CYA .pink

2014-10-29 Thread Axb
BEWARE: this *may* cause false positives - YMMV after the required rule addition: if (version = 3.004000) blacklist_uri_host pink endif domains seen lately: http://pastebin.com/uH4YfVXR same may apply to the red TLD BEWARE: this *may* cause false positives - YMMV

Bayesian filter error?

2014-10-29 Thread Marco Tironi / 8volante Srl
Hi, I use a Spamassasin version 3.3.1 on Windows System and I have a problem with Bayesian filter: - A legitimate users send an email to our server and they are delivered normally - When that users insert it’s domain in the email signature the email is marked as spam with that

Re: Bayesian filter error?

2014-10-29 Thread Reindl Harald
Am 29.10.2014 um 10:50 schrieb Marco Tironi / 8volante Srl: Hi, I use a Spamassasin version 3.3.1 on Windows System and I have a problem with Bayesian filter: -A legitimate users send an email to our server and they are delivered normally -When that users insert it’s domain in the email

R: Bayesian filter error?

2014-10-29 Thread Marco Tironi / 8volante Srl
Thanks for your fast reply. Now I understand the big mistake: Bayesian filter is server specific and not public so it's not globally manteined. Every server have its own indexes so there is no fast solution to solve it globally. I can allow that signrature for my server, but others server

Re: R: Bayesian filter error?

2014-10-29 Thread Axb
On 10/29/2014 11:38 AM, Marco Tironi / 8volante Srl wrote: Thanks for your fast reply. Now I understand the big mistake: Bayesian filter is server specific and not public so it's not globally manteined. Every server have its own indexes so there is no fast solution to solve it globally. I can

Re: Bayesian filter error?

2014-10-29 Thread Joolee
The Bayes system scores messages based on the occurence of tokens (pieces of text) that appear in the E-mail. The signature you mention seems to contain tokens that are very commonly used in spam. Best solution would be to rewrite the signature to not contain those tokens. I don't know how you can

Re: spamassassin rule to combat phishing

2014-10-29 Thread francis picabia
I've tested the rule: uri URI_MYDOMAIN_PHISH m;^https?://(?:[^./]+\.)*example\.com[^/?];i is catching this sample newletter link: Oct 29 09:38:50.368 [24608] dbg: rules: ran uri rule URI_MYDOMAIN_PHISH == got hit: http://example.com; Complete email body content in test of newsletter

Re: spamassassin rule to combat phishing

2014-10-29 Thread francis picabia
On Wed, Oct 29, 2014 at 10:27 AM, francis picabia fpica...@gmail.com wrote: I've tested the rule: uri URI_MYDOMAIN_PHISH m;^https?://(?:[^./]+\.)*example\.com[^/?];i is catching this sample newletter link: Oct 29 09:38:50.368 [24608] dbg: rules: ran uri rule URI_MYDOMAIN_PHISH

shellshock via SMTP?

2014-10-29 Thread Joe Acquisto-j4
Comments on the ZD net article that claims shellshock exploit via crafty SMTP headers? Just asking, that's all . . . I attached a link to it below, please excuse if that is improper behavior. http://www.zdnet.com/shellshock-attacks-mail-servers-735094/

Re: shellshock via SMTP?

2014-10-29 Thread John Hardin
On Wed, 29 Oct 2014, Joe Acquisto-j4 wrote: Comments on the ZD net article that claims shellshock exploit via crafty SMTP headers? Just asking, that's all . . . I attached a link to it below, please excuse if that is improper behavior.

Re: shellshock via SMTP?

2014-10-29 Thread Mark Martinec
2014-10-29 16:26, Joe Acquisto-j4 wrote: Comments on the ZD net article that claims shellshock exploit via crafty SMTP headers? Just asking, that's all . . . I attached a link to it below, please excuse if that is improper behavior.

Bayer Filtering - Not working no matter what I try

2014-10-29 Thread Bruce Sackett
I have my mail system running beautifully with spamassassin, but can’t get bayes filtering to work. I’m assuming it’s a user/group issue, since if I run tests as my ‘amavis’ user (which is how I should have it running) it does show bayes results, but when the mail system itself processes a

Re: procmail

2014-10-29 Thread Derek Diget
On Oct 28, 2014 at 22:10 -0400, David F. Skoll wrote: =On Wed, 29 Oct 2014 01:31:51 +0100 =Reindl Harald h.rei...@thelounge.net wrote: = = frankly in times of LMTP and Sieve there is hardly a need to use = procmail - it is used because i know it and it just works - so why = should somebody step

Re: shellshock via SMTP?

