Re: Whitelist_from??

2019-03-15 Thread David Jones
On 3/14/19 5:50 PM, @lbutlr wrote:
> I've been having a lot of problems with emails from comixology getting tagged 
> as spam and then the message attachment is often, but not always, corrupt.
> 
> Content analysis details:   (6.8 points, 5.0 required)
> 
> pts rule name  description
>  -- --
> -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/,
>  no trust
> [54.240.13.78 listed in list.dnswl.org]
> 0.2 BAYES_999  BODY: Bayes spam probability is 99.9 to 100%
> [score: 1.]
> 3.5 BAYES_99   BODY: Bayes spam probability is 99 to 100%
> [score: 1.]
> 0.0 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level
> mail domains are different
> 0.8 MPART_ALT_DIFF BODY: HTML and text parts are different
> 0.0 HTML_MESSAGE   BODY: HTML included in message
> 0.4 MIME_HTML_MOSTLY   BODY: Multipart message mostly text/html MIME
> 0.1 DKIM_SIGNEDMessage has a DKIM or DK signature, not necessarily
> valid
> 0.7 MIME_HEADER_CTYPE_ONLY 'Content-Type' found without required
> MIME headers
> 0.1 DKIM_INVALID   DKIM or DK signature exists, but is not valid
> 1.0 BODY_URI_ONLY  Message body is only a URI in one line of text or
> for an image
> 0.0 T_REMOTE_IMAGE Message contains an external image
> 
> The attached message when I open it starts:
> 
> =23outlook A =7B  PADDING-BOTTOM: 0px; PADDING-LEFT: 0px; PADDING-RIGHT: 
> 0px=
> ; PADDING-TOP: 0px =7D
> BODY =7BPADDING-BOTTOM: 0px; MARGIN: 0px; PADDING-LEFT: 0px; WIDTH: 100% =
> =21important; PADDING-RIGHT: 0px; PADDING-TOP: 0px; -webkit-text-size-adjus=
> t: 100%; -ms-text-size-adjust: 100%
> =7D
> =7D =20
> 
> 
> I added whitelist_auth comixology.com to local.cf and still had issues, so I 
> also added whitelist_from comixology.com, but messages are still tagged as 
> spam.
> 
> From: Comics by comiXology 
> 
> But the message are actually coming from amazon.com. I have these references 
> to amazon in local.cf
> 
> adsp_override amazon.com custom_high
> adsp_override amazon.com
> whitelist_auth *@amazon.com
> 
> (not sure about the first two lines, don't recall those settings)
> 
> 
> 

I would recommend using this if they hit SPF_PASS or DKIM_VALID_AU

whitelist_auth *@*.comixology.com

If they don't have good SPF or DKIM like this one, then use:

whitelist_from_rcvd *@*.comixology.com amazonses.com

The "amazonses.com" would be the part of the sending mail server's name 
when it has good FCrDNS.  If that mail server doesn't have good FCrDNS, 
then use:

whitelist_from_rcvd *@*.comixology.com [ip.ad.dr.ess]


whitelist_from should be the last option and I only use it on a full 
email address that is very unique so spammers won't be able to match 
that by accident from any source server or IP address.

-- 
David Jones


Re: Whitelist_from??

2019-03-14 Thread Bill Cole
On 14 Mar 2019, at 22:03, @lbutlr wrote:

> On 14 Mar 2019, at 17:00, RW  wrote:
>>
>> whitelist entries need to be globs that match an email address, not a
>> domain name.
>
> How sophisticated is SA's globbing?
>
> ^(\w+)([\-.'][\w]+)+@domain.tld$

For whitelist entries the match string is a simple glob, not a regex.

"perldoc Mail::SpamAssassin::Conf" will tell you the details.

-- 
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Available For Hire: https://linkedin.com/in/billcole


Re: Whitelist_from??

2019-03-14 Thread @lbutlr
On 14 Mar 2019, at 17:00, RW  wrote:
> 
> whitelist entries need to be globs that match an email address, not a
> domain name.

How sophisticated is SA's globbing?

^(\w+)([\-.'][\w]+)+@domain.tld$

?



-- 
These are the thoughts that kept me out of the really good schools. --
George Carlin




Re: Whitelist_from??

2019-03-14 Thread RW
On Thu, 14 Mar 2019 16:50:01 -0600
@lbutlr wrote:

> I've been having a lot of problems with emails from comixology
> getting tagged as spam and then the message attachment is often, but
> not always, corrupt.
...
> I added whitelist_auth comixology.com to local.cf and still had
> issues, so I also added whitelist_from comixology.com, but messages
> are still tagged as spam.


whitelist entries need to be globs that match an email address, not a
domain name.





RE: whitelist_from in user_prefs is not being processed.

2015-03-13 Thread Rick Hantz (TirNanOg)
That worked, many thanks..
Missing @ makes a difference ;)
-RIckH

-Original Message-
From: RW [mailto:rwmailli...@googlemail.com] 
Sent: Thursday, March 12, 2015 11:44 AM
To: users@spamassassin.apache.org
Subject: Re: whitelist_from in user_prefs is not being processed.

On Thu, 12 Mar 2015 11:23:33 -0700
Rick Hantz \(TirNanOg\) wrote:

  

 However, none of the whitelist seems to get processed. Mail that 
 should have a high negative number doesn't and ends up in the spam 
 folder.
 
 whitelist_from 23andme.com
 ...
 whitelist_from *.aarp.com


try: 
 
whitelist_from *@23andme.com

whitelist_from *@*.aarp.com

etc



Re: whitelist_from in user_prefs is not being processed.

2015-03-12 Thread Axb

On 03/12/2015 07:23 PM, Rick Hantz (TirNanOg) wrote:

whitelist_from alfranken.com


bad syntax

http://spamassassin.apache.org/full/3.4.x/doc/Mail_SpamAssassin_Conf.txt

unwhitelist_from u...@example.com
Used to override a default whitelist_from entry, so for example a
distribution whitelist_from can be overridden in a local.cf 
file, or

an individual user can override a whitelist_from entry in their own
user_prefs file. The specified email address has to match exactly
(although case-insensitively) the address previously used in a
whitelist_from line, which implies that a wildcard only matches
literally the same wildcard (not 'any' address).

e.g.

  unwhitelist_from j...@example.com f...@example.com
  unwhitelist_from *@example.com

whitelist_from_rcvd a...@lists.sourceforge.net sourceforge.net
Works similarly to whitelist_from, except that in addition to
matching a sender address, a relay's rDNS name or its IP address
must match too for the whitelisting rule to fire. The first
parameter is a sender's e-mail address to whitelist, and the second
is a string to match the relay's rDNS, or its IP address. Matching
is case-insensitive.

This second parameter is matched against the TCP-info information
field as provided in a FROM clause of a trace information (i.e. the
Received header field, see RFC 5321). Only the Received header
fields inserted by trusted hosts are considered. This parameter can
either be a full hostname, or the domain component of that 
hostname,

or an IP address in square brackets. The reverse DNS lookup is done
by a MTA, not by SpamAssassin.

In case of an IPv4 address in brackets, it may be truncated on
classful boundaries to cover whole subnets, e.g. [10.1.2.3],
[10.1.2], [10.1], [10]. CIDR notation is currently not
supported, nor is IPv6. The matching on IP address is mainly
provided to cover rare cases where whitelisting of a sending MTA is
desired which does not have a correct reverse DNS configured.

In other words, if the host that connected to your MX had an IP
address 192.0.2.123 that mapped to 'sendinghost.example.org', you
should specify sendinghost.example.org, or example.org, or
[192.0.2.123] or [192.0.2] here.

Note that this requires that internal_networks be correct. For
simple cases, it will be, but for a complex network you may get
better results by setting that parameter.

It also requires that your mail exchangers be configured to perform
DNS reverse lookups on the connecting host's IP address, and to
record the result in the generated Received header field according
to RFC 5321.

e.g.

  whitelist_from_rcvd j...@example.com  example.com
  whitelist_from_rcvd *@axkit.org  sergeant.org
  whitelist_from_rcvd *@axkit.org  [192.0.2.123]



Re: whitelist_from in user_prefs is not being processed.

2015-03-12 Thread RW
On Thu, 12 Mar 2015 11:23:33 -0700
Rick Hantz \(TirNanOg\) wrote:

  

 However, none of the whitelist seems to get processed. Mail that
 should have a high negative number doesn't and ends up in the spam
 folder.
 
 whitelist_from 23andme.com
 ...
 whitelist_from *.aarp.com


try: 
 
whitelist_from *@23andme.com

whitelist_from *@*.aarp.com

etc


Re: whitelist_from in user_prefs is not being processed.

2015-03-12 Thread Reindl Harald



Am 12.03.2015 um 19:23 schrieb Rick Hantz (TirNanOg):

My mail is hosted on Lunarpages.com on my own domain.

I train SpamAssassin frequently.

However, I get hundreds of spam messages daily (500-700). This is an old
public account that I need to maintain, otherwise I’d delete it.

After a while, the tokens files get corrupt, so I delete them and start
over. (I start getting a lot of spam missed).

To filter most everything, I set the spam level at -1.

I maintain a whitelist in user_prefs, so I can easily start over.

However, none of the whitelist seems to get processed. Mail that should
have a high negative number doesn’t and ends up in the spam folder.

Any ideas or workarounds?


without logs - no



signature.asc
Description: OpenPGP digital signature


Re: whitelist_from in user_prefs is not being processed.

2015-03-12 Thread Benny Pedersen
On March 12, 2015 11:10:13 PM Rick Hantz \(TirNanOg\) 
rick...@tirnanog.com wrote:



In my user_prefs file, I have: (see resulting header below)

whitelist_from mailto:*@sailthru.com


read perldoc Mail::SpamAssassin::Conf

note whitelist_from allows forged senders, if possible use whitelist_auth 
instaed


Re: whitelist_from in user_prefs is not being processed.

2015-03-12 Thread Rick Hantz (TirNanOg)
 

In my user_prefs file, I have: (see resulting header below)

whitelist_from mailto:*@sailthru.com

whitelist_from mailto:*@e.washingtonpost.com

 

Do I also need 

whitelist_from mailto:*@*.sailthru.com  ?

 

Appreciate all the help.

 

-RickH

 

 

Return-path: deliv...@mx.sailthru.com

Envelope-to: rickhan!!tirnanog.com

Delivery-date: Thu, 12 Mar 2015 14:21:53 -0700

Received: from mx-washpost-a.sailthru.com ([192.64.237.165]:50811)

   by coeus.lunarmania.com with esmtp (Exim 4.82)

   (envelope-from deliv...@mx.sailthru.com)

   id 1YWAYA-0004uL-M3

   for rickhan!!tirnanog.com; Thu, 12 Mar 2015 14:21:53 -0700

DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; s=mt; d=pmta.sailthru.com;

h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type:List-Unsubscribe
;

bh=/lxmlrJQKq6fl1OmIaekS84ZalE=;

b=Rqtg31H8M0M7AiYslW+Ts/cy/igfo2wn6vw+km/vpsEAUcEi9s+m9aDCfLzoG7L5upSDBWrzwo
83

 
sT7eKPwz4iPAa7fB2PMzLJpDmExu1qv7lN5xKl2JLLrOjlVQQiKhoXAIxRfp/e2KUi4LkdTpSiEr

   y5gMs8tOcZis8Icxo2E=

Received: from nyp1-p-p4136-prd-jma-04.sailthru.pvt (64.34.57.233) by
mx-washpost-a.sailthru.com id h081mu1qqbs6 for rick...@tirnanog.com; Thu,
12 Mar 2015 17:21:50 -0400 (envelope-from deliv...@mx.sailthru.com)

DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple;
t=1426195310;

   s=sailthru; d=e.washingtonpost.com;

 
h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type:List-Unsubscribe
;

   bh=h1kKlRHR3FV/7FTdYTfMs9u9pPrGdkNPKUp05V1qrVk=;

 
b=B/lK29y/CHuHLJ/uY/BZCgCN0XZsku3MaOW/I+KGW/Xqd9NA5jdxyRG3Fz0eq5Cj

 
u5F0C3Q+vuIparPPdGqqBEifv6bCdVWN92wBDOslNf9qHyJeJpn43LatKbWsw3+nvuR

   EEBdWGj2tt1nSrzqNlO64g+TdXMKltQWkxkHCaeA=

Date: Thu, 12 Mar 2015 17:21:50 -0400 (EDT)

From: The Washington Post em...@e.washingtonpost.com

To: rickhan!!tirnanog.com

Message-ID: 20150312212150.3994150.72...@sailthru.com

Subject: News Alert: American with Ebola to be treated at National

Institutes of Health

MIME-Version: 1.0

Content-Type: multipart/alternative; 

   boundary==_Part_1695_1383230446.1426195310303

Precedence: bulk

X-TM-ID: 20150312212150.3994150.72694

X-Info: Message sent by sailthru.com customer The Washington Post

X-Info: We do not permit unsolicited commercial email

X-Info: Please report abuse by forwarding complete headers to

X-Info: ab...@sailthru.com

X-Mailer: sailthru.com

X-JMailer: nyp1-p-p4136-prd-jma-04.sailthru.pvt

X-Unsubscribe-Web:
http://link.washingtonpost.com/oc/54836cd23b35d0d5728c41ca2dlwm.1k3a/a618a63
9

List-Unsubscribe:
http://link.washingtonpost.com/oc/54836cd23b35d0d5728c41ca2dlwm.1k3a/a618a6
39, mailto:unsubscribe_20150312212150.3994150.72...@mx.sailthru.com

X-rpcampaign: sthiq3994150

X-Spam-Subject: ***SPAM*** News Alert: American with Ebola to be treated at
National

Institutes of Health

X-Spam-Status: Yes, score=-0.5

X-Spam-Score: -4

X-Spam-Bar: /

X-Spam-Flag: YES

 



Re: whitelist_from in user_prefs is not being processed.

2015-03-12 Thread Reindl Harald



Am 12.03.2015 um 23:06 schrieb Rick Hantz (TirNanOg):

In my user_prefs file, I have: (see resulting header below)

whitelist_from mailto:*@sailthru.com

whitelist_from mailto:*@e.washingtonpost.com

Do I also need

whitelist_from mailto:*@*.sailthru.com  ?

