Re: Image spam and failing rule

2009-05-02 Thread Charles Gregory

On Sun, 26 Apr 2009, Theo Van Dinter wrote:

It's already been mentioned, but mimeheader is the right way to look
at the headers of MIME parts.


Look more closely at my rule. It is checking for TWO headers,
one after the other (separated by \n), identifying a gif with no name.


full /Content-Type: image\/gif;\n[^a-z]+name=/


But yes, I will be keeping 'mimeheader' in mind for tests like
the simple 'DS[LC]' png check. :)

- Charles


Re: Image spam and failing rule

2009-05-02 Thread James Wilkinson
Theo Van Dinter wrote:
 It's already been mentioned, but mimeheader is the right way to look
 at the headers of MIME parts.

Charles Gregory wrote:
 Look more closely at my rule. It is checking for TWO headers,
 one after the other (separated by \n), identifying a gif with no name.

 full /Content-Type: image\/gif;\n[^a-z]+name=/

I think you’ll find that’s one header on two lines, and mimeheader copes
with it.

Hope this helps,

James.

-- 
E-mail: james@ | “As for Nitel, the state telephone monopoly, the less
aprilcottage.co.uk | said the better, which might well be the company’s
   | motto.”
   | -- The Economist, about Nigeria


Re: [sa-list] Re: Image spam and failing rule

2009-04-27 Thread Henrik K
On Sun, Apr 26, 2009 at 04:11:10PM -0400, Dan Mahoney, System Admin wrote:
 On Sat, 25 Apr 2009, John Hardin wrote:

 On Sat, 25 Apr 2009, Gary Forrest wrote:

 We are receiving the same image spam many times, random text within 
 the body.

 FuzzyOCR. It seems Spammers are trying image spam again, after giving 
 up on it for a year or so.

 Is there a version of FuzzyOCR that's actually supported with the current 
 SA release?  Or under active development at all?

As I said on the other post, there were no significant image spam for years.
Why would anyone want to waste time on developing it? Mostly that stuff
comes from botnets anyway, which you can easily block even at MTA.

The author (decoder) read this list, maybe he will reply if he has any
thoughts.. if image spam is coming to another wave, maybe the developement
and mailing list will be refreshed.



Re: Image spam and failing rule

2009-04-27 Thread Andy Spiegl
  While you are at it, you can also scan for
    full /Content-Type: image\/gif;\n[^a-z]+name=/

 It's already been mentioned, but mimeheader is the right way to look
 at the headers of MIME parts.

How about multiline Content-Types?
I tried without success:
 mimeheader NAMELESSGIF_ATTACHMENT Content-Type =~ /image\/gif;\n[^a-z]+name=/

But this seems to work:
 mimeheader NAMELESSGIF_ATTACHMENT Content-Type =~ 
/image\/gif;\s*(\n\s+)?name=/

Whadya think?

Thx,
 Andy.


Re: Image spam and failing rule

2009-04-27 Thread Karsten Bräckelmann
On Mon, 2009-04-27 at 12:16 +0200, Andy Spiegl wrote:
  It's already been mentioned, but mimeheader is the right way to look
  at the headers of MIME parts.
 
 How about multiline Content-Types?

They appear to be wrapped.

$ grep -A 1 image/ dsl.png.msg
Content-Type: image/png;
name=DSL9020.png

$ spamassassin -D
  --cf=mimeheader TEST Content-Type =~ m~image/png; name=~
   dsl.png.msg  21 | grep 'eval rule TEST'
[4719] dbg: rules: ran eval rule TEST == got hit (1)


 I tried without success:
  mimeheader NAMELESSGIF_ATTACHMENT Content-Type =~ 
 /image\/gif;\n[^a-z]+name=/
 
 But this seems to work:
  mimeheader NAMELESSGIF_ATTACHMENT Content-Type =~ 
 /image\/gif;\s*(\n\s+)?name=/
 ^^^
The \s* matches a single space. The optional part does not match
anything. :)


-- 
char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: Image spam and failing rule

2009-04-26 Thread Charles Gregory

On Sat, 25 Apr 2009, Gary Forrest wrote:
We are receiving the same image spam many times, random text within the 
body. The only common thing is a image attachment, with the filename in 
the following format

 DSL1234.png
I have made the following ' RAWBODY ' rule
/dsl[0-9]{4}\.png/i


You need to use a 'full' rule to scan attachment names.
While you are at it, you can also scan for
   full /Content-Type: image\/gif;\n[^a-z]+name=/

As this seems to be the next evolution of the spam. Nameless gifs :)

Enjoy!

