Re: [sniffer] Change in coding policies

2004-12-22 Thread Chris Ulrich
OK, being a new (and very happy) customer ...
  For example, we will be introducing rules that watch for bounces
  that contain large numbers of failed addresses - indicating a
  probable dictionary attack / joe-job ...
What is a joe-job?  Spam from Billy Bob?
Send coffee...
Chris 


This E-Mail came from the Message Sniffer mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


RE: [sniffer] Change in coding policies

2004-12-22 Thread Landry William
Title: Message



-Original Message-From: 
Chris Ulrich [mailto:[EMAIL PROTECTED]] 
OK, being a new (and very happy) customer ... 
For example, we will be introducing rules that watch for 
bounces that contain large numbers of failed addresses - 
indicating a probable dictionary attack / joe-job 
... What is a joe-job? Spam from Billy 
Bob?http://catb.org/~esr/jargon/html/J/joe-job.html Send coffee...

---This message and any included attachments are from Siemens Medical Solutions USA, Inc. and are intended only for the addressee(s).  The information contained herein may include trade secrets or privileged or otherwise confidential information.  Unauthorized review, forwarding, printing, copying, distributing, or using such information is strictly prohibited and may be unlawful.  If you received this message in error, or have reason to believe you are not authorized to receive it, please promptly delete this message and notify the sender by e-mail with a copy to [EMAIL PROTECTED] Thank you

[sniffer] Change in coding policies

2004-12-21 Thread Pete McNeil
Hello Sniffer Folks,

  Backscatter from rejected virii and joe-jobs has become a very
  significant problem.

  Up to now we have tried as much as possible to avoid coding for
  NDRs and other such backscatter - though some pattern matches have
  been unavoidable.

  Generally it is a very bad idea these days for a server to send a
  response of any kind when a virus is captured since most virii forge
  the sender information.

  Similarly, bounces from joe-jobs and dictionary attacks are also a
  problem.

  These kinds of messages tend to be more of a problem than a solution
  and the volume has now reached extreme levels (IMO).

  From now on, we are going to start coding rules to capture these
  kinds of messages. The rules that we do code for these messages will
  go into the malware group.

  For example, we will be introducing rules that watch for bounces
  that contain large numbers of failed addresses - indicating a
  probable dictionary attack / joe-job; and we will be coding rules
  for most virus bounces when they reach our spamtraps or are
  submitted to us as spam - since clearly the return address on the
  bounce indicates that the sender information must have been forged
  (bounce going to a spamtrap).

  If there is some need on your system to receive these messages then
  the best strategy will be to create local white rules to let these
  through.

Thanks,
_M

Pete McNeil (Madscientist)
President, MicroNeil Research Corporation
Chief SortMonster (www.sortmonster.com)



This E-Mail came from the Message Sniffer mailing list. For information and 
(un)subscription instructions go to 
http://www.sortmonster.com/MessageSniffer/Help/Help.html


RE: [sniffer] Change in coding policies

2004-12-21 Thread Colbeck, Andrew
It sounds good to me, Pete.

May I humbly suggest that this be a new result code, e.g. 046?  Until
now, Message Sniffer has been very parsimonious with the new categories,
but this looks like one that will be here for a long time. 

Andrew 8)

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Pete McNeil
Sent: Tuesday, December 21, 2004 6:38 AM
To: [EMAIL PROTECTED]
Subject: [sniffer] Change in coding policies


Hello Sniffer Folks,

  Backscatter from rejected virii and joe-jobs has become a very
  significant problem.

  Up to now we have tried as much as possible to avoid coding for
  NDRs and other such backscatter - though some pattern matches have
  been unavoidable.

  Generally it is a very bad idea these days for a server to send a
  response of any kind when a virus is captured since most virii forge
  the sender information.

  Similarly, bounces from joe-jobs and dictionary attacks are also a
  problem.

  These kinds of messages tend to be more of a problem than a solution
  and the volume has now reached extreme levels (IMO).