Return-path: deliv...@mx.sailthru.com


i guess all that mailto:; crap comes from sending HTML mails for 
whatever reason, besides that: @sailthru.com surely is not the same as 
@mx.sailthru.com




signature.asc
Description: OpenPGP digital signature


Re: whitelist_from conditioned to hostname

2013-10-18 Thread Benny Pedersen

nik600 skrev den 2013-10-18 17:24:


Can i do that?


sure:

whitelist_auth postmas...@example.org

whitelist_from allow forges, dont use it, its still candidate to be 
removed from spamassassin









Re: whitelist_from conditioned to hostname

2013-10-18 Thread Matus UHLAR - fantomas

On 18.10.13 17:24, nik600 wrote:

is possible to specify a whitelist_from in local.cf limiting it for some
hosts?


yes, use whitelist_from_rcvd for that.
Note that applies to external mail, e.g. mail received from hosts not in
your internal_network.


i want to whitelist my postmas...@foo.tld to avoid backscatter or
bouce_message classifications, but want to limit this whitelist only if the
sender is from my server, if the smtp client is something different than i
trust i don't want to whitelist it.


well, this it exactly what VBounce plugin is for, and you need to specify
whitelist_bounce_relays for it to work.
--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Saving Private Ryan...
Private Ryan exists. Overwrite? (Y/N)


Re: whitelist_from conditioned to hostname

2013-10-18 Thread Kris Deugau
nik600 wrote:
 is possible to specify a whitelist_from in local.cf http://local.cf
 limiting it for some hosts?
 
 Example:
 
 i want to whitelist my postmas...@foo.tld to avoid backscatter or
 bouce_message classifications, but want to limit this whitelist only if
 the sender is from my server, if the smtp client is something different
 than i trust i don't want to whitelist it.

whitelist_from_rcvd postmas...@foo.tld smtp.foo.tld

Note this requires you have properly configured reverse DNS on your
server's IP.

-kgd


RE: whitelist_from in SQL not applied?

2013-02-19 Thread Philippe Ratté
 1: spamassassin 21 -D --lint | less
 2: perldoc Mail::SpamAssassin::Plugin::SPF

 could still be relevant problem if its added remotely and not localy,
 but this is why i asked 1: on above, can you post it to pastebin and
 give a link here ?

http://pastebin.com/xErBy0ej
 
 2: is just informative to you what to configure in local.cf

Ok, will try whitelist_from_spf
 
 for the sql whitelist use same preferences as it would be in local.cf,
 and btw have you multiple sql users preferences or just one ?, is it
 really checking the right user ?

Just one user prefs in the DB for this user, how can't I be sure that it's 
checking the right user? Other whitelist_from all work

Thanks



RE: whitelist_from in SQL not applied?

2013-02-19 Thread Benny Pedersen

Philippe Ratté skrev den 2013-02-19 16:15:

1: spamassassin 21 -D --lint | less
2: perldoc Mail::SpamAssassin::Plugin::SPF


could still be relevant problem if its added remotely and not 
localy,

but this is why i asked 1: on above, can you post it to pastebin and
give a link here ?


http://pastebin.com/xErBy0ej


Feb 19 10:02:25.354 [19195] dbg: spf: cannot get Envelope-From, cannot 
use SPF


is this why whitelist_from are the only one that works ?

first get it to work from local.cf, if this is working move the same 
rule to sql is the right way to test


if envelope-from is non default, then set it in local.cf, info here 
perldoc Mail::SpamAssassin::Conf


postfix is using Return-Path, if you are using another mta you may 
change this in the settings so spf does not say it does not find 
envelope-from as above



2: is just informative to you what to configure in local.cf

Ok, will try whitelist_from_spf


i noticed you are using openprotect rule set with 99% depricated rule 
sets :(


why not just use spamassassin rule sets ?

and a side note:

dont loadplugin from an cf file, use pre files for loadplugin, see 
freemail error in your pastbin its gets loaded twice :(


if you can add the missing perl modules then do it, but i cant remember 
if it solves problems, it depends on what to test


for the sql whitelist use same preferences as it would be in 
local.cf,

and btw have you multiple sql users preferences or just one ?, is it
really checking the right user ?


Just one user prefs in the DB for this user, how can't I be sure that
it's checking the right user? Other whitelist_from all work


lets solve envelope sender first


RE: whitelist_from in SQL not applied?

2013-02-19 Thread Philippe Ratté
Benny,

 Feb 19 10:02:25.354 [19195] dbg: spf: cannot get Envelope-From, cannot
 use SPF
 
 is this why whitelist_from are the only one that works ?
 
 first get it to work from local.cf, if this is working move the same
 rule to sql is the right way to test
 
 if envelope-from is non default, then set it in local.cf, info here
 perldoc Mail::SpamAssassin::Conf
 
 postfix is using Return-Path, if you are using another mta you may
 change this in the settings so spf does not say it does not find
 envelope-from as above

I'm using qmail, along with qmail-scanner-st, and I just added a patch so that 
qmail adds the envelope-from to the headers

It works; this is what the first header now looks like:

Received: from mail-ve0-f193.google.com (209.85.128.193)
  by myserver.com (envelope-from u...@gmail.com)
 with SMTP; 19 Feb 2013 22:12:37 -

If I run spamassassin using these params, I don't see any SPF errors:

spamassassin -D  email.msg 2debug.log

[...]
Feb 19 17:39:22.803 [10817] dbg: spf: checking to see if the message has a 
Received-SPF header that we can use
Feb 19 17:39:22.848 [10817] dbg: spf: using Mail::SPF for SPF checks
Feb 19 17:39:22.848 [10817] dbg: spf: checking HELO 
(helo=falcon594.startdedicated.com, ip=69.64.33.211)
Feb 19 17:39:22.850 [10817] dbg: dns: providing a callback for id: 
55831/falcon594.startdedicated.com/SPF/IN
Feb 19 17:39:22.857 [10817] dbg: spf: query for 
/69.64.33.211/falcon594.startdedicated.com: result: none, comment: , text: No 
applicable sender policy available
Feb 19 17:39:22.858 [10817] dbg: spf: already checked for Received-SPF headers, 
proceeding with DNS based checks
Feb 19 17:39:22.858 [10817] dbg: spf: found Envelope-From in first external 
Received header
Feb 19 17:39:22.858 [10817] dbg: spf: checking EnvelopeFrom 
(helo=falcon594.startdedicated.com, ip=69.64.33.211, envfrom=nore...@sonico.com)
Feb 19 17:39:22.859 [10817] dbg: dns: providing a callback for id: 
65122/sonico.com/SPF/IN
Feb 19 17:39:22.941 [10817] dbg: spf: query for 
nore...@sonico.com/69.64.33.211/falcon594.startdedicated.com: result: fail, 
comment: Please see 
http://www.openspf.org/Why?s=mfromid=noreply%40sonico.comip=69.64.33.211r=myserver.com,
 text: Mechanism '-all' matched
Feb 19 17:39:22.948 [10817] dbg: spf: def_spf_whitelist_from: already checked 
spf and didn't get pass, skipping whitelist check
Feb 19 17:39:22.949 [10817] dbg: rules: ran eval rule SPF_FAIL == got hit 
(1)
Feb 19 17:39:22.950 [10817] dbg: spf: whitelist_from_spf: already checked spf 
and didn't get pass, skipping whitelist check
Feb 19 17:39:23.222 [10817] dbg: rules: ran uri rule __LOCAL_PP_NONPPURL 
== got hit: http://www.openspf.org;
[...]

However, if I run spamassassin 21 -D --lint | less I still see the error:

Feb 19 17:41:54.196 [11019] dbg: spf: cannot get Envelope-From, cannot use SPF
Feb 19 17:41:54.196 [11019] dbg: spf: def_spf_whitelist_from: could not find 
useable envelope sender

 i noticed you are using openprotect rule set with 99% depricated rule
 sets :(

/var/lib/spamassassin/3.002005/saupdates_openprotect_com.pre
/var/lib/spamassassin/3.002005/saupdates_openprotect_com
/var/lib/spamassassin/3.002005/saupdates_openprotect_com.cf
/var/lib/spamassassin/3.003001/saupdates_openprotect_com.pre
/var/lib/spamassassin/3.003001/saupdates_openprotect_com
/var/lib/spamassassin/3.003001/saupdates_openprotect_com.cf
/var/lib/spamassassin/3.002004/saupdates_openprotect_com.pre
/var/lib/spamassassin/3.002004/saupdates_openprotect_com
/var/lib/spamassassin/3.002004/saupdates_openprotect_com.cf
/var/lib/spamassassin/3.003002/saupdates_openprotect_com.pre
/var/lib/spamassassin/3.003002/saupdates_openprotect_com
/var/lib/spamassassin/3.003002/saupdates_openprotect_com.cf

I can simply delete them, correct? 
 
 why not just use spamassassin rule sets ?

Most likely from previous SA versions
 
Thanks for your help btw!



RE: whitelist_from in SQL not applied?

2013-02-19 Thread Benny Pedersen

Philippe Ratté skrev den 2013-02-19 23:49:


I'm using qmail, along with qmail-scanner-st, and I just added a
patch so that qmail adds the envelope-from to the headers


?


It works; this is what the first header now looks like:

Received: from mail-ve0-f193.google.com (209.85.128.193)
  by myserver.com (envelope-from u...@gmail.com)
 with SMTP; 19 Feb 2013 22:12:37 -


received is not envelope-from


If I run spamassassin using these params, I don't see any SPF errors:
spamassassin -D  email.msg 2debug.log
[...]
Feb 19 17:39:22.803 [10817] dbg: spf: checking to see if the message
has a Received-SPF header that we can use


it reuse pypolicyd-spf here

it does not use envelope-from

However, if I run spamassassin 21 -D --lint | less I still see the 
error:


Feb 19 17:41:54.196 [11019] dbg: spf: cannot get Envelope-From, 
cannot use SPF

Feb 19 17:41:54.196 [11019] dbg: spf: def_spf_whitelist_from: could
not find useable envelope sender


you did not fix spamassassin, just found a received-spf example does 
not show the problem



I can simply delete them, correct?


yes


why not just use spamassassin rule sets ?

Most likely from previous SA versions


:-)


Thanks for your help btw!


wait until it works


RE: whitelist_from in SQL not applied?

2013-02-19 Thread David B Funk

On Tue, 19 Feb 2013, Philippe Ratté wrote:


Benny,


Feb 19 10:02:25.354 [19195] dbg: spf: cannot get Envelope-From, cannot
use SPF

is this why whitelist_from are the only one that works ?

first get it to work from local.cf, if this is working move the same
rule to sql is the right way to test

[snip..]

I'm using qmail, along with qmail-scanner-st, and I just added a patch so that 
qmail adds the envelope-from to the headers

It works; this is what the first header now looks like:

Received: from mail-ve0-f193.google.com (209.85.128.193)
 by myserver.com (envelope-from u...@gmail.com)
with SMTP; 19 Feb 2013 22:12:37 -

If I run spamassassin using these params, I don't see any SPF errors:

spamassassin -D  email.msg 2debug.log

[...]
Feb 19 17:39:22.803 [10817] dbg: spf: checking to see if the message has a 
Received-SPF header that we can use
Feb 19 17:39:22.848 [10817] dbg: spf: using Mail::SPF for SPF checks
Feb 19 17:39:22.848 [10817] dbg: spf: checking HELO 
(helo=falcon594.startdedicated.com, ip=69.64.33.211)
Feb 19 17:39:22.850 [10817] dbg: dns: providing a callback for id: 
55831/falcon594.startdedicated.com/SPF/IN
Feb 19 17:39:22.857 [10817] dbg: spf: query for 
/69.64.33.211/falcon594.startdedicated.com: result: none, comment: , text: No 
applicable sender policy available
Feb 19 17:39:22.858 [10817] dbg: spf: already checked for Received-SPF headers, 
proceeding with DNS based checks
Feb 19 17:39:22.858 [10817] dbg: spf: found Envelope-From in first external 
Received header


OK, this says that your envelope-from patch to qmail is working


Feb 19 17:39:22.858 [10817] dbg: spf: checking EnvelopeFrom 
(helo=falcon594.startdedicated.com, ip=69.64.33.211, envfrom=nore...@sonico.com)
Feb 19 17:39:22.949 [10817] dbg: rules: ran eval rule SPF_FAIL == got hit 
(1)
Feb 19 17:39:22.950 [10817] dbg: spf: whitelist_from_spf: already checked spf 
and didn't get pass, skipping whitelist check
Feb 19 17:39:23.222 [10817] dbg: rules: ran uri rule __LOCAL_PP_NONPPURL == got hit: 
http://www.openspf.org;
[...]


this says that SA can now make valid decisions about whitelist_from_spf, so you
should be good to go with using whitelist_from_spf



However, if I run spamassassin 21 -D --lint | less I still see the error:

Feb 19 17:41:54.196 [11019] dbg: spf: cannot get Envelope-From, cannot use SPF
Feb 19 17:41:54.196 [11019] dbg: spf: def_spf_whitelist_from: could not find 
useable envelope sender


Don't worry about this error. When you do a --lint SA uses a special built-in
test message for system configuration checking which has very little network
related info, including lacking anything that it can use for Envelope-From 
detection.


Bottom line, this error is expected with --lint. As long as you
get that found Envelope-From in... debug message when checking with live
data you're OK.

Now, on with your whitelist testing.

--
Dave Funk  University of Iowa
dbfunk (at) engineering.uiowa.eduCollege of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include std_disclaimer.h
Better is not better, 'standard' is better. B{

RE: whitelist_from in SQL not applied?