2014-10-29 Thread John Wilcock
Le 29/10/2014 16:54, Mark Martinec a écrit : 2014-10-29 16:26, Joe Acquisto-j4 wrote: Comments on the ZD net article that claims shellshock exploit via crafty SMTP headers? Just asking, that's all . . . I attached a link to it below, please excuse if that is improper behavior.

heads up -- Microsoft's Office365 cloud mail service is PINK

2014-10-29 Thread Jo Rhett
I’ve been reporting a flood of new spammers operating out of Office365 to them. These are well known spam domains which have moved to Office365. MX and outbound mailers net handle records point to ab...@microsoft.com. OrgAbuseHandle: MAC74-ARIN OrgAbuseName: Microsoft Abuse Contact

Re: shellshock via SMTP?

2014-10-29 Thread R.E. Sonneveld
On Oct 29, 2014, at 16:54, Mark Martinec mark.martinec...@ijs.si wrote: 2014-10-29 16:26, Joe Acquisto-j4 wrote: Comments on the ZD net article that claims shellshock exploit via crafty SMTP headers? Just asking, that's all . . . I attached a link to it below, please excuse if that is

Re: spf: lookup failed: addr is not a string

2014-10-29 Thread Thomas Preißler
Hey Mark, thanks for your explanation! I'm beginning to understand what is going on here. Because you have a older version of Mail::DKIM, spamassassin is unable to provide it with its own resolver, so Mail::DKIM does it by directly calling Net::DNS, which uses IO::Socket::INET, while

Re: spf: lookup failed: addr is not a string

2014-10-29 Thread Mark Martinec
Thomas Preißler wrote: Hey Mark, thanks for your explanation! I'm beginning to understand what is going on here. Because you have a older version of Mail::DKIM, spamassassin is unable to provide it with its own resolver, so Mail::DKIM does it by directly calling Net::DNS, which uses

what can be done about deep sea nutrition spam?

2014-10-29 Thread Jude DaShiell
The garbage they send is 6MB in length. Their unsubscribe link also doesn't work. --

Re: what can be done about deep sea nutrition spam?

2014-10-29 Thread David Jones
From: Jude DaShiell jdash...@panix.com Sent: Wednesday, October 29, 2014 3:54 PM To: users@spamassassin.apache.org Subject: what can be done about deep sea nutrition spam? The garbage they send is 6MB in length. Their unsubscribe link also doesn't work. Use RBLs that have this server

Re: CYA .link

2014-10-29 Thread Kevin A. McGrail
On 10/28/2014 7:24 PM, Axb wrote: On 10/29/2014 12:23 AM, Jeff Mincy wrote: From: Axb axb.li...@gmail.com Date: Wed, 29 Oct 2014 00:00:39 +0100 before I commit please test with describe HEADER_HOST_IN_BLACKLIST Whitelisted header host or domain describe

Re: CYA .link

2014-10-29 Thread Axb
On 10/29/2014 10:09 PM, Kevin A. McGrail wrote: On 10/28/2014 7:24 PM, Axb wrote: On 10/29/2014 12:23 AM, Jeff Mincy wrote: From: Axb axb.li...@gmail.com Date: Wed, 29 Oct 2014 00:00:39 +0100 before I commit please test with describe HEADER_HOST_IN_BLACKLIST Whitelisted

Re: dns: bad dns reply: Connection refused

2014-10-29 Thread Chris
On Tue, 2014-10-21 at 00:14 +0200, Mark Martinec wrote: 2014-10-20 20:11, Reindl Harald wrote: [...] sorry, no, but what i face repeatly are messages like below in fact only if the machine has more than 1 dns in resolv.conf configure it to just use 127.0.0.1 and that won't happen

Re: what can be done about deep sea nutrition spam?

2014-10-29 Thread Jude DaShiell
That message will arrive again probably by tomorrow. Due to the size of the message, I'll put it in my web space with full headers and once done send a follow up url to this list. Any interested can then get all the details. -- On Wed, 29 Oct 2014, David Jones wrote: From: Jude

Re: spf: lookup failed: addr is not a string

2014-10-29 Thread Benny Pedersen
On October 29, 2014 8:52:40 PM Mark Martinec mark.martinec...@ijs.si wrote: The problem is solved with perl 5.18, 5.20, 5.21.5, which deal with pPOK vs. POK flags somewhat differently. Spampd 2.30 does not work with perl 5.18, spampd 2.42 does, seem lot is changed in perl, so is it not just

Re: spf: lookup failed: addr is not a string

2014-10-29 Thread Mark Martinec
Benny Pedersen wrote: The problem is solved with perl 5.18, 5.20, 5.21.5, which deal with pPOK vs. POK flags somewhat differently. Spampd 2.30 does not work with perl 5.18, spampd 2.42 does, seem lot is changed in perl, so is it not just mail::dkim that needs updates for perl 5.18 ? Or is it

Re: shellshock via SMTP?

2014-10-29 Thread hamann . w
2014-10-29 16:26, Joe Acquisto-j4 wrote: Comments on the ZD net article that claims shellshock exploit via crafty SMTP headers? Just asking, that's all . . . I attached a link to it below, please excuse if that is improper behavior.