  From now on, we are going to start coding rules to capture these
  kinds of messages. The rules that we do code for these messages will
  go into the malware group.

  For example, we will be introducing rules that watch for bounces
  that contain large numbers of failed addresses - indicating a
  probable dictionary attack / joe-job; and we will be coding rules
  for most virus bounces when they reach our spamtraps or are
  submitted to us as spam - since clearly the return address on the
  bounce indicates that the sender information must have been forged
  (bounce going to a spamtrap).

  If there is some need on your system to receive these messages then
  the best strategy will be to create local white rules to let these
  through.

Thanks,
_M

Pete McNeil (Madscientist)
President, MicroNeil Research Corporation
Chief SortMonster (www.sortmonster.com)



This E-Mail came from the Message Sniffer mailing list. For information
and (un)subscription instructions go to
http://www.sortmonster.com/MessageSniffer/Help/Help.html

This E-Mail came from the Message Sniffer mailing list. For information and 
(un)subscription instructions go to 
http://www.sortmonster.com/MessageSniffer/Help/Help.html


Re[2]: [sniffer] Change in coding policies

2004-12-21 Thread Pete McNeil
On Tuesday, December 21, 2004, 12:51:19 PM, Andrew wrote:

CA It sounds good to me, Pete.

CA May I humbly suggest that this be a new result code, e.g. 046?  Until
CA now, Message Sniffer has been very parsimonious with the new categories,
CA but this looks like one that will be here for a long time. 

I thought about making a new rule group for this, but talked myself
out of it:

1. I don't want to give this group priority over other rules (lower
symbol values get priority within a given scan).

2. Many bounces like this are already being captured by existing rules
- especially those that include parts or (ghasp) all of the bounced message.

3. Many of the rules we will be coding will be dual-use... That is,
when we get a bounce message that shows us the subject of the
original, and the name of the file that was rejected (or some similar
group of features) we will be coding a malware rule to block both the
original content and the bounces --- rather than trying to code a good
malware rule that avoids tagging bounces which is sometimes hard or
impossible to do.

-- After thinking about all of these it seems simpler and more
consistent to code these rules inside the existing malware group.

_M




This E-Mail came from the Message Sniffer mailing list. For information and 
(un)subscription instructions go to 
http://www.sortmonster.com/MessageSniffer/Help/Help.html


Re: [sniffer] Change in coding policies

2004-12-21 Thread Matt
Given that the precision is difficult to assign under the single result 
framework, I don't doubt the choice.  Might I suggest creating a 
sub-group for the three main types of backscatter so that individuals 
can turn them off as a group instead of one rule at a time.  Note that 
the three groups that I have defined personally are as follows:

   - Joe-Job NDR's.
   - Challenge/Response Idiots
   - AntiVirus Notifications
Matt

Pete McNeil wrote:
On Tuesday, December 21, 2004, 12:51:19 PM, Andrew wrote:
CA It sounds good to me, Pete.
CA May I humbly suggest that this be a new result code, e.g. 046?  Until
CA now, Message Sniffer has been very parsimonious with the new categories,
CA but this looks like one that will be here for a long time. 

I thought about making a new rule group for this, but talked myself
out of it:
1. I don't want to give this group priority over other rules (lower
symbol values get priority within a given scan).
2. Many bounces like this are already being captured by existing rules
- especially those that include parts or (ghasp) all of the bounced message.
3. Many of the rules we will be coding will be dual-use... That is,
when we get a bounce message that shows us the subject of the
original, and the name of the file that was rejected (or some similar
group of features) we will be coding a malware rule to block both the
original content and the bounces --- rather than trying to code a good
malware rule that avoids tagging bounces which is sometimes hard or
impossible to do.
-- After thinking about all of these it seems simpler and more
consistent to code these rules inside the existing malware group.
_M

