Re: all emails are tagged SPAM

2008-03-27 Thread SM

At 23:03 26-03-2008, Umar Murtaza wrote:
I have Spamassin 3.2.4 running on RedHat. It has been running fine, 
until last night when all the emails started getting tagged as SPAMs.


Any idea where should i start looking for?

I am using:

sendmail-cf-8.13.1-3.2.el4
sendmail-8.13.1-3.2.el4
mailscanner-4.62.9-3


Mailscanner is using the relays.ordb.org DNSBL.  That DNSBL is 
returning a positive response for all queries which is why all your 
emails are being tagged as Spam.  Remove that DNSBL from your 
Mailscanner configuration.


Regards,
-sm 



Re: SORBS_DUL

2008-03-27 Thread mouss

James Gray wrote:

[snip]
According to SORBS:

Netblock:202.147.75.0/26 (202.147.75.0-202.147.75.63)
Record Created:Thu May 11 02:23:32 2006 GMT
Record Updated:Thu May 11 02:23:32 2006 GMT
Additional Information:[MU] Dynamic/Generic IP/rDNS address, use 
your ISPs mail server or get rDNS set to indicate static assignment.


The entire 202.147.74.0/23 block has *NEVER* been part of a dynamic 
range and was purchased as part of our /19 back in 1999 (or maybe 
2000...before my time with this company anyway) when that address 
range was first made available by APNIC.  Some of the other class-C's 
in our /19 have been used for a long-since-sold ISP business, but not 
the 202.147.74.0/23 block.


There's only a few externally exposed MTA's in that range (although 
our mail cluster is quite large).  The ones really biting us on the 
arse are:

202.147.74.51  (also listed on DUHL, but on a 202.147.74.0/26)
202.147.75.20
202.147.75.21


The last two don't resolve from here. make sure you have a PTR and try 
delisting them individually first. use a large TTL in these PTRs. once 
all your problems solved, you can switch back to whatever TTL you want.


the .51 seems ok to me, but if you can, do increase the TTLs in:
ns1.viperplatform.net.au. 436   IN  A   202.147.74.80
ns2.viperplatform.net.au. 436   IN  A   202.147.74.81

small TTLs resemble fast flux and may look suspicious. (besides, a small 
TTL for NS records is unusual).


The idea is to maximize chances that the sorbs robot delists these IPs.



Do your own queries and whois lookups...but these address blocks are 
INCORRECTLY LISTED BY SORBS and they refuse (yes, I've heard from 
them) to remove them.  Apparently because our inbound and outbound 
MTA's don't use the same addresses!  I have no idea what crack-monkey 
at SORBS wrote that, but that was the response we got in relation to 
our request to remove our IP's.


There may be some misunderstanding between you and them (or between you 
and their robot?). I understand that this is annoying, but I think 
you'll get better results by staying calm and doing some efforts until 
your issues are solved.


PS. If you ever post on a sorbs mailing list, don't use the words you 
used here ;-p





I hope that clears it up :)

Cheers,

James





Re: SORBS_DUL

2008-03-27 Thread James Gray

Matus UHLAR - fantomas wrote:

On 25.03.08 07:57, James Gray wrote:
Why are rules that look up against this list still in the base of 
SpamAssassin?? The SORBS dynamic list is so poorly maintained that it's 
practically useless



Matus UHLAR - fantomas wrote:

I don't find it useless. It works quite well


On 26.03.08 08:23, James Gray wrote:

Unless you receive mail from any of our customers.


Actually I don't - they are listed in SORBS DUL...


Precisely my point.  You incorrectly reject their mail as SORBS' tell 
you it's a dynamic IP.  They aren't, and never have been, dynamically 
allocated to anyone.



while no RFC forces setting of a TTL, some of them advise values ~1 day or
more for records that do not change that often. Having TTL 3600 for normal
records imho indicates just what SORBS points out at. I wouldn't trust you
too.