2013-02-19 Thread Benny Pedersen

David B Funk skrev den 2013-02-20 01:18:

On Tue, 19 Feb 2013, Philippe Ratté wrote:


Benny,

Feb 19 10:02:25.354 [19195] dbg: spf: cannot get Envelope-From, 
cannot

use SPF

is this why whitelist_from are the only one that works ?

first get it to work from local.cf, if this is working move the 
same

rule to sql is the right way to test

[snip..]
I'm using qmail, along with qmail-scanner-st, and I just added a 
patch so that qmail adds the envelope-from to the headers


It works; this is what the first header now looks like:

Received: from mail-ve0-f193.google.com (209.85.128.193)
 by myserver.com (envelope-from u...@gmail.com)
with SMTP; 19 Feb 2013 22:12:37 -

If I run spamassassin using these params, I don't see any SPF 
errors:


spamassassin -D  email.msg 2debug.log

[...]
Feb 19 17:39:22.803 [10817] dbg: spf: checking to see if the message 
has a Received-SPF header that we can use

Feb 19 17:39:22.848 [10817] dbg: spf: using Mail::SPF for SPF checks


read perldoc Mail::SpamAssassin::Plugin::SPF was not fun when i say it 
:)


if you want to reuse that received-spf header then tell spf plugin to 
not use Mail::SPF


and see more info on perldoc Mail::SpamAssassin::Conf for 
envelope-sender-header


Feb 19 17:39:22.848 [10817] dbg: spf: checking HELO 
(helo=falcon594.startdedicated.com, ip=69.64.33.211)
Feb 19 17:39:22.850 [10817] dbg: dns: providing a callback for id: 
55831/falcon594.startdedicated.com/SPF/IN
Feb 19 17:39:22.857 [10817] dbg: spf: query for 
/69.64.33.211/falcon594.startdedicated.com: result: none, comment: , 
text: No applicable sender policy available
Feb 19 17:39:22.858 [10817] dbg: spf: already checked for 
Received-SPF headers, proceeding with DNS based checks
Feb 19 17:39:22.858 [10817] dbg: spf: found Envelope-From in first 
external Received header


OK, this says that your envelope-from patch to qmail is working


but it still miss what header is the envelope-from ?, received-spf is 
not envelope-from


Feb 19 17:39:22.858 [10817] dbg: spf: checking EnvelopeFrom 
(helo=falcon594.startdedicated.com, ip=69.64.33.211, 
envfrom=nore...@sonico.com)
Feb 19 17:39:22.949 [10817] dbg: rules: ran eval rule SPF_FAIL 
== got hit (1)
Feb 19 17:39:22.950 [10817] dbg: spf: whitelist_from_spf: already 
checked spf and didn't get pass, skipping whitelist check
Feb 19 17:39:23.222 [10817] dbg: rules: ran uri rule 
__LOCAL_PP_NONPPURL == got hit: http://www.openspf.org;

[...]


this says that SA can now make valid decisions about 
whitelist_from_spf, so you

should be good to go with using whitelist_from_spf


+1

However, if I run spamassassin 21 -D --lint | less I still see the 
error:


Feb 19 17:41:54.196 [11019] dbg: spf: cannot get Envelope-From, 
cannot use SPF
Feb 19 17:41:54.196 [11019] dbg: spf: def_spf_whitelist_from: could 
not find useable envelope sender


Don't worry about this error. When you do a --lint SA uses a 
special built-in
test message for system configuration checking which has very little 
network

related info, including lacking anything that it can use for
Envelope-From detection.


it was to detect loadplugin errors


Bottom line, this error is expected with --lint. As long as you
get that found Envelope-From in... debug message when checking with 
live

data you're OK.

Now, on with your whitelist testing.


yep but first test is in local.cf, when that works try sql problems :)


RE: whitelist_from in SQL not applied?

2013-02-15 Thread Benny Pedersen

Philippe Ratté skrev den 2013-02-14 15:24:

The mail came from 65.54.190.123 and it passes SPF

dont use whitelist_from, with that setting anyone can use that email 
as

sender to get whitelisted, this is okay if you do spf testing in mta
only, so spamassassin follow it as an ok, but not if you are not 
testing

spf in mta


What should I use, then?


1: spamassassin 21 -D --lint | less
2: perldoc Mail::SpamAssassin::Plugin::SPF


SPF is not checked at mta


ok

have you configured Mail::SPF to reuse mta spf (recieved-spf header) 
?

No


could still be relevant problem if its added remotely and not localy, 
but this is why i asked 1: on above, can you post it to pastebin and 
give a link here ?


2: is just informative to you what to configure in local.cf

for the sql whitelist use same preferences as it would be in local.cf, 
and btw have you multiple sql users preferences or just one ?, is it 
really checking the right user ?






Re: whitelist_from in SQL not applied?

2013-02-14 Thread Benny Pedersen

Philippe Ratté skrev den 2013-02-13 23:05:


dbg: spf: def_spf_whitelist_from: already checked spf and didn't get
pass, skipping whitelist check


why does it not get pass when spf is okay ?

http://dmarcian.com/spf-survey/hotmail.com


|   3485 | %domain.ca | whitelist_from | u...@hotmail.com |


dont use whitelist_from, with that setting anyone can use that email as 
sender to get whitelisted, this is okay if you do spf testing in mta 
only, so spamassassin follow it as an ok, but not if you are not testing 
spf in mta


have you configured Mail::SPF to reuse mta spf (recieved-spf header) ?




RE: whitelist_from in SQL not applied?

2013-02-14 Thread Philippe Ratté
The mail came from 65.54.190.123 and it passes SPF

 dont use whitelist_from, with that setting anyone can use that email as
 sender to get whitelisted, this is okay if you do spf testing in mta
 only, so spamassassin follow it as an ok, but not if you are not testing
 spf in mta

What should I use, then? SPF is not checked at mta

 have you configured Mail::SPF to reuse mta spf (recieved-spf header) ?

No




Re: whitelist_from and whitelst_from_rcvd

2010-03-17 Thread Ron

thank you sir, i think this worked.

On 3/17/2010 3:26 AM, John Hardin wrote:

On Tue, 16 Mar 2010, John Hardin wrote:


header POGO_CUSTOMER Received =~
/\(\...@pinoyonthego\.net\@[\d\.]+\).*by mail\.pinoyonthego\.net/


Watch the line wrap on that...



Re: whitelist_from and whitelst_from_rcvd

2010-03-16 Thread Ron

hi sir,

yes i am using vchkpw to auth users. are you talking about using 
whitelist_auth? i have tried using that coz i have spf defined on my 
domain, but i am not sure if whitelist_auth is for that.


dig -t TXT pinoyonthego.net

;; QUESTION SECTION:
;pinoyonthego.net.  IN  TXT

;; ANSWER SECTION:
pinoyonthego.net.   604800  IN  TXT v=spf1 a mx 
ip4:202.79.221.135 mx:mail.pinoyonthego.net -all


basically my setup is i just followed qmailrocks.org and now i am trying 
to understand how everything works which is quite alot of things to 
understand. :(


Ron

On 3/16/2010 12:51 AM, John Hardin wrote:

On Tue, 16 Mar 2010, Ron wrote:


i think the only way to not scan outgoing mails in qmail is to add the
users IP address to /etc/tcp.smtp, unfortunately my users are on
dynamic IP that i cannot add it one by one.


Are you authenticating your users in any way? There are ways to
whitelist users who have authenticated against your MTA. Please check
the list archives and the Wiki.



Re: whitelist_from and whitelst_from_rcvd

2010-03-16 Thread John Hardin

On Tue, 16 Mar 2010, Ron wrote:


On 3/16/2010 12:51 AM, John Hardin wrote:

 Are you authenticating your users in any way? There are ways to
 whitelist users who have authenticated against your MTA. Please check
 the list archives and the Wiki.


yes i am using vchkpw to auth users. are you talking about using 
whitelist_auth? i have tried using that coz i have spf defined on my 
domain, but i am not sure if whitelist_auth is for that.


No, it's not. It's not going to be quite as simple as a one-line 
whitelist_* entry.


Can you post the Received: headers from a properly-suthorized mail sent by 
one of your users from a dynamic IP address? I'll try to point out what 
you need to write a rule to detect and subtract points for.


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  Think Microsoft cares about your needs at all?
  A company wanted to hold off on upgrading Microsoft Office for a
  year in order to do other projects. So Microsoft gave a 'free' copy
  of the new Office to the CEO -- a copy that of course generated
  errors for anyone else in the firm reading his documents. The CEO
  got tired of getting the 'please re-send in XX format' so he
  ordered other projects put on hold and the Office upgrade to be top
  priority.-- Cringely, 4/8/2004
---
 158 days since President Obama won the Nobel Not George W. Bush prize


Re: whitelist_from and whitelst_from_rcvd

2010-03-16 Thread Ron

thank you sir,

please see attached file. test header set score to 15 just to be able to 
send out, i have setup report_safe to  but x-spam-report does not show 
up on the header, i can't tell what's causing all the points to increase.


regards
Ron

On 3/16/2010 11:16 PM, John Hardin wrote:

On Tue, 16 Mar 2010, Ron wrote:


On 3/16/2010 12:51 AM, John Hardin wrote:

Are you authenticating your users in any way? There are ways to
whitelist users who have authenticated against your MTA. Please check
the list archives and the Wiki.


yes i am using vchkpw to auth users. are you talking about using
whitelist_auth? i have tried using that coz i have spf defined on my
domain, but i am not sure if whitelist_auth is for that.


No, it's not. It's not going to be quite as simple as a one-line
whitelist_* entry.

Can you post the Received: headers from a properly-suthorized mail sent
by one of your users from a dynamic IP address? I'll try to point out
what you need to write a rule to detect and subtract points for.

From - Tue Mar 16 23:27:53 2010
X-Account-Key: account7
X-UIDL: GmailId127679517268da5f
X-Mozilla-Status: 0001
X-Mozilla-Status2: 
X-Mozilla-Keys: 

Delivered-To: nha...@gmail.com
Received: by 10.229.43.14 with SMTP id u14cs96637qce;
Tue, 16 Mar 2010 08:27:39 -0700 (PDT)
Received: by 10.115.51.20 with SMTP id d20mr10746wak.151.1268753177038;
Tue, 16 Mar 2010 08:26:17 -0700 (PDT)
Return-Path: nha...@pinoyonthego.net
Received: from mail.pinoyonthego.net ([202.79.221.135])
by mx.google.com with ESMTP id 1si13561053pxi.86.2010.03.16.08.26.15;
Tue, 16 Mar 2010 08:26:16 -0700 (PDT)
Received-SPF: pass (google.com: domain of nha...@pinoyonthego.net designates 
202.79.221.135 as permitted sender) client-ip=202.79.221.135;
Authentication-Results: mx.google.com; spf=pass (google.com: domain of 
nha...@pinoyonthego.net designates 202.79.221.135 as permitted sender) 
smtp.mail=nha...@pinoyonthego.net
Received: (qmail 24730 invoked by uid 1012); 16 Mar 2010 23:23:02 +0800
Received: from 116.87.219.30 by pog (envelope-from nha...@pinoyonthego.net, 
uid 1008) with qmail-scanner-1.25-st-qms 
 (clamdscan: 0.87/1082. spamassassin: 3.3.0. perlscan: 1.25-st-qms.  
 Clear:RC:0(116.87.219.30):SA:0(11.1/15.0):. 
 Processed in 0.342791 secs); 16 Mar 2010 15:23:02 -
X-Spam-Status: No, hits=11.1 required=15.0
X-Spam-Level: +++
X-Antivirus-SILVERBACKASP-Mail-From: nha...@pinoyonthego.net via pog
X-Antivirus-SILVERBACKASP: 1.25-st-qms 
(Clear:RC:0(116.87.219.30):SA:0(11.1/15.0):. Processed in 0.342791 secs Process 
24720)
Received: from cm30.zeta219.maxonline.com.sg (HELO ?192.168.1.107?) 
(nha...@pinoyonthego.net@116.87.219.30)
  by mail.pinoyonthego.net with SMTP; 16 Mar 2010 23:23:02 +0800
Message-ID: 4b9fa313.8030...@pinoyonthego.net
Date: Tue, 16 Mar 2010 23:26:11 +0800
From: nhadie nha...@pinoyonthego.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.1.8) 
Gecko/20100227 Thunderbird/3.0.3
MIME-Version: 1.0
To: Ron nha...@gmail.com
Subject: mail from pog
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

mail from pog


Re: whitelist_from and whitelst_from_rcvd

2010-03-16 Thread John Hardin

On Tue, 16 Mar 2010, Ron wrote:


please see attached file.


Is mail.pinoyonthego.net your MTA?

If so, try this:

header POGO_CUSTOMER Received =~ /\(\...@pinoyonthego\.net\@[\d\.]+\).*by 
mail\.pinoyonthego\.net/
score  POGO_CUSTOMER -1

Run in test for a while, if you only get hits on customer emails then drop 
it to -20 or so to offset the scores they are getting.


Note: this assumes that your MTA is putting this header into the emails 
before passing them on to SA. If it is not, they you're stuck. You'll need 
to figure out hot to tell your MTA to not pass those messages to SA in the 
first place.




regards
Ron

On 3/16/2010 11:16 PM, John Hardin wrote:

 On Tue, 16 Mar 2010, Ron wrote:

  On 3/16/2010 12:51 AM, John Hardin wrote:
   Are you authenticating your users in any way? There are ways to
   whitelist users who have authenticated against your MTA. Please check
   the list archives and the Wiki.
 
  yes i am using vchkpw to auth users. are you talking about using

  whitelist_auth? i have tried using that coz i have spf defined on my
  domain, but i am not sure if whitelist_auth is for that.

 No, it's not. It's not going to be quite as simple as a one-line
 whitelist_* entry.

 Can you post the Received: headers from a properly-suthorized mail sent
 by one of your users from a dynamic IP address? I'll try to point out
 what you need to write a rule to detect and subtract points for.


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  The United States has become a place where entertainers and
  professional athletes are mistaken for people of importance.
-- Maureen Johnson Smith Long
---
 158 days since President Obama won the Nobel Not George W. Bush prize


Re: whitelist_from and whitelst_from_rcvd

2010-03-16 Thread John Hardin

On Tue, 16 Mar 2010, John Hardin wrote:


header POGO_CUSTOMER Received =~ /\(\...@pinoyonthego\.net\@[\d\.]+\).*by  
mail\.pinoyonthego\.net/


Watch the line wrap on that...

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  The United States has become a place where entertainers and
  professional athletes are mistaken for people of importance.
-- Maureen Johnson Smith Long
---
 158 days since President Obama won the Nobel Not George W. Bush prize


Re: whitelist_from and whitelst_from_rcvd

2010-03-15 Thread RW
On Mon, 15 Mar 2010 21:43:03 +0800
Ron nha...@gmail.com wrote:

 Hi All,
 
 Newbie here, i have a qmail server, and i installed 
 qmail-scanner+clav+spamassassin. I'm trying to allow all my users
 using whitelist_from but filter spoofed e-mail address using
 whitelist_from_rcvd.

Whitelist rules whitelist, they don't filter.

 Not sure If i'm following the manual correctly, but here's what on
 local.cf
 
 internal_networks 202.79.221.135
 trusted_networks 202.79.221.135
 whitelist_from *...@imagetransforms.com
 whitelist_from_rcvd *...@imagetransforms.com mail.pinoyonthego.net

This last line means whitelist *...@imagetransforms.com if it's received
into your internal network from mail.pinoyonthego.net.

mail.pinoyonthego.net isn't going to receive from mail.pinoyonthego.net
so that wont work. And in any case your server is called
ip135.silverbackasp.com since whitelist_from_rcvd uses reverse dns.


 but with that config, i'm still receiving spam e-mail with spoofed 
 e-mail address, so i tried removing whitelist_from
 *...@imagetransforms.com and retained whitelist_from_rcvd, but when i
 send an e-mail i'm getting denied because my email was tagged as spam.

Why is your outgoing mail identified as spam? Do you even want to be
scanning this?

 another thing i'm confused is that there 2 Received From on the
 header, one from my IP address at home, and one which is the IP
 address of my qmail server.

