr 26, 2006 at 05:32:45PM -0400, Joe Flowers wrote:
 Any educated guesses on when 3.1.2 will be released?

 I was hoping to get it out this month, but I think it'll probably be next
 early month before it's all ready to go.

Any word on whether or not it includes a fix for bug #4590?
http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4590

Thanks for your efforts - you guys rock.

St-




RE: apache httpd + spam assassin = web without spam?

2006-04-10 Thread Steve Thomas
 I was having this problem for a while... then I added a confirmation block
 to my guestbook - so that any post had to be confirmed.

 Boom - spam stopped (I've never even gotten confirmation notices that they
 tried again).

I did basically the same thing. I hacked PHPBB a little to throw an error
if a certain non-standard form field didn't have a specific value, and my
forum spam has stopped completely. Their bots are still creating accounts,
but they can't post, so there's no real damage done.

St-




Re: This isn't being tagged

2006-03-17 Thread Steve Thomas
These things are being properly detected for me. Here's the headers from
one I received this morning:

--
Return-path: [EMAIL PROTECTED]
X-Spam-Flag: YES
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on titan.sthomas.net
X-Spam-Level: ***
X-Spam-Status: Yes, score=7.5 required=5.0 tests=BAYES_99,HTML_90_100,
 HTML_MESSAGE,RCVD_IN_XBL,UNPARSEABLE_RELAY autolearn=no version=3.1.0
X-Spam-Report:
 * 0.0 UNPARSEABLE_RELAY Informational: message has unparseable relay
 * lines
 * 0.1 HTML_90_100 BODY: Message is 90% to 100% HTML
 * 0.0 HTML_MESSAGE BODY: HTML included in message
 * 3.5 BAYES_99 BODY: Bayesian spam probability is 99 to 100%
 * [score: 1.]
 * 3.9 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL
 * [87.97.49.1 listed in sbl-xbl.spamhaus.org]
Envelope-to: [me]
Delivery-date: Fri, 17 Mar 2006 07:33:49 -0800
Received: from mail by titan.sthomas.net with spam-scanned (Exim 4.30)
 id 1FKGxY-0006Ao-CW
 for [me]; Fri, 17 Mar 2006 07:33:49 -0800
Received: from [87.97.49.1] (helo=aias.gr)
 by titan.sthomas.net with smtp (Exim 4.30)
 id 1FKGxX-0006Ai-O6
 for [me]; Fri, 17 Mar 2006 07:33:48 -0800
Message-ID: [EMAIL PROTECTED]
Reply-To: Darius Clack [EMAIL PROTECTED]
From: Darius Clack [EMAIL PROTECTED]
To: [me]
Subject: Re: PhU8aramacy news
Date: Fri, 17 Mar 2006 10:32:50 -0500
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary==_NextPart_000_0001_01C649AE.24185770
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106




Re: encoded spam that got thru

2006-03-13 Thread Steve Thomas
 Without being able to decode that block of stuff myself and thus see what
 it says

It's a stock spam for some oil company.

Decoding anything base64 encoded is pretty easy if you have perl installed
somewhere:

cut
#!/usr/bin/perl

use MIME::Base64;
print decode_base64(put the encoded data here);
cut




Re: SA-LEARN HANGING when database over 2000 SPAM messages

2006-03-01 Thread Steve Thomas
 I think it was Steve that said his database is in SQL format. How do I
 convert the spamassassin database on FreeBSD 5.4 to SQL?

I used the procedure found on this page as a guide:
http://www200.pair.com/mecham/spam/fc4-spamassassin-sql.html





Re: SA-LEARN HANGING when database over 2000 SPAM messages

2006-02-28 Thread Steve Thomas
 -rw---  1 root  wheel  549775048704 Feb 28 10:47 bayes_toks

I'll leave it to the experts to help you out here, but I would assume that
a token db that's apparently half a terrabyte in size is a *slight*
indication of a problem somewhere... ;)





Re: SA-LEARN HANGING when database over 2000 SPAM messages

2006-02-27 Thread Steve Thomas
 The first time I encountered this problem is when the spam database has
 around 3000 SPAM and about 1 HAM, the database seems to become
 corrupt. I start to receive PERL errors.
 ...
 Is there a problem with the database when it
 reaches a certain size?