See my other post today.  The TTL's were dropped recently (January 2008) 
to accommodate the move of equipment/IP/etc from one co-lo to another. 
They are now back up to more normal values.  The blocks that have been 
listed have never, and will never be used in any dynamic addressing 
scheme, yet were listed anyway - according to you, because of short 
TTL's.  As I have stated, the TTL's were dropped recently and restored 
back recently but the SORBS listing was made in 2006 - long before I 
started with this company and long before the recent co-lo move.


Why? Can you remove them from the SORBS_DUL?  No, then it's not really 
relevant then is it ;)


I was trying to help you find the real problem. If you don't want help, stop
bitching.


I didn't ASK FOR HELP! I asked what people's thoughts were on keeping a 
list like SORBS_DUL in the base/default spamassassin rules.  I'm quite 
capable of fixing the mess I inherited.



I have seen more requests here to stop using some blacklists because of the
requestor was unable to understand something. I think this is just another
case...


You know nothing about me.  You assume I engineered the mess that is the 
DNS system I'm currently unravelling.  I didn't.  It was a dog's 
breakfast when I started and I'm slowly sorting the mess out.



If you tried using their support forum to delist IPs that did not meet their
delisting criteria, I don't wonder if they reject it without providing
(other) reason.


Forum?  Or support request page?  People keep referring to this nebulous 
SORBS support forumI only see their website:

https://www.us.sorbs.net/faq/supportreq.shtml


using sorbs is quite efficient, the scoress say it all. If you (and other
ISP's DNS admins) were able to configure DNS properly, they would be even
more efficient without false positives.


I am perfectly capable of configuring DNS.  In fact over the last 15 
years or so that I've been doing DNS/MTA admin on Unix-based systems, a 
lot of my work as a contractor and as an incumbent admin is fixing 
messes left by previous admins.  I'm currently stuck with a /19, /20 and 
a few stand-alone class-C's that are all a complete debacle.  It's odd 
that other lists have automatically, and rapidly de-listed the odd IP 
here and there, without me needing to jump through hoops.


SORBS make life hard for people to be de-listed: it's their idea of how 
DNS/MTA's should be managed, or you can talk to the virtual hand.  That 
is my beef.


Why are you so adamant about defending them?  There are plenty of other 
(better IMHO) RBL's that are far more effective in filtering spam and 
other nasties.


Peace,

James


smime.p7s
Description: S/MIME Cryptographic Signature


Re: all emails are tagged SPAM

2008-03-27 Thread Umar Murtaza


Thanks, that solved the problem.

I had that entry under /etc/MailScanner/spam.lists.conf

ORDB-RBL   relays.ordb.org.

Removing/commenting it out solved the problem.

I hope MailScanners daily update will not revert this settings back.


Umar


Umar Murtaza [EMAIL PROTECTED] wrote: strange, i did not make any change and 
this thing suddenly started. 
Has MailScanner started this lately?

Umar

SM [EMAIL PROTECTED] wrote: At 23:03 26-03-2008, Umar Murtaza wrote:
I have Spamassin 3.2.4 running on RedHat. It has been running fine, 
until last night when all the emails started getting tagged as SPAMs.

Any idea where should i start looking for?

I am using:

sendmail-cf-8.13.1-3.2.el4
sendmail-8.13.1-3.2.el4
mailscanner-4.62.9-3

Mailscanner is using the relays.ordb.org DNSBL.  That DNSBL is 
returning a positive response for all queries which is why all your 
emails are being tagged as Spam.  Remove that DNSBL from your 
Mailscanner configuration.

Regards,
-sm 


   

-
Never miss a thing.   Make Yahoo your homepage.

   
-
Be a better friend, newshound, and know-it-all with Yahoo! Mobile.  Try it now.

Re: SORBS_DUL

2008-03-27 Thread mouss

James Gray wrote:

[snip]
I didn't ASK FOR HELP! I asked what people's thoughts were on keeping 
a list like SORBS_DUL in the base/default spamassassin rules.  I'm 
quite capable of fixing the mess I inherited.




As long as
- it doesn't cause FPs
- it helps catch spam
- it is free for use/access
it's good to have it.