There's nothing unusual about that. You sent an email to gmail, your
server added a header and gmail added a header


Re: whitelist_from and whitelst_from_rcvd

2010-03-15 Thread Ron

Hi Sir,

Please see inline. Thank You


On 3/16/2010 12:05 AM, RW wrote:

On Mon, 15 Mar 2010 21:43:03 +0800
Ronnha...@gmail.com  wrote:


Hi All,

Newbie here, i have a qmail server, and i installed
qmail-scanner+clav+spamassassin. I'm trying to allow all my users
using whitelist_from but filter spoofed e-mail address using
whitelist_from_rcvd.


Whitelist rules whitelist, they don't filter.


Not sure If i'm following the manual correctly, but here's what on
local.cf

internal_networks 202.79.221.135
trusted_networks 202.79.221.135
whitelist_from *...@imagetransforms.com
whitelist_from_rcvd *...@imagetransforms.com mail.pinoyonthego.net


This last line means whitelist *...@imagetransforms.com if it's received
into your internal network from mail.pinoyonthego.net.

mail.pinoyonthego.net isn't going to receive from mail.pinoyonthego.net
so that wont work. And in any case your server is called
ip135.silverbackasp.com since whitelist_from_rcvd uses reverse dns.



does this mean i have to add reverse DNS of IP address of my users where 
they send the mail from? does it also mean since they are on dynamic IP 
i won't be able to use this command?





but with that config, i'm still receiving spam e-mail with spoofed
e-mail address, so i tried removing whitelist_from
*...@imagetransforms.com and retained whitelist_from_rcvd, but when i
send an e-mail i'm getting denied because my email was tagged as spam.


Why is your outgoing mail identified as spam? Do you even want to be
scanning this?


i think the only way to not scan outgoing mails in qmail is to add the 
users IP address to /etc/tcp.smtp, unfortunately my users are on dynamic 
IP that i cannot add it one by one.





another thing i'm confused is that there 2 Received From on the
header, one from my IP address at home, and one which is the IP
address of my qmail server.


There's nothing unusual about that. You sent an email to gmail, your
server added a header and gmail added a header



Re: whitelist_from and whitelst_from_rcvd

2010-03-15 Thread John Hardin

On Mon, 15 Mar 2010, Ron wrote:


whitelist_from *...@imagetransforms.com


Do not do this.

The From: address is trivially easy to spoof. You should not trust it to 
this degree.


whitelist_from should only be used in unusual situations, when you know 
exactly why one of the other whitelist options won't work.


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  If guards and searches and metal detectors can't keep a gun out of
  a maximum-security solitary confinement prisoner's cell, how will
  a disciplinary policy and some signs keep guns out of a university?
---
 157 days since President Obama won the Nobel Not George W. Bush prize


Re: whitelist_from and whitelst_from_rcvd

2010-03-15 Thread John Hardin

On Tue, 16 Mar 2010, Ron wrote:

i think the only way to not scan outgoing mails in qmail is to add the 
users IP address to /etc/tcp.smtp, unfortunately my users are on dynamic 
IP that i cannot add it one by one.


Are you authenticating your users in any way? There are ways to whitelist 
users who have authenticated against your MTA. Please check the list 
archives and the Wiki.


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  If guards and searches and metal detectors can't keep a gun out of
  a maximum-security solitary confinement prisoner's cell, how will
  a disciplinary policy and some signs keep guns out of a university?
---
 157 days since President Obama won the Nobel Not George W. Bush prize


Re: whitelist_from questions

2009-07-27 Thread John Wilcock

Le 26/07/2009 04:00, McDonald, Dan a écrit :

 From: Robert [mailto:list...@abbacomm.net]
  There are no doubt lots of ways, but how about:
 
  egrep 'whitelist_from[^_]' local.cf | awk '{FS=@; print $2
  TXT;}' | xargs dig | grep v=spf1

 what is this supposed to do?

select all of your whitelist_from entries, parse out the domain part,
dig the TXT record for each domain, then display only the ones that have
a v=spf1 notation.  That would give you a list of all of the domains in
your whitelist_from that could be migrated to whitelist_from_spf


... provided, as Matus pointed out, all your whitelist_from entries are 
nicely formatted one address per line, and provided you don't have any 
domain wildcards. If those two conditions aren't met then you'll have to 
do some extra mangling to extract the domains properly. It also only 
looks for TXT RRs, so if any of the target domains are using only SPF 
RRs it won't find them.


John.

--
-- Over 4000 webcams from ski resorts around the world - www.snoweye.com
-- Translate your technical documents and web pages- www.tradoc.fr


Re: whitelist_from questions

2009-07-27 Thread MySQL Student
Hi,

I'm looking an email that appears to be one of the users from the
whitelist, but instead was from:

   From probesqt...@segunitb1.freeserve.co.uk  Mon Jul 27 19:49:19 2009

Why can't a comparison be made between the From: info and the actual
sender? Is this because of virtual domains and/or users?

Thanks,
Alex


Re: whitelist_from questions

2009-07-27 Thread Matt Kettler
MySQL Student wrote:
 Hi,

 I'm looking an email that appears to be one of the users from the
 whitelist, but instead was from:

From probesqt...@segunitb1.freeserve.co.uk  Mon Jul 27 19:49:19 2009

 Why can't a comparison be made between the From: info and the actual
 sender? Is this because of virtual domains and/or users?
   
It's not done because this mismatch happens for nearly every mailing
list in existence (including this one).

Every message you get from this mailing list is From: the poster, but
the envelope is from the apache list server's bounce handler.

The To: header and Rcpt to: mismatch for similar reasons (To: will be
the list, but RCPT TO will be your mailbox).







Re: whitelist_from questions

2009-07-25 Thread Matus UHLAR - fantomas
On 25.07.09 01:25, jida...@jidanni.org wrote:
 Actually there should be one or two more whitelists, so one can e.g., score
 -100 one's friends
 -10  one's schools
 -1   one's country

we still have def_whitelist_* with score of -15.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
He who laughs last thinks slowest. 


RE: whitelist_from questions

2009-07-25 Thread Robert
 

 There are no doubt lots of ways, but how about:
 
 egrep 'whitelist_from[^_]' local.cf | awk '{FS=@; print $2 
 TXT;}' | xargs dig | grep v=spf1
 
 John.

john,

what is this supposed to do?

 - rh



RE: whitelist_from questions

2009-07-25 Thread McDonald, Dan
From: Robert [mailto:list...@abbacomm.net]
 There are no doubt lots of ways, but how about:
 
 egrep 'whitelist_from[^_]' local.cf | awk '{FS=@; print $2 
 TXT;}' | xargs dig | grep v=spf1

what is this supposed to do?

select all of your whitelist_from entries, parse out the domain part, dig the 
TXT record for each domain, then display only the ones that have a v=spf1 
notation.  That would give you a list of all of the domains in your 
whitelist_from that could be migrated to whitelist_from_spf





Re: whitelist_from questions

2009-07-24 Thread John Wilcock

Le 24/07/2009 04:09, MySQL Student a écrit :

I don't doubt that if we removed a substantial amount of them that SA
would do what's right, but there doesn't seem to be any scientific way
to do that successfully.


Can't you just look at the scores that the whitelisted messages are 
getting and see whether any would be close to being considered as spam 
without the -100 of the whitelist? [How best to do that depends on how 
you've integrated spamassassin into your mail setup, but grepping 
through logs ought to do it in most cases].


And perhaps a few carefully-chosen negative-scoring rules (for words or 
phrases common to your customer's business) might be a far more 
effective way of handling the rest.



Is there a way to script that for the 1000 or so entries, to see which
have SPF records?


There are no doubt lots of ways, but how about:

egrep 'whitelist_from[^_]' local.cf | awk '{FS=@; print $2 TXT;}' | 
xargs dig | grep v=spf1


John.

--
-- Over 4000 webcams from ski resorts around the world - www.snoweye.com
-- Translate your technical documents and web pages- www.tradoc.fr


Re: whitelist_from questions

2009-07-24 Thread Matus UHLAR - fantomas
 Le 24/07/2009 04:09, MySQL Student a écrit :
 I don't doubt that if we removed a substantial amount of them that SA
 would do what's right, but there doesn't seem to be any scientific way
 to do that successfully.

 Can't you just look at the scores that the whitelisted messages are  
 getting and see whether any would be close to being considered as spam  
 without the -100 of the whitelist? [How best to do that depends on how  
 you've integrated spamassassin into your mail setup, but grepping  
 through logs ought to do it in most cases].

 And perhaps a few carefully-chosen negative-scoring rules (for words or  
 phrases common to your customer's business) might be a far more  
 effective way of handling the rest.

 Is there a way to script that for the 1000 or so entries, to see which
 have SPF records?

 There are no doubt lots of ways, but how about:

On 24.07.09 08:58, John Wilcock wrote:
 egrep 'whitelist_from[^_]' local.cf | awk '{FS=@; print $2 TXT;}' |  
 xargs dig | grep v=spf1

well
- addresses can contain wildcards
- more addresses can be at one line
- SPF records should be checked before TXT

the first issue is hard to avoid by scripting, others can be solved.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
42.7 percent of all statistics are made up on the spot. 


Re: whitelist_from questions

2009-07-24 Thread jidanni
Actually there should be one or two more whitelists, so one can e.g., score
-100 one's friends
-10  one's schools
-1   one's country


Re: whitelist_from questions

2009-07-24 Thread Greg Troxel

jida...@jidanni.org writes:

 Actually there should be one or two more whitelists, so one can e.g., score
 -100 one's friends
 -10  one's schools
 -1   one's country

I have long wanted to be able to 

whitelist_from f...@bar -3.0

to have per-entry scores.  Obviously though I haven't wanted it enough
to write the code.


pgp3aDYuXaIPC.pgp
Description: PGP signature


Re: whitelist_from questions

2009-07-24 Thread John Hardin

On Fri, 24 Jul 2009, Greg Troxel wrote:


I have long wanted to be able to

whitelist_from f...@bar -3.0

to have per-entry scores.  Obviously though I haven't wanted it enough 
to write the code.


How does this not work?

  header WL_FROM_FOO   From =~ /\bf...@bar/i
  score  WL_FROM_FOO   -3.00

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  If healthcare is a Right means that the government is obligated
  to provide the people with hospitals, physicians, treatments and
  medications at low or no cost, then the right to free speech means
  the government is obligated to provide the people with printing
  presses and public address systems, the right to freedom of
  religion means the government is obligated to build churches for the
  people, and the right to keep and bear arms means the government is
  obligated to provide the people with guns, all at low or no cost.
---
 13 days since a sunspot last seen - EPA blames CO2 emissions


Re: whitelist_from questions

2009-07-24 Thread Greg Troxel

John Hardin jhar...@impsec.org writes:

 On Fri, 24 Jul 2009, Greg Troxel wrote:

 I have long wanted to be able to

 whitelist_from f...@bar -3.0

 to have per-entry scores.  Obviously though I haven't wanted it
 enough to write the code.

 How does this not work?

   header WL_FROM_FOO   From =~ /\bf...@bar/i
   score  WL_FROM_FOO   -3.00

It does, but doesn't it require allowing user rules?  Plus, it's two
lines for each whitelist_from_score entry, with a magic regexp.


pgpMetL9X7grj.pgp
Description: PGP signature


Re: whitelist_from questions

2009-07-24 Thread John Hardin

On Fri, 24 Jul 2009, Greg Troxel wrote:


John Hardin jhar...@impsec.org writes:


On Fri, 24 Jul 2009, Greg Troxel wrote:


I have long wanted to be able to

whitelist_from f...@bar -3.0

to have per-entry scores.  Obviously though I haven't wanted it
enough to write the code.


How does this not work?

  header WL_FROM_FOO   From =~ /\bf...@bar/i
  score  WL_FROM_FOO   -3.00


It does, but doesn't it require allowing user rules?


Yeah, but that requirement wasn't specified. Sorry.

Plus, it's two lines for each whitelist_from_score entry, with a magic 
regexp.


Yeah, the whitelist_* do a lot of magic in the background. This would get 
hard to manage for more than a few entries. I was assuming you only wanted 
to do a few.


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  If healthcare is a Right means that the government is obligated
  to provide the people with hospitals, physicians, treatments and
  medications at low or no cost, then the right to free speech means
  the government is obligated to provide the people with printing
  presses and public address systems, the right to freedom of
  religion means the government is obligated to build churches for the
  people, and the right to keep and bear arms means the government is
  obligated to provide the people with guns, all at low or no cost.
---
 13 days since a sunspot last seen - EPA blames CO2 emissions


Re: whitelist_from questions

2009-07-24 Thread Karsten Bräckelmann
On Fri, 2009-07-24 at 11:57 -0700, John Hardin wrote:
 On Fri, 24 Jul 2009, Greg Troxel wrote:

I have long wanted to be able to
   
whitelist_from f...@bar -3.0
   
to have per-entry scores.  Obviously though I haven't wanted it
enough to write the code.

First of all -- I don't like the term whitelist in this context. What's
being discussed is a small, almost marginal adjustment to the score.
Using whitelist for anything that low (even -1 has been mentioned
previously) is just watering down the definition.

That said, something like the above might be useful in some cases. Not
that I ever felt the need for it, but still.

Also, there are custom plugins [1] out there, which provide similar or
related functionality -- and even are *much* easier to maintain for
*users*, than the user_prefs.

See the Addressbook and LDAPfilter plugins. The latter even mentions
support for per-domain listings.

However, I strongly agree with a note in the Addressbook plugin's
description. This doesn't really work for all addresses (unless rcvd or
auth constrained, sic!). It is a common spammer pattern to send From
forged address A, to Recipient A, B and C at the same domain. Thus,
giving negative scores to your family, friends or co-workers is in some
cases likely to result in FNs.


Anyway, I hope everyone who really needs and uses whitelisting, also has
the ShortCircuit plugin enabled. If you deliberately WHITE-list, why
waste more cycles on the mail?


[1] http://wiki.apache.org/spamassassin/CustomPlugins

-- 
char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: whitelist_from questions

2009-07-24 Thread Benny Pedersen

On Fri, July 24, 2009 20:10, John Hardin wrote:
 On Fri, 24 Jul 2009, Greg Troxel wrote:
 I have long wanted to be able to
 whitelist_from f...@bar -3.0
 to have per-entry scores.  Obviously though I haven't wanted it enough
 to write the code.
 How does this not work?
header WL_FROM_FOO   From =~ /\bf...@bar/i
score  WL_FROM_FOO   -3.00

another example:

whitelist_from_spf f...@bar -3.0

only give -3.0 if spf pass

or

whitelist_from_dkim f...@bar -3.0

same for dkim

or both

whitelist_from_auth f...@bar -3.0

i still wonder why so many dont care more about forged senders :(


good such bad plugin does not exists, its bad enough that whitelist_from does

-- 
xpoint



Re: whitelist_from questions

2009-07-23 Thread John Wilcock

Le 22/07/2009 17:48, MySQL Student a écrit :

So, forever I have been using whitelist_from and have probably a
thousand entries.