I can't offer much assistance with your problem, but on the db size, I can
say that we were running it with around 25k spams and 25k hams learned,
with sa-learn running on shared imap folders every hour adding more.

This was with SA 2.70-cvs. We just upgraded to 3.1.0 and converted the
bayes and whitelist databases to MySQL. Spamd and MySQL now run on a
dedicated server which is accessed by spamc on our smtp/incoming MX and
sa-learn on our pop/imap server. Our setup is a little complex, but it
works very well.

St-




spamd mysql redux

2006-02-22 Thread Steve Thomas
Howdy list,

I'm having the exact same problem that Glenn is/was having as posted about
last week. (see
http://article.gmane.org/gmane.mail.spam.spamassassin.general/77708)

I'm using Fedora Core 4, perl 5.8.6, SA 3.1.0 and mysql 4.1. SA was
installed by building an RPM directly from the tarball. It's a fresh
install of everything on a brand new box.

The sql username/password/database/port/etc is all fine. If I start spamd
from the command line (spamd -q) it works fine. If I start it daemonized
(spamd -q -d from the command line or service spamd start [with
appropriate options in init script]), it won't talk to the database. The
errors it produces (when run with -D) are:

Feb 22 11:45:42 ronin spamd[3322]: bayes: using username: root
Feb 22 11:45:42 ronin spamd[3322]: bayes: unable to connect to database:
Can't connect to local MySQL server through socket
'/var/lib/mysql/mysql.sock' (13)
Feb 22 11:45:42 ronin spamd[3322]: config: score set 1 chosen.
Feb 22 11:45:42 ronin spamd[3322]: config: failed to load user (root)
scores from SQL database: config: SQL error: Can't connect to local MySQL
server through socket '/var/lib/mysql/mysql.sock' (13)
Feb 22 11:45:42 ronin spamd[3322]: spamd: service unavailable: Error
fetching user preferences via SQL at /usr/bin/spamd line 1682.

I have it set up to use the db for bayes and user prefs. When it isn't
running daemonized, I get the expected less than 200 spams learned and
no user prefs found type of messages, indicating that the connection is
being made and queries are being run successfully.

This seems to be an issue with the daemonization of spamd, perhaps only on
FC4. I've contacted Glen and he was nice enough to reply in a very timely
manner, but he also hasn't found a solution. I've been pounding on this
for a couple of days now and all I've got for my troubles is less hair
(that's what happens when you pull it out!).

I'm at my wit's end, and have to get this up and integrated this week.
It's replacing an OLD SA installation (2.70-cvs) that's eating up all the
resources on the server it's running on, which handles some other
business-critical processes.

If anyone has a suggestion beyond what's already been posted in the
earlier thread, I'm all ears...

Thanks,
St-




Re: spamd mysql redux

2006-02-22 Thread Steve Thomas
 Feb 22 11:45:42 ronin spamd[3322]: bayes: unable to connect to database:
 Can't connect to local MySQL server through socket
 '/var/lib/mysql/mysql.sock' (13)

 Is that where mysql.sock is located? I don't know where the MySQL RPMs
 might
 stick it, but source installs stick it at /tmp/mysql.sock by default.

Yep, that's where it's at. I've also tried specifying the port in the dsn
options in the cf file, i.e.
user_scores_dsn DBI:mysql:spamassassin:localhost:3306

I'm most curious about the error number given - (13). In mysql speak,
that's a 'permission denied', but according to the logs, there's no
connection attempt even being made. I don't know if that number is coming
from spamd, the perl db api or mysql. I doubt it's coming from mysql,
since I'm not seeing any connection attempt whatsoever.