I don't think this is what bothers you. I think you are angry because 
some people use sorbs in their MTA and thus reject your mail. 
spamassassin is score based, so even if you're listed, this is not 
enough to make your mail tagged as spam.


I have seen more requests here to stop using some blacklists because 
of the
requestor was unable to understand something. I think this is just 
another

case...


You know nothing about me.  You assume I engineered the mess that is 
the DNS system I'm currently unravelling.  I didn't.  It was a dog's 
breakfast when I started and I'm slowly sorting the mess out.


If you tried using their support forum to delist IPs that did not 
meet their

delisting criteria, I don't wonder if they reject it without providing
(other) reason.


Forum?  Or support request page?  People keep referring to this 
nebulous SORBS support forumI only see their website:

https://www.us.sorbs.net/faq/supportreq.shtml


while not a support forum, the [EMAIL PROTECTED] list may be a good 
place to ask

   https://www.us.sorbs.net/lists.shtml

 [snip]



Re: all emails are tagged SPAM

2008-03-27 Thread Matt Kettler

Umar Murtaza wrote:



Thanks, that solved the problem.

I had that entry under /etc/MailScanner/spam.lists.conf

ORDB-RBL   relays.ordb.org.

Removing/commenting it out solved the problem.
Well, that introduces another problem. Really you need to remove 
ORDB-RBL from your Spam List = in MailScanner.conf.


the spam.lists.conf really only declares that ordb exists. The Spam 
List setting tells MailScanner to use it.


By removing the declaration, you've disabled it, but only because 
there's now a syntax error in your Spam List setting..




I hope MailScanners daily update will not revert this settings back.
I doubt any MailScanner update will do that. AFAIK ORDB hasn't been 
enabled in the MailScanner default configuration for well over a year 
now. (ORDB actually died in 2006) It's still in the current 
spam.lists.conf, but there's a note there that it's dead to warn people 
off adding it to the Spam List setting.


While we're at it.. What daily update? I've been a MailScanner user for 
years and have yet to see such a thing.


Also, when you do upgrade MailScanenr versions, it generally doesn't 
replace your MailScanner.conf. Instead there's that upgrade script you 
have to manually run to merge new settings in. That's probably why your 
still have ORDB in your config. MailScanner doesn't like over-riding 
settings, so you've probably been carrying that setting forward since 
you installed.


Re: SORBS_DUL

2008-03-27 Thread Matt Kettler

James Gray wrote:


Sorbs sux, don't use it.  Last time we had this problem they wanted 
money (and not an insignificant amount either) to remove a listing 
from their systems.  They arbitrarily add addresses to a database the 
IP's owner can't control, then demand money to remove the listing; 
where I come from, that's called extortion.
SORBS is an Australian entity, so they're local to you, at least in a 
legal system sense..  If it is extortion in your legal system, you might 
want to take advantage of that fact.


Regardless,  what matters from a spamassassin perspective is the 
accuracy of the list. That's the primary criteria that will get a list 
kicked out.


SORBS-DUL is one of the most accurate RBLs spamassassin uses in the 
mass-check tests. 99.4% of its hits are spam. This beats out all other 
RBLs in spamassassin's config except PBL (which ties it), XBL, and 4 
lists with very low hit rates that wound up with no nonspam hits.


If it's really as arbitrary and random as you claim, how's it so 
accurate in real world tests?


Personally, it sounds like they listed you, and you've got a personal 
beef. The real world tests don't support your claims that it's operated 
on an arbitrary basis.





Re: SORBS_DUL

2008-03-27 Thread James Gray

Matt Kettler wrote:

James Gray wrote:


Sorbs sux, don't use it.  Last time we had this problem they wanted 
money (and not an insignificant amount either) to remove a listing 
from their systems.  They arbitrarily add addresses to a database the 
IP's owner can't control, then demand money to remove the listing; 
where I come from, that's called extortion.
SORBS is an Australian entity, so they're local to you, at least in a 
legal system sense..  If it is extortion in your legal system, you might 
want to take advantage of that fact.