Firstly, before you convert all these to whitelist_from_rcvd, perhaps 
you ought to ask yourself whether you really need 1000 entries on your 
whitelist. Does mail from these addresses actually get miscategorised as 
spam, or would SA get it right without the whitelist?


Secondly, don't forget about whitelist_from_spf. If a domain has an SPF 
record, this is a better solution than whitelist_from_rcvd as it avoids 
the need for *you* to work out which are the outgoing servers.


Lastly, if you do use whitelist_from_rcvd, remember that there may be 
multiple outgoing servers for a given domain, and worse they may change 
over time.


John.

--
-- Over 4000 webcams from ski resorts around the world - www.snoweye.com
-- Translate your technical documents and web pages- www.tradoc.fr


Re: whitelist_from questions

2009-07-23 Thread MySQL Student
Hi,

 Firstly, before you convert all these to whitelist_from_rcvd, perhaps you
 ought to ask yourself whether you really need 1000 entries on your
 whitelist.

I'm surprised you were the first to make that very comment, so thanks.

 Does mail from these addresses actually get miscategorised as
 spam, or would SA get it right without the whitelist?

Mail was being tagged as spam, and the organization became concerned
that others would be tagged, so it seemed anytime there was a
high-profile external business contact that they couldn't risk being
tagged, they had it added to the whitelist.

The list used to be much larger until we spent quite a while (months
and months) going through it with them to prune it.

I don't doubt that if we removed a substantial amount of them that SA
would do what's right, but there doesn't seem to be any scientific way
to do that successfully.

 Secondly, don't forget about whitelist_from_spf. If a domain has an SPF
 record, this is a better solution than whitelist_from_rcvd as it avoids the
 need for *you* to work out which are the outgoing servers.

Is there a way to script that for the 1000 or so entries, to see which
have SPF records?

 Lastly, if you do use whitelist_from_rcvd, remember that there may be
 multiple outgoing servers for a given domain, and worse they may change over
 time.

Yeah, I thought of that too, so it doesn't sound like that's going to
work well here.

Thanks,
Alex


Re: whitelist_from questions

2009-07-22 Thread Bowie Bailey

MySQL Student wrote:

Hi all,

Some time ago someone had mentioned to never use whitelist_from but
instead use whitelist_from_rcvd. Where is whitelist_from_rcvd
documented? It doesn't appear in the SA docs in the same place that
whitelist_from is listed.

So, forever I have been using whitelist_from and have probably a
thousand entries. Given that it doesn't appear to be well documented,
Is it okay to do a one-to-one translation of my whitelist_from rules
to whitelist_from_rcvd?

Do these entries have to be in local.cf, or can I create a
whitelist_from.cf file to place them in?

Thanks,
Alex
  


It is documented on the Mail::SpamAssassin::Conf man page just like 
whitelist_from.


--
whitelist_from_rcvd a...@lists.sourceforge.net sourceforge.net
Use this to supplement the whitelist_from addresses with a check against 
the Received headers. The first parameter is the

address to whitelist, and the second is a string to match the relay’s rDNS.

This string is matched against the reverse DNS lookup used during the 
handover from the internet to your internal network’s
mail exchangers. It can either be the full hostname, or the domain 
component of that hostname. In other words, if the
host that connected to your MX had an IP address that mapped to 
’sendinghost.spamassassin.org’, you should specify send-

inghost.spamassassin.org or just spamassassin.org here.

Note that this requires that internal_networks be correct. For simple 
cases, it will be, but for a complex network you

may get better results by setting that parameter.

It also requires that your mail exchangers be configured to perform DNS 
reverse lookups on the connecting host’s IP

address, and to record the result in the generated Received: header.

e.g.

whitelist_from_rcvd j...@example.com example.com
whitelist_from_rcvd *...@axkit.org sergeant.org
--

You can't just do a simple switch from one to another. You have to look 
at each address and determine where the mail will be coming from. This 
way you are only whitelisting mail from that address if it comes from 
the correct servers.


You can also use whitelist_auth (described a bit further down on the 
same man page) to whitelist addresses from domains that use SPF, Domain 
Keys, or DKIM, assuming you have the SPF and DKIM Perl modules installed 
(I'm too lazy to look up the module names at the moment).


--
Bowie


Re: whitelist_from questions

2009-07-22 Thread MySQL Student
 It is documented on the Mail::SpamAssassin::Conf man page just like
 whitelist_from.

Ugh, thanks.

 whitelist_from_rcvd a...@lists.sourceforge.net sourceforge.net
 Use this to supplement the whitelist_from addresses with a check against the
 Received headers. The first parameter is the
 address to whitelist, and the second is a string to match the relay’s rDNS.

Okay, so for example if I was going to whitelist j...@orbitz.com, the
appropriate line would be:

whitelist_from_rcvd j...@orbitz.com psmtp.com

psmtp.com is the domain that controls mail for orbitz, according to
the MX records.

Thanks,
Alex


Re: whitelist_from questions

2009-07-22 Thread Jari Fredriksson
 It is documented on the Mail::SpamAssassin::Conf man
 page just like whitelist_from.
 
 Ugh, thanks.
 
 whitelist_from_rcvd a...@lists.sourceforge.net
 sourceforge.net 
 Use this to supplement the whitelist_from addresses with
 a check against the Received headers. The first
 parameter is the 
 address to whitelist, and the second is a string to
 match the relay’s rDNS. 
 
 Okay, so for example if I was going to whitelist
 j...@orbitz.com, the appropriate line would be:
 
 whitelist_from_rcvd j...@orbitz.com psmtp.com
 
 psmtp.com is the domain that controls mail for orbitz,
 according to the MX records.
 

psmtp.com may well, or may not handle their outgoing mail. MX records to not 
tell that. Of they are the same, but not necessarily always.

You ought to look at the headers of a received email and see where it came from.




RE: Whitelist_From Woes

2009-05-13 Thread Peter P. Benac
 
 
/var/log/maillog output:

May 13 10:53:46 cerberus MailScanner[3309]: Message n4DFrTip004779 from
63.93.193.30 (a...@easymatch.com) to saintjoe.edu http://saintjoe.edu/  is
spam, SpamAssassin (not cached, score=68.739, required 4, AWL -33.17,
BAYES_50 0.00, FORGED_RCVD_HELO 0.14, HTML_30_40 0.37, HTML_MESSAGE 0.00,
NO_REAL_NAME 0.96, RE_PASSWORD 100.00, RE_PASSWORDV 100.00,
USER_IN_WHITELIST -100.00, X_PRIORITY_HIGH 0.43) 
-
 
Not trying to ne rude here Mike, but you log entry actually answers your
question.

After all the scores are totaled you still have a score of 68.739 and you
only allow 4..Seems to me you need to get the other issues fixed like
going through the RE_PASSWORD filter twice.
Regards,
Pete
 

To have principles...
 First have courage.. With principles comes integrity!!! 
 


Re: Whitelist_From Woes

2009-05-13 Thread Kevin Parris
Well maybe you should figure out what is going on with these two: RE_PASSWORD 
100.00, RE_PASSWORDV 100.00
since your choice of -100 (it is not a magic pass value, just another factor 
in the arithmetic) for your manual whitelist only counteracts one of them ... 
or run your manual whitelist score to an even larger value.  In other words, 
you are apparently NOT having a problem getting the domain whitelisted - you 
are having a problem fully balancing the effects of spammy-ness elements in 
their mail.

 Michael Lyon mjl...@gmail.com 05/13/09 12:16 PM 
We're using spamassassin 3.1.7 on a slack-10 box, invoked via cron.

I'm having problems getting a domain whitelisted.  Previously, adding
domains to be whitelisted simply meant adding a whitelist_from 
*...@domain.com 
to my /opt/MailScanner/etc/spam.assassin.prefs.conf file.

Now, however, my maillog shows the messages as being marked as spam.
Yesterday, I added a spam.whitelist.rules, which takes -100 down from the
score, but the message is still marked as spam and not delivered:

/var/log/maillog output:

May 13 10:53:46 cerberus MailScanner[3309]: Message n4DFrTip004779 from
63.93.193.30 (a...@easymatch.com) to saintjoe.edu is spam, SpamAssassin (not
cached, score=68.739, required 4, AWL -33.17, BAYES_50 0.00,
FORGED_RCVD_HELO 0.14, HTML_30_40 0.37, HTML_MESSAGE 0.00, NO_REAL_NAME
0.96, RE_PASSWORD 100.00, RE_PASSWORDV 100.00, USER_IN_WHITELIST -100.00,
X_PRIORITY_HIGH 0.43)

SO...I see the USER_IN_WHITELIST -100 score, but it never is delivered...

Thoughts?

Thanks,

Mike



Re: Whitelist_From Woes

2009-05-13 Thread Karsten Bräckelmann
On Wed, 2009-05-13 at 11:16 -0500, Michael Lyon wrote:
 We're using spamassassin 3.1.7 on a slack-10 box, invoked via cron.  

I suggest upgrading. That's quite ancient...

 I'm having problems getting a domain whitelisted.  Previously, adding
 domains to be whitelisted simply meant adding a whitelist_from
 *...@domain.com to my /opt/MailScanner/etc/spam.
 assassin.prefs.conf file.
 
 Now, however, my maillog shows the messages as being marked as spam.
 Yesterday, I added a spam.whitelist.rules, which takes -100 down from
 the score, but the message is still marked as spam and not delivered:
 
 /var/log/maillog output:
 
 May 13 10:53:46 cerberus MailScanner[3309]: Message n4DFrTip004779
 from 63.93.193.30 (a...@easymatch.com) to saintjoe.edu is spam,
 SpamAssassin (not cached, score=68.739, required 4, AWL -33.17,
 BAYES_50 0.00, FORGED_RCVD_HELO 0.14, HTML_30_40 0.37, HTML_MESSAGE
 0.00, NO_REAL_NAME 0.96, RE_PASSWORD 100.00, RE_PASSWORDV 100.00,
 USER_IN_WHITELIST -100.00, X_PRIORITY_HIGH 0.43) 
 
 SO...I see the USER_IN_WHITELIST -100 score, but it never is
 delivered...

As Peter said, your whitelist_from works just as expected. The issue is
with *your* custom password rules, both scoring a whopping 100. So the
solution is to fix these rules.

Some more notes:  It's generally better to use whitelist_from_rcvd if
possible, and use that unconstrained one only as a last resort. Also,
your custom rules' scores are *way* too high, unless you seriously want
them to act as a kill-switch. In that case, they did as the score asked
for.

And of course, after fixing the custom rules, you will need to correct
(or drop) the AWL entry for that address. As you can see, AWL even tried
to rescue the email, lowering the score significantly. However, as one
can see, too, the average already is quite high (due to triggering the
password rules in the past), so that AWL will *add* points next time
(without tripping over your password rules), unless cleaned.

  guenther


-- 
char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: Whitelist_From Woes

2009-05-13 Thread Karsten Bräckelmann
Please always keep threads on-list by replying to list. I am not the
only one, who can help you.


On Wed, 2009-05-13 at 11:57 -0500, Michael Lyon wrote:
 But...how do I remove an autowhitelist entry for just one user?  I
 have a rule that was duplicated and causing me problems (It was to
 prevent the Verify your password scams).

See the options concerning the persistent address list in man
spamassassin-run, in particular --remove-addr-from-whitelist.

 Now, I have just one of the Verify rules...I'd like to keep it at 100
 so as to not ever let them get through, but the auto-whitelist score
 is pushing it back to Spam.

Exactly what I predicted. Thus, remove that address from the AWL
persistent address list database.

 I'd like to not AWL just the one domain if possible.

Not possible. The AWL actually is just a historical score averager. In
your case poisoned for that one address, fed with bad scores due to the
custom password rules going berserk. Just correct that incident.

Also, have a look here.
  http://wiki.apache.org/spamassassin/AutoWhitelist


Apart from that, I strongly suggest revisiting your password rule(s).
Obviously, they are hitting on mail they shouldn't, so they are too
broad. Also, I still suggest lowering that score.

Regarding the whitelisting: You aren't whitelisting your *own* domain,
are you? That's a bad idea. Definitely unless using the variants with
additional constraints, like whitelist_from_rcvd.

  guenther


[ useless full-quote including sig snipped ]

-- 
char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: whitelist_from not working

2008-10-29 Thread Matus UHLAR - fantomas
On 29.10.08 17:18, Nelson Serafica wrote:
 I'm using spamassassin 3.2.5. Now, I must a whitelist_from containing *@
 foo.com in my local.cf.
 
 However, there are still 1 email that has been tagged as spam. 

Only one? show the headers or upload it somewhere..

 In my understanding, if a domain was in whitelist_from, even if it was
 tagged as spam, it will delivered to the recipient.

No, It will have -100 points added, so it should get classified as not spam
(ham). It seems does not work.

 I restart the spamd after I edit
 local.cf so it must take effect.
 
 Is this the right way to whitelist? As I check, when using 3.2.5, this is
 the right way of whitelisting a domain.

-- 
Matus UHLAR - fantomas, [EMAIL PROTECTED] ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Support bacteria - they're the only culture some people have. 


Re: whitelist_from not working

2008-10-29 Thread Benny Pedersen

On Wed, October 29, 2008 10:18, Nelson Serafica wrote:

 Is this the right way to whitelist? As I check, when using 3.2.5, this is
 the right way of whitelisting a domain.

the more i hear about whitelist_from the more i want to make a bug on it,
whitelist_from should imho newer have being implemented

use whitelist_auth, whitelist_from_spf, whitelist_from_dkim, whitelist_from_rcvd

see perldocs how to make this

-- 
Benny Pedersen
Need more webspace ? http://www.servage.net/?coupon=cust37098



Re: whitelist_from not working

2008-10-29 Thread Matt Kettler
Nelson Serafica wrote:
 I'm using spamassassin 3.2.5. http://3.2.5. Now, I must a
 whitelist_from containing [EMAIL PROTECTED] http://foo.com in my local.cf
 http://local.cf.

 However, there are still 1 email that has been tagged as spam. In my
 understanding, if a domain was in whitelist_from, even if it was
 tagged as spam, it will delivered to the recipient.
First, be aware that SpamAssassin itself does not directly cause
messages to be deleted, rejected, or otherwise alter delivery.
SpamAssassin itself *ONLY* tags. The way it inserts itself into the mail
chain is very flexible, but gives SA no direct power over message
delivery, so tagging is the only thing it can possibly do. If it were to
try to delete the message, most mail tools would assume SA had crashed
and recover the original, unscanned message and deliver that.