Thanks,
St-





Re: spamd mysql redux

2006-02-22 Thread Steve Thomas
 i googled a bit and found this related to fedora3 and SELinux:
 http://forums.mysql.com/read.php?11,20759,21482#msg-21482

I had seen that page, but didn't know what selinux was (thought it was a
distro!) so I thought it was irrelevant. After checking it out, it turns
out that that's what the problem is/was! I disabled selinux and the first
test after rebooting seems to have worked.

I don't believe I need selinux for anything, as our environment's pretty
well controlled and we've made do without it for.. well forever, but I'll
probably have to learn about it eventually so I suppose I'll start looking
into it...

Thanks a million Matthias. I'm kind of embarrassed that I was looking at
the answer yesterday and dismissed it... :\

For Glen and the archives:
I disabled selinux by setting the SELINUX environment variable to
disabled in /etc/selinux/config and rebooting.

Thanks again,
St-




Re: From: '' whitelisted?

2005-12-05 Thread Steve Thomas
 How is it that this (weird, sort-of-null) From: address is whitelisted?
 It's surely not listed in my local.cf or user_prefs.  Any ideas?

From RFC 2821:


   If an SMTP server has accepted the task of relaying the mail and
   later finds that the destination is incorrect or that the mail cannot
   be delivered for some other reason, then it MUST construct an
   undeliverable mail notification message and send it to the
   originator of the undeliverable mail (as indicated by the reverse-
   path).  Formats specified for non-delivery reports by other standards
   (see, for example, [24, 25]) SHOULD be used if possible.

   This notification message must be from the SMTP server at the relay
   host or the host that first determines that delivery cannot be
   accomplished.  Of course, SMTP servers MUST NOT send notification
   messages about problems transporting notification messages.  One way
   to prevent loops in error reporting is to specify a null reverse-path
   in the MAIL command of a notification message.  When such a message
   is transmitted the reverse-path MUST be set to null (see section
   4.5.5 for additional discussion).  A MAIL command with a null
   reverse-path appears as follows:

  MAIL FROM:



Whether or not the null sender should be in the default whitelist is
subjective, but I think most would agree that it's prudent.




Re: From: '' whitelisted?

2005-12-05 Thread Steve Thomas
 1) null sender isn't in the default whitelist

 2) the rule matched isn't due to the default whitelist, as that would show
 up as
 USER_IN_DEF_WHITELIST, instead of USER_IN_WHITELIST.

I guess I need to brush up on my SA rules vocabulary.. :)


 3) The message in question has the null path as it's From: header address,
 this
 is COMPLETELY different from the return path mentioned in RFC 2821.

Yes, it is, and I realized my mistake about the same time as I released
the mouse button from clicking Send. Someone else had asked about the
return-path, and I was waiting on a response to that before correcting
myself, if necessary.




Re: Recurring abuser

2005-12-01 Thread Steve Thomas

 My MailScanner boxes are still getting drilled with the Sober.Virus and
spam (none which have made it through) from a single IP address.  I did
a lookup on dnsstuff.com for the address {66.243.13.178} but made no
headway on what to do about this.  What steps do I need to do in order
to get this to stop?  I haven't seen a degridation in mail processing,
but seeing over 150 Sober infected emails, and countless spam each day
is a bit annoying.

iptables, access.db, cisco acl, hosts.deny, smtp daemon config... choose
your poison..






Re: SpamAssassin as a Relay Server - how can I make it better?

2004-09-21 Thread Steve Thomas
On Tue, Sep 21, 2004 at 11:34:08AM -0700, Ken Versteeg is rumored to have said:
 
 I'm running SpamAssassin-2.55 ...
  
 ...Thanks for any feedback/assistance.

The first thing to do is upgrade to the latest release version, which is 2.64. 
Do that, then see how it goes. There were a LOT of improvements made between 
the 2.5x and 2.6x releases and I'll bet that most of your problems disappear 
if/when you upgrade.


-- 
Steve Thomas -=*=- sthomas.net
Registered Linux User #281447