This E-Mail came from the Message Sniffer mailing list. For information and 
(un)subscription instructions go to 
http://www.sortmonster.com/MessageSniffer/Help/Help.html
 

--
=
MailPure custom filters for Declude JunkMail Pro.
http://www.mailpure.com/software/
=
This E-Mail came from the Message Sniffer mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html


Re[2]: [sniffer] Change in coding policies

2004-12-21 Thread Pete McNeil
On Tuesday, December 21, 2004, 1:13:15 PM, Matt wrote:

M Given that the precision is difficult to assign under the single result
M framework, I don't doubt the choice.  Might I suggest creating a 
M sub-group for the three main types of backscatter so that individuals
M can turn them off as a group instead of one rule at a time.  Note that
M the three groups that I have defined personally are as follows:

M - Joe-Job NDR's.
M - Challenge/Response Idiots
M - AntiVirus Notifications

I'm thinking in this direction - but I'm not sure yet what our coding
rules will allow since there tends to be a lot of overlap.

I don't think we'll be creating C/R related rules, at least not yet.
That's a category where zealots are everywhere and we have learned to
avoid filtering anything that even looks like part of a C/R system
unless specifically asked to do so.

If we get a lot of call for it then I _might_ create a project to code
those rules as an optional add-in on request.

For now we're going to stick to the safe stuff that can be applied
broadly.

_M




This E-Mail came from the Message Sniffer mailing list. For information and 
(un)subscription instructions go to 
http://www.sortmonster.com/MessageSniffer/Help/Help.html


Re: [sniffer] Change in coding policies

2004-12-21 Thread Matt
FYI,
I'm still debating myself about what to do with this stuff.  I'm hoping 
that it will go away, albeit slowly, and I presently rarely take action 
to correct any issues with this E-mail, though I do reprocess some 
individual messages.  Seems that many of the C/R providers have gotten 
better at filtering spam prior to the challenge, and that also 
helps...but they're still idiots :)

If I implement something, I will probably make it an optional filter for 
my domains.  I already isolate the bounce stuff that is held in it's own 
folder for each client.  The NDR issue has grown much bigger recently 
because of one single spammer that will use the same real address for 
about a week at a time (sporadically), and I have been contacted by 
clients about 3 or 4 times in the past two months about high volumes of 
bounces to single accounts.  We do catch most of it already, but not 
most of the stuff as generic as what IMail would send (no content), and 
there is unfortunately no good way to tell the good from the bad.  Right 
now I can only offer to block all NDR's, but I suggest that they just 
wait a week and the issue will clear up, and thankfully it always has so 
far.

Matt

Pete McNeil wrote:
On Tuesday, December 21, 2004, 1:13:15 PM, Matt wrote:
M Given that the precision is difficult to assign under the single result
M framework, I don't doubt the choice.  Might I suggest creating a 
M sub-group for the three main types of backscatter so that individuals
M can turn them off as a group instead of one rule at a time.  Note that
M the three groups that I have defined personally are as follows:

M - Joe-Job NDR's.
M - Challenge/Response Idiots
M - AntiVirus Notifications
I'm thinking in this direction - but I'm not sure yet what our coding
rules will allow since there tends to be a lot of overlap.
I don't think we'll be creating C/R related rules, at least not yet.
That's a category where zealots are everywhere and we have learned to
avoid filtering anything that even looks like part of a C/R system
unless specifically asked to do so.
If we get a lot of call for it then I _might_ create a project to code
those rules as an optional add-in on request.
For now we're going to stick to the safe stuff that can be applied
broadly.
_M

This E-Mail came from the Message Sniffer mailing list. For information and 
(un)subscription instructions go to 
http://www.sortmonster.com/MessageSniffer/Help/Help.html
 

--
=
MailPure custom filters for Declude JunkMail Pro.
http://www.mailpure.com/software/
=
This E-Mail came from the Message Sniffer mailing list. For information and (un)subscription instructions go to http://www.sortmonster.com/MessageSniffer/Help/Help.html