- Charles



Re: Image spam and failing rule

2009-04-26 Thread Theo Van Dinter
It's already been mentioned, but mimeheader is the right way to look
at the headers of MIME parts.

The rule of thumb is if you are using 'full' you're probably doing it
wrong. :)


On Sun, Apr 26, 2009 at 11:57 AM, Charles Gregory cgreg...@hwcn.org wrote:
 On Sat, 25 Apr 2009, Gary Forrest wrote:

 We are receiving the same image spam many times, random text within the
 body. The only common thing is a image attachment, with the filename in the
 following format
  DSL1234.png
 I have made the following ' RAWBODY ' rule
 /dsl[0-9]{4}\.png/i

 You need to use a 'full' rule to scan attachment names.
 While you are at it, you can also scan for
   full /Content-Type: image\/gif;\n[^a-z]+name=/

 As this seems to be the next evolution of the spam. Nameless gifs :)

 Enjoy!

 - Charles




Re: [sa-list] Re: Image spam and failing rule

2009-04-26 Thread Dan Mahoney, System Admin

On Sat, 25 Apr 2009, John Hardin wrote:


On Sat, 25 Apr 2009, Gary Forrest wrote:

We are receiving the same image spam many times, random text within the 
body.


FuzzyOCR. It seems Spammers are trying image spam again, after giving up on 
it for a year or so.


Is there a version of FuzzyOCR that's actually supported with the current 
SA release?  Or under active development at all?


-Dan

--

Man, this is such a trip

-Dan Mahoney, October 25, 1997

Dan Mahoney
Techie,  Sysadmin,  WebGeek
Gushi on efnet/undernet IRC
ICQ: 13735144   AIM: LarpGM
Site:  http://www.gushi.org
---



Re: Image spam and failing rule

2009-04-25 Thread James Wilkinson
Gary Forrest wrote:
 Hi All

 We are receiving the same image spam many times, random text within the  
 body.
 The only common thing is a image attachment, with the filename in the  
 following format

   DSL1234.png

 I have made the following ' RAWBODY ' rule

 /dsl[0-9]{4}\.png/i

 This rule works if the text appears in the body, when testing with a  
 hand telnet to port 25, but fails in practice.
 I think this is because the  RAWBODY rule does not search the text of a  
 attachment.

 example text of a spam

 --=_NextPart_000_0075_01C9C5DF.A7950570
 Content-Type: image/png;
name=DSL6672.png
 Content-Transfer-Encoding: base64
 Content-ID: a0ff8910$101f730d$6c822ecf
 Content-Disposition: inline

 Any ideas ?

mimeheader LOCAL_DSL_ATTACHMENT Content-Type =~ /name=dsl[0-9]{4}\.png/i
(Untested.)

Hope this helps,

James.

-- 
E-mail: james@ | top! to bottom from or backwards read not do I, post top
aprilcottage.co.uk | not do Please
   | -- Jeff Vian


Re: Image spam and failing rule

2009-04-25 Thread John Hardin

On Sat, 25 Apr 2009, Gary Forrest wrote:

We are receiving the same image spam many times, random text within the 
body.


FuzzyOCR. It seems Spammers are trying image spam again, after giving up 
on it for a year or so.


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79


Re: Image spam and failing rule

2009-04-25 Thread Igor Chudov
On Sat, Apr 25, 2009 at 02:09:05PM -0700, John Hardin wrote:
 On Sat, 25 Apr 2009, Gary Forrest wrote:

 We are receiving the same image spam many times, random text within the 
 body.

 FuzzyOCR. It seems Spammers are trying image spam again, after giving up  
 on it for a year or so.


Why did spammers give up on it, seems like a good idea?


Re: Image spam and failing rule

2009-04-25 Thread RW
On Sat, 25 Apr 2009 16:10:41 -0500
Igor Chudov i...@chudov.com wrote:

 On Sat, Apr 25, 2009 at 02:09:05PM -0700, John Hardin wrote:
  On Sat, 25 Apr 2009, Gary Forrest wrote:

  FuzzyOCR. It seems Spammers are trying image spam again, after
  giving up on it for a year or so.
 
 
 Why did spammers give up on it, seems like a good idea?

There are probably many reasons, but I suspect that fundamentally it
doesn't make good spam. I think that most spam needs one of two things,
either it should look like a legitimate email, or it should have a
clickable link. 

Before image spams, spammers experimented with fragmented urls, but it
never really caught-on. If people wont reassemble urls with
cut-and-paste, they're even less likely to type them in from
captcha-style text.