Therefore, there is nothing in the SpamAssassin configuration that can
cause a message to be delivered even if it is tagged as spam. SA can
only tag, or not tag. whitelist_from causes messages to be hit with a
-100 point rule named USER_IN_WHITELIST. This large negative score makes
it more-or-less impossible for the message to be tagged as spam. Pretty
much the only way to get SA to tag it when matching a whitelist would be
to put a GTUBE test signature into the message.

Your previously posted example was working perfectly, in that the
whitelist configuration caused SA to match USER_IN_WHITELIST, which
generated a hugely negative score, and therefore was not tagged as spam.
That's exactly what it should do.

If you've got something else that deletes mail when SA tags messages,
then that is the tool you'd need to configure if you want the message to
get tagged as spam, but still be delivered. Reconfiguring SA can't
change this, because SA doesn't (and in fact can't) delete the messages.

 I restart the spamd after I edit local.cf http://local.cf so it must
 take effect.

 Is this the right way to whitelist? As I check, when using 3.2.5, this
 is the right way of whitelisting a domain.
whitelist_from is never the right way to do anything. It is horribly
easy to forge. Use whitelist_from_rcvd, or preferably, whitelist in your
tools that call SA, bypassing it entirely and saving CPU time.





Re: whitelist_from not working

2008-10-29 Thread Matt Kettler
Benny Pedersen wrote:
 On Wed, October 29, 2008 10:18, Nelson Serafica wrote:

   
 Is this the right way to whitelist? As I check, when using 3.2.5, this is
 the right way of whitelisting a domain.
 

 the more i hear about whitelist_from the more i want to make a bug on it,
 whitelist_from should imho newer have being implemented
   
Agreed. whitelist_from sucks. However, it's there as a method of
last-resort. There are some messages you can't whitelist in SA using any
other method. (ie: when the sender's server doesn't have reverse DNS).


 use whitelist_auth, whitelist_from_spf, whitelist_from_dkim, 
 whitelist_from_rcvd

 see perldocs how to make this

   
Agreed, and the man Mail::SpamAssassin::Conf section on whitelist_from
(which should have been read in the first place) will tell you the same.




Re: whitelist_from not working

2008-10-29 Thread Henrik K
On Wed, Oct 29, 2008 at 08:24:25AM -0400, Matt Kettler wrote:

 There are some messages you can't whitelist in SA using any other method.
 (ie: when the sender's server doesn't have reverse DNS).

You can use trusted_networks + ALL_TRUSTED to whitelist. Given of course
that there aren't any dynamic IPs in the path.



Re: whitelist_from not working

2008-10-29 Thread Jeff Mincy
   From: Matt Kettler [EMAIL PROTECTED]
   Date: Wed, 29 Oct 2008 08:24:25 -0400
   
   Benny Pedersen wrote:
On Wed, October 29, 2008 10:18, Nelson Serafica wrote:
   
  
Is this the right way to whitelist? As I check, when using 3.2.5, this is
the right way of whitelisting a domain.

   
the more i hear about whitelist_from the more i want to make a bug on it,
whitelist_from should imho newer have being implemented
  
   Agreed. whitelist_from sucks. However, it's there as a method of
   last-resort. There are some messages you can't whitelist in SA using any
   other method. (ie: when the sender's server doesn't have reverse DNS).
   
Since whitelist_from is spoofable wouldn't it make sense to have
different scores assigned to whitelist_from and whitelist_from_rcvd?
Right now if an email is in either you get a hit on USER_IN_WHITELIST,
which is scored at a -100 by default.  So split out
USER_IN_RCVD_WHITELIST hits from USER_IN_WHITELIST.

-jeff


Re: whitelist_from not working

2008-10-29 Thread Greg Troxel

Jeff Mincy [EMAIL PROTECTED] writes:

Agreed. whitelist_from sucks. However, it's there as a method of
last-resort. There are some messages you can't whitelist in SA using any
other method. (ie: when the sender's server doesn't have reverse DNS).

 Since whitelist_from is spoofable wouldn't it make sense to have
 different scores assigned to whitelist_from and whitelist_from_rcvd?
 Right now if an email is in either you get a hit on USER_IN_WHITELIST,
 which is scored at a -100 by default.  So split out
 USER_IN_RCVD_WHITELIST hits from USER_IN_WHITELIST.

I use whitelist_from to be sure I whitelist mail from some people (not
part of my organization).  For those addreses, it's better to get FN on
spam than a single FP.  I don't know what IP addresses they use, and
they keep changing.  So the 'better' whitelist rules won't work.

I have sometimes wanted a way to give a per-rule score for whitelist
entries, instead of a fixed -100.  But not enough to implement it :-)




pgplJGqhwfxdz.pgp
Description: PGP signature


Re: whitelist_from not working

2008-10-29 Thread John Hardin

On Wed, 29 Oct 2008, Matt Kettler wrote:


Benny Pedersen wrote:


the more i hear about whitelist_from the more i want to make a bug on it,
whitelist_from should imho newer have being implemented


Agreed. whitelist_from sucks. However, it's there as a method of 
last-resort. There are some messages you can't whitelist in SA using any 
other method. (ie: when the sender's server doesn't have reverse DNS).


I'm going to suggest again that, given how much pain it causes noobs, 
perhaps the use of whitelist_from should generate a lint _warning_ that it 
should only be used if no other whitelist method will work...


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  ...the Fates notice those who buy chainsaws...
  -- www.darwinawards.com
---
 2 days until Halloween


Re: whitelist_from not working

2008-10-29 Thread Karsten Bräckelmann
On Wed, 2008-10-29 at 07:52 -0700, John Hardin wrote:
 I'm going to suggest again that, given how much pain it causes noobs, 
 perhaps the use of whitelist_from should generate a lint _warning_ that it 
 should only be used if no other whitelist method will work...

The thing with noobs and whitelist_from (according to my experience on
this list) appears to be a lack of reading. I got the impression most of
them just blindly whitelist_from their own domain to be on the safe
side, without any prior investigation and usually without any need.

I believe some of the recent threads like this clearly showed that SA
has been set up right before that, for the first time, and this is kind
of the very first customization...

  guenther


-- 
char *t=[EMAIL PROTECTED];
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: whitelist_from not working

2008-10-29 Thread John Hardin

On Wed, 29 Oct 2008, Karsten Br?ckelmann wrote:


On Wed, 2008-10-29 at 07:52 -0700, John Hardin wrote:

I'm going to suggest again that, given how much pain it causes noobs,
perhaps the use of whitelist_from should generate a lint _warning_ that it
should only be used if no other whitelist method will work...


The thing with noobs and whitelist_from (according to my experience on 
this list) appears to be a lack of reading. I got the impression most of 
them just blindly whitelist_from their own domain to be on the safe 
side, without any prior investigation and usually without any need.


Agreed, and if they aren't reading the documentation carefully enough to 
see the warnings about using whitelist_from, then they probably aren't 
running a lint either...


However, if emitting a warning in lint saves having some why are spams 
hitting USER_IN_WHITELIST?? messages sent to the list, it's probably 
worth doing.


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]FALaholic #11174 pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  ...the Fates notice those who buy chainsaws...
  -- www.darwinawards.com
---
 2 days until Halloween

Re: whitelist_from not working

2008-10-29 Thread Karsten Bräckelmann
On Wed, 2008-10-29 at 11:15 -0700, John Hardin wrote:
 On Wed, 29 Oct 2008, Karsten Bräckelmann wrote:

  The thing with noobs and whitelist_from (according to my experience on 
  this list) appears to be a lack of reading. I got the impression most of 
  them just blindly whitelist_from their own domain to be on the safe 
  side, without any prior investigation and usually without any need.
 
 Agreed, and if they aren't reading the documentation carefully enough to 
 see the warnings about using whitelist_from, then they probably aren't 
 running a lint either...
 
 However, if emitting a warning in lint saves having some why are spams 
 hitting USER_IN_WHITELIST?? messages sent to the list, it's probably 
 worth doing.

I'm not convinced this would help much, for the reason you mention in
your first paragraph. ;)  Also, this would be rather annoying for those
who use it legitimately [1] and know what they are doing.

What I am really wondering about is, *why* they set it in the first
place, and where they found out about this, without actually reading
much documentation.


The funny thing is, that quite a lot of the recent threads regarding
whitelist_from are not asking about spam slipping through, but the
opposite -- they are claiming that whitelisting does *not* work, despite
the setting.

  guenther


[1] Meh, this one was exceptionally hard to spell correctly. ;)

-- 
char *t=[EMAIL PROTECTED];
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: whitelist_from not working

2008-10-29 Thread Matus UHLAR - fantomas
 On Wed, 2008-10-29 at 07:52 -0700, John Hardin wrote:
 I'm going to suggest again that, given how much pain it causes noobs,
 perhaps the use of whitelist_from should generate a lint _warning_ that it
 should only be used if no other whitelist method will work...

 On Wed, 29 Oct 2008, Karsten Br�ckelmann wrote:
 The thing with noobs and whitelist_from (according to my experience on 
 this list) appears to be a lack of reading. I got the impression most of 
 them just blindly whitelist_from their own domain to be on the safe 
 side, without any prior investigation and usually without any need.

On 29.10.08 11:15, John Hardin wrote:
 Agreed, and if they aren't reading the documentation carefully enough to 
 see the warnings about using whitelist_from, then they probably aren't 
 running a lint either...
 
 However, if emitting a warning in lint saves having some why are spams 
 hitting USER_IN_WHITELIST?? messages sent to the list, it's probably 
 worth doing.

Actually, it's completely safe to whitelist some domains, if your MTA does
the SPF check for you, and you expect no fails to pass fotr those domains...

-- 
Matus UHLAR - fantomas, [EMAIL PROTECTED] ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
There's a long-standing bug relating to the x86 architecture that
allows you to install Windows.   -- Matthew D. Fuller


Re: Whitelist_from dont work at all

2008-10-23 Thread Evan Platt

mathiasadsl wrote:

Hi,

I'm trying hard to make my whitelist_from work.
I want to whitelist my own domain (i know... it can be dangerous but it's
for testing purpose).

This is an example of unormaly tagged email:
  

unormaly ?

If you're trying to say your example isn't being whitelisted... It is.

X-Spam-Status: No, score=-96.7 required=5.0 
tests=AWL,DNS_FROM_SECURITYSAGE,  
DRUGS_STOCK_MIMEOLE,HTML_MESSAGE,RDNS_NONE,

USER_IN_WHITELIST

It scored -96.7.

Where's the problem?


Re: Whitelist_from dont work at all

2008-10-23 Thread Karsten Bräckelmann
On Thu, 2008-10-23 at 10:27 -0700, mathiasadsl wrote:
 I'm trying hard to make my whitelist_from work.
 I want to whitelist my own domain (i know... it can be dangerous but it's
 for testing purpose).

Yes, for production you should use whitelist_from_rcvd instead, if there
is a need for white-listing at all. Spammers like to pretend they are
you.
  http://wiki.apache.org/spamassassin/WhitelistingEverybody

Also have a look here:
  
http://spamassassin.apache.org/full/3.2.x/doc/Mail_SpamAssassin_Conf.html#whitelist_and_blacklist_options


 This is my local.cf :
 # These values can be overridden by editing ~/.spamassassin/user_prefs.cf
  ^
It's user_prefs actually.

 # (see spamassassin(1) for details)
 # These should be safe assumptions and allow for simple visual sifting
 # without risking lost emails.
 
 required_hits 5
 report_safe 0
 rewrite_header subject [SPAM]
 
 report_safe 0
 header DAEMON Subject =~ /DAEMON/
 score DAEMON 5
 whitelist_from [EMAIL PROTECTED]
 whitelist_from [EMAIL PROTECTED]
 whitelist_from *.lnxgw.group-riget.com


 I forward (througt postfix, every SPAM tagged email in a specific mailbox
 spambox, it's working perfecly). 

Looks like it doesn't. :)  Rather than filtering based on the Subject,
I'd use a more reliable header added by SpamAssassin.


 This is an example of unormaly tagged email:
 
 Return-Path: [EMAIL PROTECTED]
 X-Spam-Checker-Version: SpamAssassin 3.2.3 (2007-08-08) on
  lnxgw.group-riget.com
 X-Spam-Level:
 X-Spam-Status: No, score=-96.7 required=5.0 tests=AWL,DNS_FROM_SECURITYSAGE,
^
That RBL is in-operational for a while. They list the universe so that
people stop querying their zones. You'll get that hit for each and every
message.

Since you're using 3.2.3, this tells me you are not using sa-update.
This rule has been removed. I strongly suggest you update your rules.
  http://wiki.apache.org/spamassassin/RuleUpdates

  DRUGS_STOCK_MIMEOLE,HTML_MESSAGE,RDNS_NONE,USER_IN_WHITELIST autolearn=no
  ^
Obviously, your whitelist_from setting DOES work.

  version=3.2.3
 X-Original-To: [EMAIL PROTECTED]
 Delivered-To: [EMAIL PROTECTED]
 Received: from pc1469 (unknown [192.9.203.23])
  by lnxgw.group-riget.com (Postfix) with ESMTP id 8F835DA4997
  for [EMAIL PROTECTED]; Thu, 23 Oct 2008 10:49:16
 +0200 (CEST)
 From: Slicra [EMAIL PROTECTED]
 To: 'Jerome claveyrolas' [EMAIL PROTECTED]
 Subject: TR: [SPAM] Devis

 What's wrong with my whitelist
 Even if i add only one address ([EMAIL PROTECTED]), spamassassin tag it!

Hmm, no -- I don't use that ghastly Subject munging, but I am rather
positive that the above is NOT done by YOUR SpamAssassin. Have a look at
the Subject header. The tag is pre-pended by some strange TR:. This
has not been added by your SpamAssassin.

  guenther


-- 
char *t=[EMAIL PROTECTED];
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: whitelist_from/whitelist_auth and custom score

2008-07-04 Thread Helmut Schneider

On Wed, 2008-07-02 at 11:12 +0200, Helmut Schneider wrote:
I would like to do some whitelisting for an external mailing list. I 
found
whitelist_from and whitelist_auth but they automatically score -100. 
Is

there a way to use whitelist_* or something similiar with a custom score?


amavisd-new provides soft-whitelisting where you can put in a custom
score per recipient.

I changed the default score for one of my whitelists:
score USER_IN_SPF_WHITELIST -10.000


Seems I have to use whitelist_to, does it check To:, or envelope-to:? 





Re: whitelist_from/whitelist_auth and custom score

2008-07-02 Thread McDonald, Dan
On Wed, 2008-07-02 at 11:12 +0200, Helmut Schneider wrote:
 Hi,
 
 I would like to do some whitelisting for an external mailing list. I found 
 whitelist_from and whitelist_auth but they automatically score -100. Is 
 there a way to use whitelist_* or something similiar with a custom score?

amavisd-new provides soft-whitelisting where you can put in a custom
score per recipient.

I changed the default score for one of my whitelists:
score USER_IN_SPF_WHITELIST -10.000

The default whitelist scores are found in 50_scores:
$ grep WHITELIST 
/var/lib/spamassassin/3.002004/updates_spamassassin_org/50_scores.cf 
score USER_IN_WHITELIST -100.000
score USER_IN_DEF_WHITELIST -15.000
score USER_IN_WHITELIST_TO -6.000
score SUBJECT_IN_WHITELIST -100
score USER_IN_DKIM_WHITELIST -100.000
score USER_IN_DK_WHITELIST -100.000
score USER_IN_SPF_WHITELIST -100.000

-- 
Daniel J McDonald, CCIE #2495, CISSP #78281, CNX
Austin Energy
http://www.austinenergy.com



signature.asc
Description: This is a digitally signed message part


Re: whitelist_from/whitelist_auth and custom score

2008-07-02 Thread Matus UHLAR - fantomas
On 02.07.08 11:12, Helmut Schneider wrote:
 I would like to do some whitelisting for an external mailing list. I found 
 whitelist_from and whitelist_auth but they automatically score -100. Is 
 there a way to use whitelist_* or something similiar with a custom score?

you can use def_whitelist_* or create custom score for the list...
-- 
Matus UHLAR - fantomas, [EMAIL PROTECTED] ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Saving Private Ryan...
Private Ryan exists. Overwrite? (Y/N)


Re: whitelist_from question

2007-09-02 Thread Matt Kettler
Leonardo Rodrigues Magalhães wrote:

Would it be possible to make some changes and having whitelist_from
 to NOT consider the From header ???
Sure, but you'll have to rewrite some of the code to do it, or make your
own plugin.

. ie: no, there's no default support for this kind of thing, you'd have
to make your own.



Re: whitelist_from with multiple recips not firing?

2007-07-20 Thread Matthew Yette
 Daryl C. W. O'Shea [EMAIL PROTECTED] 7/19/2007 4:51 PM 
You would have to get the calling software to pass as the username 
either (i) something like @example.com; or (ii) a non-existent account 
at the domain.

Get it to do that and you'll see the results you want.  SA will be happy 
with it... I do the same in my own milter.
Oddly enough, global and domain-wide preferences apply just fine. For example, 
a message addressed to [EMAIL PROTECTED] from [EMAIL PROTECTED] will be 
whitelisted if the username domain.com contains a whitelist_from [EMAIL 
PROTECTED] So there's the domain-wide setting. Same goes for the global as 
well. It only ignores the site-wide preference (and user-specific, for that 
matter) when an incoming message has multiple recipients. It still uses the 
global, however, and that's how I've been able to get around this problem thus 
far, even though I'd rather not kludge it like that. 
 
I am using qmail-scanner 1.25st. Do you think its related to how q-s calls SA 
and how it breaks out multi-recipient messages to the scanner?

¤#/srv/gw/mvndom/wptemp/43ccc243.qm8


[Solution] Re: whitelist_from with multiple recips not firing?

2007-07-20 Thread Matthew Yette


 Matthew Yette [EMAIL PROTECTED] 7/20/2007 8:24 AM 
 Daryl C. W. O'Shea [EMAIL PROTECTED] 7/19/2007 4:51 PM 
You would have to get the calling software to pass as the username 
either (i) something like @example.com; or (ii) a non-existent account 
at the domain.

Get it to do that and you'll see the results you want.  SA will be happy 
with it... I do the same in my own milter.
 
 
Twas a qmail-scanner setting. 

# st: Enable or diasable scanner per domain (1/0)
my $settings_pd='1';
 
Need to make sure that's set to 1. Then run qmail-scanner-queue.pl -p
 
Thanks gang!

¤#/srv/gw/mvndom/wptemp/43ccc243.qm8


Re: whitelist_from with multiple recips not firing?

2007-07-19 Thread Matthew Yette
 Matthew Yette [EMAIL PROTECTED] 7/19/2007 2:13 PM 
I am using SA 3.2.0 using SQL backend userprefs. There is a sending address 
that is whitelisted for an entire domain, as well as specific users on that 
domain. However, on the messages that come in from this whitelisted address for 
multiple recipients (in this case 2), the USER_IN_WHITELIST rule does not fire, 
and the message gets hit as spam. Is there something special that needs to be 
done to have it apply to multiple-recipient messages? This is my custom SQL 
userprefs query:
 
SELECT preference, value FROM _TABLE_ WHERE username = _USERNAME_ OR username = 
'@GLOBAL' OR username = _DOMAIN_ ORDER BY username ASC
 
Thanks!
 
 
Matt Yette
---
 
One other point - in my SQL prefs database, I am only using domain.com as the 
username for domain-wide preferences, and not %domain.com and SELECT 
preference, value FROM _TABLE_ WHERE username = _USERNAME_ OR username = 
'@GLOBAL' OR username = CONCAT('%',_DOMAIN_) ORDER BY username ASC as Dallas 
calls for in his SQL docs. Would this have a negative impact in terms of 
applying rules on multiple-recipient mail?
 ( mailto:[EMAIL PROTECTED] )


CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is for 
the sole use of the intended recipients(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient(s), please 
contact the sender by return e-mail and destroy all copies of the original 
message. Thank you. 
¤#/srv/gw/mvndom/wptemp/43ccc243.qm8


Re: whitelist_from with multiple recips not firing?

2007-07-19 Thread Matthew Yette
After further testing, it most definitely has to do with a message hacing 
multiple recipients (I've tried changing around my custom SQL query to no 
avail). qmail-queue.log log entry w/ debug on:
 
Thu, 19 Jul 2007 15:10:20 EDT:16677: g_e_h: return-path is [EMAIL PROTECTED], 
recips is [EMAIL PROTECTED],[EMAIL PROTECTED]
Thu, 19 Jul 2007 15:10:20 EDT:16677: from=Matthew Yette [EMAIL 
PROTECTED],subj=test ( mailto:[EMAIL PROTECTED] ), 
x-qmail-scanner-message-id=[EMAIL PROTECTED] via SMTP from 64.9.116.126
Thu, 19 Jul 2007 15:10:20 EDT:16677: ini_sc: start scanning
Thu, 19 Jul 2007 15:10:20 EDT:16677: ini_sc: recursively scan the directory 
/var/spool/qmailscan/tmp/mail.integrityhosting.org118487221972216677/
Thu, 19 Jul 2007 15:10:20 EDT:16677: scanloop: starting scan of directory 
/var/spool/qmailscan/tmp/mail.integrityhosting.org118487221972216677...
Thu, 19 Jul 2007 15:10:20 EDT:16677: scanloop: 
scanner=spamassassin,plain_text_msg=0
Thu, 19 Jul 2007 15:10:20 EDT:16677: SA: REPORT hits = -2.6/4.0
 -2.6 BAYES_00   BODY: Bayesian spam probability is 0 to 1%
 [score: 0.]
  0.0 HTML_MESSAGE   BODY: HTML included in message
Thu, 19 Jul 2007 15:10:20 EDT:16677: SA: required_hits 4.0 / sa_quarantine +0 / 
sa_delete +0.9
Thu, 19 Jul 2007 15:10:20 EDT:16677: SA: finished scan of dir 
/var/spool/qmailscan/tmp/mail.integrityhosting.org118487221972216677 in 0.715 
secs - hits=-2.6/4.0
 
As you can see, recips is [EMAIL PROTECTED],[EMAIL PROTECTED] and 
USER_IN_WHITELIST does NOT fire, even though it's in my SQL database as 
username = mattyette.com, preference is whitelist_from and value is [EMAIL 
PROTECTED] 
 
This has to be something that's cropped up before, I'm hoping it's a quick and 
easy solution. :)
 
Thanks again,
 
Matt

 Matthew Yette [EMAIL PROTECTED] 7/19/2007 2:24 PM 
 Matthew Yette [EMAIL PROTECTED] 7/19/2007 2:13 PM 
I am using SA 3.2.0 using SQL backend userprefs. There is a sending address 
that is whitelisted for an entire domain, as well as specific users on that 
domain. However, on the messages that come in from this whitelisted address for 
multiple recipients (in this case 2), the USER_IN_WHITELIST rule does not fire, 
and the message gets hit as spam. Is there something special that needs to be 
done to have it apply to multiple-recipient messages? This is my custom SQL 
userprefs query:
 
SELECT preference, value FROM _TABLE_ WHERE username = _USERNAME_ OR username = 
'@GLOBAL' OR username = _DOMAIN_ ORDER BY username ASC
 
Thanks!
 
 
Matt Yette
---
 
One other point - in my SQL prefs database, I am only using domain.com as the 
username for domain-wide preferences, and not %domain.com and SELECT 
preference, value FROM _TABLE_ WHERE username = _USERNAME_ OR username = 
'@GLOBAL' OR username = CONCAT('%',_DOMAIN_) ORDER BY username ASC as Dallas 
calls for in his SQL docs. Would this have a negative impact in terms of 
applying rules on multiple-recipient mail?
 ( mailto:[EMAIL PROTECTED] )


CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is for 
the sole use of the intended recipients(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient(s), please 
contact the sender by return e-mail and destroy all copies of the original 
message. Thank you. 

CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is for 
the sole use of the intended recipients(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient(s), please 
contact the sender by return e-mail and destroy all copies of the original 
message. Thank you. 
¤#/srv/gw/mvndom/wptemp/43ccc243.qm8


Re: whitelist_from with multiple recips not firing?

2007-07-19 Thread Duane Hill

On Thu, 19 Jul 2007 at 15:14 -0400, [EMAIL PROTECTED] confabulated:


After further testing, it most definitely has to do with a message hacing 
multiple recipients (I've tried changing around my custom SQL query to no 
avail). qmail-queue.log log entry w/ debug on:

Thu, 19 Jul 2007 15:10:20 EDT:16677: g_e_h: return-path is [EMAIL PROTECTED], recips is 
[EMAIL PROTECTED],[EMAIL PROTECTED]
Thu, 19 Jul 2007 15:10:20 EDT:16677: from=Matthew Yette [EMAIL PROTECTED],subj=test 
( mailto:[EMAIL PROTECTED] ), x-qmail-scanner-message-id=[EMAIL PROTECTED] via SMTP from 
64.9.116.126
Thu, 19 Jul 2007 15:10:20 EDT:16677: ini_sc: start scanning
Thu, 19 Jul 2007 15:10:20 EDT:16677: ini_sc: recursively scan the directory 
/var/spool/qmailscan/tmp/mail.integrityhosting.org118487221972216677/
Thu, 19 Jul 2007 15:10:20 EDT:16677: scanloop: starting scan of directory 
/var/spool/qmailscan/tmp/mail.integrityhosting.org118487221972216677...
Thu, 19 Jul 2007 15:10:20 EDT:16677: scanloop: 
scanner=spamassassin,plain_text_msg=0
Thu, 19 Jul 2007 15:10:20 EDT:16677: SA: REPORT hits = -2.6/4.0
-2.6 BAYES_00   BODY: Bayesian spam probability is 0 to 1%
[score: 0.]
 0.0 HTML_MESSAGE   BODY: HTML included in message
Thu, 19 Jul 2007 15:10:20 EDT:16677: SA: required_hits 4.0 / sa_quarantine +0 / 
sa_delete +0.9
Thu, 19 Jul 2007 15:10:20 EDT:16677: SA: finished scan of dir 
/var/spool/qmailscan/tmp/mail.integrityhosting.org118487221972216677 in 0.715 
secs - hits=-2.6/4.0

As you can see, recips is [EMAIL PROTECTED],[EMAIL PROTECTED] and 
USER_IN_WHITELIST does NOT fire, even though it's in my SQL database as username = 
mattyette.com, preference is whitelist_from and value is [EMAIL PROTECTED]

This has to be something that's cropped up before, I'm hoping it's a quick and 
easy solution. :)


I don't know that SA has a way for running messages through for each 
individual recipient. I don't believe you can specify multiple username 
paramenters using spamc and/or spamassassin.


Here we use Postfix and I instruct Postfix to send the message through SA 
for each recipient. It works like a charm. Perhaps whatever you are using 
in qmail can do the same.


---
  _|_
 (_| |


Re: whitelist_from with multiple recips not firing?

2007-07-19 Thread Matthew Yette
I don't know that SA has a way for running messages through for each 
individual recipient. I don't believe you can specify multiple username 
paramenters using spamc and/or spamassassin.

Here we use Postfix and I instruct Postfix to send the message through SA 
for each recipient. It works like a charm. Perhaps whatever you are using 
in qmail can do the same.

Thanks for the response, Duane. I would think that, even if SA has trouble 
dealing w/ pulling rules on messages w/ multiple recips, it would at least grab 
a domain-wide value?
¤#/srv/gw/mvndom/wptemp/43ccc243.qm8


Re: whitelist_from with multiple recips not firing?

2007-07-19 Thread Duane Hill

On Thu, 19 Jul 2007 at 15:44 -0400, [EMAIL PROTECTED] confabulated:


I don't know that SA has a way for running messages through for each
individual recipient. I don't believe you can specify multiple username
paramenters using spamc and/or spamassassin.



Here we use Postfix and I instruct Postfix to send the message through SA
for each recipient. It works like a charm. Perhaps whatever you are using
in qmail can do the same.


Thanks for the response, Duane. I would think that, even if SA has trouble 
dealing w/ pulling rules on messages w/ multiple recips, it would at least grab 
a domain-wide value?


Someone would have to correct me if I'm wrong. I believe SA, without any 
extraneous development, can operate as site-wide or at the user level. 
Operating as site-wide eliminates the ability at the domain and user 
levels. Operating at the user level, you can have domain wide rules. This 
also means the message is either going into its final route to the 
individual recipient (SA being executed within a proc mail or something 
similar within that account), or the message is being fed into SA for each 
recipient from the MTA or other source.


As I stated before, I can tell Postfix to feed the message through one 
recipient at a time and can use:


  /usr/local/bin/spamc -u ${recipient}

to tell spamc what user it will run as. Then, the SQL query works like it 
should. I have multiple global, domain and user settings in our user level 
set up.


---
  _|_
 (_| |


Re: whitelist_from with multiple recips not firing?

2007-07-19 Thread Daryl C. W. O'Shea

Matthew Yette wrote:

 I don't know that SA has a way for running messages through for each
 individual recipient. I don't believe you can specify multiple username
 paramenters using spamc and/or spamassassin.

 Here we use Postfix and I instruct Postfix to send the message through SA
 for each recipient. It works like a charm. Perhaps whatever you are using
 in qmail can do the same.

Thanks for the response, Duane. I would think that, even if SA has 
trouble dealing w/ pulling rules on messages w/ multiple recips, it 
would at least grab a domain-wide value?


You would have to get the calling software to pass as the username 
either (i) something like @example.com; or (ii) a non-existent account 
at the domain.


Get it to do that and you'll see the results you want.  SA will be happy 
with it... I do the same in my own milter.



Daryl


Re: whitelist_from with multiple recips not firing?

2007-07-19 Thread SM

At 13:43 19-07-2007, Duane Hill wrote:
As I stated before, I can tell Postfix to feed the message through 
one recipient at a time and can use:


  /usr/local/bin/spamc -u ${recipient}

to tell spamc what user it will run as. Then, the SQL query works 
like it should. I have multiple global, domain and user settings in 
our user level set up.


For a site-wide setup you would be scanning the same message multiple 
times.  How about using the domain part of the address for 
scanning?  Once you get the score, determine the score threshold for 
each of the recipients and deliver or reject as appropriate.  From a 
SMTP perspective, it would be accept or reject all though.


Regards,
-sm






Re: whitelist_from with multiple recips not firing?

2007-07-19 Thread Duane Hill

On Thu, 19 Jul 2007 at 15:19 -0700, [EMAIL PROTECTED] confabulated:


At 13:43 19-07-2007, Duane Hill wrote:
As I stated before, I can tell Postfix to feed the message through one 
recipient at a time and can use:


  /usr/local/bin/spamc -u ${recipient}

to tell spamc what user it will run as. Then, the SQL query works like it 
should. I have multiple global, domain and user settings in our user level 
set up.


For a site-wide setup you would be scanning the same message multiple times. 
How about using the domain part of the address for scanning?  Once you get 
the score, determine the score threshold for each of the recipients and 
deliver or reject as appropriate.  From a SMTP perspective, it would be 
accept or reject all though.


If I wanted a site-wide setup, I would just remove the recipient 
restriction and the username switch and let spamc use the default username 
of 'spamd'.


---
  _|_
 (_| |


Re: whitelist_from ip_range

2007-04-19 Thread Philip Prindeville
Benny Pedersen wrote:
 On Tue, April 17, 2007 01:57, Duane Hill wrote:

   
 http://wiki.apache.org/spamassassin/TrustPath
 

 to me a bit hardcore to read, but it have all ip that is known forwards mails
 to me as trusted_networks even if its still not my servers, and have maked the
 complete rfc1918 in trusted_networks and internal_networks added to this i
 have my own wan ip's in both

 should be it :-)

 trusted_networks 10.0.0.0/8
 trusted_networks 172.16.0.0/12
 trusted_networks 192.168.0.0/16
 trusted_networks 127.0.0.0/8

 internal_networks 10.0.0.0/8
 internal_networks 172.16.0.0/12
 internal_networks 192.168.0.0/16
 internal_networks 127.0.0.0/8

 and last my wan ips as trusted_networks and internal_networks

 after this all known forward ips as trusted_networks
   

Given the number of ISP's that don't have rDNS configured,
whitelist_from_rcvd should probably be extended to support
IP/CIDR addresses as well...

Let's not overload the meanings of trusted_networks and
internal_networks.  These latter two are already confusing
enough for most newbies without having them take on
additional unintended meanings.

-Philip



Re: whitelist_from ip_range

2007-04-19 Thread Benny Pedersen

On Thu, April 19, 2007 21:20, Philip Prindeville wrote:

 Given the number of ISP's that don't have rDNS configured,

i reject them, atleast spf can help them

 whitelist_from_rcvd should probably be extended to support
 IP/CIDR addresses as well...

why not spf ?

 Let's not overload the meanings of trusted_networks and
 internal_networks. These latter two are already confusing
 enough for most newbies without having them take on
 additional unintended meanings.

there can be better ways of deailing with it yes, so far i have not seen side
effects of managed trusted_networks and or internal_networks that works

-- 
This message was sent using 100% recycled spam mails.



Re: whitelist_from ip_range

2007-04-17 Thread Benny Pedersen

On Tue, April 17, 2007 01:57, Duane Hill wrote:

 http://wiki.apache.org/spamassassin/TrustPath

to me a bit hardcore to read, but it have all ip that is known forwards mails
to me as trusted_networks even if its still not my servers, and have maked the
complete rfc1918 in trusted_networks and internal_networks added to this i
have my own wan ip's in both

should be it :-)

trusted_networks 10.0.0.0/8
trusted_networks 172.16.0.0/12
trusted_networks 192.168.0.0/16
trusted_networks 127.0.0.0/8

internal_networks 10.0.0.0/8
internal_networks 172.16.0.0/12
internal_networks 192.168.0.0/16
internal_networks 127.0.0.0/8

and last my wan ips as trusted_networks and internal_networks

after this all known forward ips as trusted_networks

-- 
This message was sent using 100% recycled spam mails.



Re: whitelist_from ip_range

2007-04-17 Thread Benny Pedersen

On Tue, April 17, 2007 01:26, Kelson wrote:

 That won't do what you think. trusted_networks is for IPs that you
 trust to provide honest header information, not IPs that you trust not
 to send spam.

correct, all my known forwarders pass spam when user want to have it forwarded

-- 
This message was sent using 100% recycled spam mails.



Re: whitelist_from ip_range

2007-04-16 Thread Kelson

Benny Pedersen wrote:

On Sat, April 14, 2007 10:31, Wael Shahin wrote:


whitelist_from 172.16.0.0/16


trusted_networks 172.16.0.0/16

whitelist_from is for email not for ip :-)


That won't do what you think.  trusted_networks is for IPs that you 
trust to provide honest header information, not IPs that you trust not 
to send spam.


--
Kelson Vibber
SpeedGate Communications www.speed.net


Re: whitelist_from ip_range

2007-04-16 Thread Duane Hill

On Mon, 16 Apr 2007, Kelson wrote:


Benny Pedersen wrote:

On Sat, April 14, 2007 10:31, Wael Shahin wrote:


whitelist_from 172.16.0.0/16


trusted_networks 172.16.0.0/16

whitelist_from is for email not for ip :-)


That won't do what you think.  trusted_networks is for IPs that you trust to 
provide honest header information, not IPs that you trust not to send spam.


A more concise definition from the wiki:

http://wiki.apache.org/spamassassin/TrustPath

Trusted Networks

Generally you want trusted_networks set to contain all the mailservers
you control that add Received: headers, and nothing else.

Internal Networks

Set 'internal_networks' to include the hosts that act as MX for your
domains, or that may deliver mail internally in your organisation.

Set 'trusted_networks' to include the same hosts and networks as
'internal_networks', with the addition of some hosts that are
external to your organisation which you trust to not be under the
control of spammers. For example, very high-volume mail relays at
other ISPs, or mailing list servers. Note that it doesn't matter if
the server relays spam to you from other hosts; that still means you
trust the server not to originate spam, which is what
'trusted_networks' specifies.


Re: whitelist_from ip_range

2007-04-14 Thread Benny Pedersen

On Sat, April 14, 2007 10:31, Wael Shahin wrote:

 whitelist_from 172.16.0.0/16

trusted_networks 172.16.0.0/16

whitelist_from is for email not for ip :-)

-- 
This message was sent using 100% recycled spam mails.



Re: whitelist_from ip_range

2007-04-14 Thread Wael Shahin

Opps,
looks like i totally messed up

thaks Benny
- Original Message - 
From: Benny Pedersen [EMAIL PROTECTED]

To: [EMAIL PROTECTED]
Sent: Saturday, April 14, 2007 1:17 PM
Subject: Re: whitelist_from ip_range




On Sat, April 14, 2007 10:31, Wael Shahin wrote:


whitelist_from 172.16.0.0/16


trusted_networks 172.16.0.0/16

whitelist_from is for email not for ip :-)

--
This message was sent using 100% recycled spam mails.



Re: whitelist_from and whitelist_from_rcvd not working

2006-12-08 Thread Mark Adams
Hi Thanks for your mail,


On Mon, Dec 04, 2006 at 02:58:56PM -0500, Robert Swan wrote:
 
 I had a similar problem with SA not reading a specific .cf file. I
 basically created a new greylist.cf file and copied the test over and it
 worked, and of coarse make sure it is in the right folder... Might be
 worth a try
 

I have done this, but the issue is still occurring. Has anyone else seen
this or have any suggestions?

 
 
 Robert
  
  


Regards,
Mark

  
  
  
 Peace he would say instead of goodbyepeace my brother.
 
 -Original Message-
 From: Mark Adams [mailto:[EMAIL PROTECTED] 
 Sent: Monday, December 04, 2006 12:56 PM
 To: [EMAIL PROTECTED]
 Cc: users@spamassassin.apache.org
 Subject: Re: whitelist_from and whitelist_from_rcvd not working
 
 On Sun, Dec 03, 2006 at 05:55:24PM +0100, mouss wrote:
  Mark Adams wrote:
  Hi All,
  
  Spamassassin 3.1.4-1
  
  Currently have entries like the following in the local.cf file
  
  whitelist_from [EMAIL PROTECTED]
  and
  whitelist_from [EMAIL PROTECTED]
  
  But mail is still picked up as spam for the [EMAIL PROTECTED]
  
  Have also tried the following;
  
  whitelist_from_rcvd [EMAIL PROTECTED] domain.com
  and
  whitelist_from_rcvd [EMAIL PROTECTED] domain.com
  
  But nothing seems to work? has anyone got any advice on this?

  
  do you have
  
 always_trust_envelope_sender 1
  
  ?
 
 
 No I don't have this setting
  


RE: whitelist_from and whitelist_from_rcvd not working

2006-12-04 Thread Robert Swan

I had a similar problem with SA not reading a specific .cf file. I
basically created a new greylist.cf file and copied the test over and it
worked, and of coarse make sure it is in the right folder... Might be
worth a try



Robert
 
 
 
 
 
 
Peace he would say instead of goodbyepeace my brother.

-Original Message-
From: Mark Adams [mailto:[EMAIL PROTECTED] 
Sent: Monday, December 04, 2006 12:56 PM
To: [EMAIL PROTECTED]
Cc: users@spamassassin.apache.org
Subject: Re: whitelist_from and whitelist_from_rcvd not working

On Sun, Dec 03, 2006 at 05:55:24PM +0100, mouss wrote:
 Mark Adams wrote:
 Hi All,
 
 Spamassassin 3.1.4-1
 
 Currently have entries like the following in the local.cf file
 
 whitelist_from [EMAIL PROTECTED]
 and
 whitelist_from [EMAIL PROTECTED]
 
 But mail is still picked up as spam for the [EMAIL PROTECTED]
 
 Have also tried the following;
 
 whitelist_from_rcvd [EMAIL PROTECTED] domain.com
 and
 whitelist_from_rcvd [EMAIL PROTECTED] domain.com
 
 But nothing seems to work? has anyone got any advice on this?
   
 
 do you have
 
always_trust_envelope_sender 1
 
 ?


No I don't have this setting
 


Re: whitelist_from and whitelist_from_rcvd not working

2006-12-03 Thread mouss

Mark Adams wrote:

Hi All,

Spamassassin 3.1.4-1

Currently have entries like the following in the local.cf file

whitelist_from [EMAIL PROTECTED]
and
whitelist_from [EMAIL PROTECTED]

But mail is still picked up as spam for the [EMAIL PROTECTED]

Have also tried the following;

whitelist_from_rcvd [EMAIL PROTECTED] domain.com
and
whitelist_from_rcvd [EMAIL PROTECTED] domain.com

But nothing seems to work? has anyone got any advice on this?
  


do you have

   always_trust_envelope_sender 1

?




Re: whitelist_from not working with milter

2006-09-16 Thread Matt Kettler
Rainer Sokoll wrote:
 Hi,

 sendmail 8.13.7, Dan Nelson's spamss-milter 0.3.1, SA 3.1.5.
 whitelist_from is ignored entirely, no matter if I put it into local.cf
 or some other .cf. If I run SA in test mode (-t), SA honors
 whitelist_from.
 By digging into milter's source, I see this snipplet from line 911 on (I am 
 not a
 programmer):

 /* Send the envelope headers as X-Envelope-From: and
 X-Envelope-To: so that SpamAssassin can use them in its
 whitelist checks.  Also forge as complete a dummy
 Received: header as possible because SA gets a lot of
 info from it.

  HReceived: $?sfrom $s $.$?_($?s$|from $.$_)
  $.$?{auth_type}(authenticated$?{auth_ssf} bits=${auth_ssf}$.)
  $.by $j ($v/$Z)$?r with $r$. id $i$?{tls_version}
  (version=${tls_version} cipher=${cipher} bits=${cipher_bits} 
 verify=${verify})$.$?u
  for $u; $|;
  $.$b$?g
  (envelope-from $g)$.

 */

 As you can see, this function is commented out.
 Is this the reason for my problem? And if so: What will happen if I
 comment it in?
   

No, that would cause it to match the envelope senders. If you're trying
to match the From: header itself, this won't matter.

However, does spamass-milter use spamd/spamc? If so, did you restart spamd?

The .cf files are all only parsed when spamd starts, or when it's sent a
SIGHUP. Otherwise, all the spamd children use a copy of the pre-parsed
rules from the parent spamd.




Re: whitelist_from not working with milter

2006-09-16 Thread Loren Wilton
BTW, some versions of spamass-milter have had problems with recent versions 
of SA.  I don't know if that has been fixed or not, since I don't use it. 
It it hasn't been fixed (at least in the version you have) it may be part of 
your problem.


   Loren



RE: Whitelist_from clarification

2006-06-07 Thread Bret Miller
 Soomail from myspace has been getting tagged as spam...been trying
 to halt that on a domain basis.  Here's what I've tried (and seen
 online):

 .*myspace.com
 @myspace.com
 *myspace.com
 [EMAIL PROTECTED]

 Can someone tell me which is the correct format?  Thanks!

whitelist_from [EMAIL PROTECTED]

If your server correctly inserts a received header before calling SA,
you might be able to use something like:

Whitelist_from_rcvd [EMAIL PROTECTED] servername

Bret






Re: Whitelist_from clarification

2006-06-07 Thread Ramprasad
On Wed, 2006-06-07 at 07:03 -0600, James Lay wrote:
 Hey all!
 
 Soomail from myspace has been getting tagged as spam...been trying
 to halt that on a domain basis.  Here's what I've tried (and seen
 online):
 
 .*myspace.com
 @myspace.com
 *myspace.com
 [EMAIL PROTECTED]
 
 Can someone tell me which is the correct format?  Thanks!
 
 James

Oops
Now spammers know how to spam you, just forge the from address. 

:-)





  1   2   >