Yes I'm aware of that :-/  Embarrassing isn't it?  Unfortunately, being 
on SORBS_DUL doesn't impact us directly, and despite the claims that 
removal is free, th reality is proving to be quite different.


Regardless,  what matters from a spamassassin perspective is the 
accuracy of the list. That's the primary criteria that will get a list 
kicked out.


Indeed.  Having not used SORBS, and not missing them, I have no stats of 
my own to confirm or deny the accuracy of the list.  Only that our IP 
blocks have been listed and we have been given no explanation why; only 
that we must overhaul our DNS and MTA systems to suit SORBS, then maybe 
they will delist us.


SORBS-DUL is one of the most accurate RBLs spamassassin uses in the 
mass-check tests. 99.4% of its hits are spam. This beats out all other 
RBLs in spamassassin's config except PBL (which ties it), XBL, and 4 
lists with very low hit rates that wound up with no nonspam hits.


See above.

If it's really as arbitrary and random as you claim, how's it so 
accurate in real world tests?


No idea.  I'd hazard a guess that the previous admin's actions at some 
point got us listed; but he's moved to the opposite side of the country 
and the silence from SORBS as to why we were listed in the first place 
leaves me with one of two conclusions: previous admin screwed up royally 
(possible but unlikely), SORBS listed our IP's without fair justification.


Personally, it sounds like they listed you, and you've got a personal 
beef. The real world tests don't support your claims that it's operated 
on an arbitrary basis.


I've just got customers (ISP's) on my back to get the MTA's IPs off the 
list.  SORBS are being about as unco-operative as I've ever experienced 
in my years as an admin.  My frustrations are firmly aimed at the one 
body that is causing me pain: SORBS.  When all this is over, I still 
wont use SORBS :)


We've crossed paths on other lists Matt, thanks for your objectivism.  I 
need sleep and some quiet (from the customers and management) so maybe 
some of comment regarding SORBS have been a little harsh.  Interestingly 
 the customers (mostly APAC ISP wholesalers) *all* have similar 
opinions of SORBS as an entity to interact with.


Cheers,

James


smime.p7s
Description: S/MIME Cryptographic Signature


Re: SA-update error

2008-03-27 Thread Matt Kettler

Dennis Clark wrote:

Using Spamassassin 3.1.8.  I haven't updated SA in about six months.  Ran SA-update -D 
using the default channel of updates.spamassassin.org, received error new version 
is 585884, skipped channel.

What exactly is going wrong here.  Has the sa update default channel been 
changed?
  
No, but there also haven't been any sa-updates posted to 3.1.x in a long 
time, so I wouldn't be surprised to find you're already up to date for 
that version.


We've been on the 3.2.x series since May of last year. The current 
release is 3.2.4, and 3.3.0 is starting to show signs of forming on the 
horizon.











Re: all emails are tagged SPAM

2008-03-27 Thread Umar Murtaza

hmmm 

it looks like pretty much messedup. I have the following lines for Spam List 
which is probably related to present issue:

---
Spam List Definitions = %etc-dir%/spam.lists.conf
Spam List = ORDB-RBL SBL+XBL # You can un-comment this to enable them
---


i think i should change the second line with:
Spam List = SBL+XBL


and my current %etc-dir%/spam.lists.conf has following entries:

-
# This file translates the names of the spam lists and spam domains lists
# into the real DNS domains to search.

# There is a far more comprehensive list of these at
# http://www.declude.com/JunkMail/Support/ip4r.htm
# and you can easily search them all at www.DNSstuff.com.

# If you want to search other DNSBL's you will need to define them here first,
# before referring to them by name in mailscanner.conf (or a rules file).

spamhaus.orgsbl.spamhaus.org.
spamhaus-XBLxbl.spamhaus.org.
spamhaus-PBLpbl.spamhaus.org.
spamhaus-ZENzen.spamhaus.org.
SBL+XBL sbl-xbl.spamhaus.org.
spamcop.net bl.spamcop.net.
NJABL   dnsbl.njabl.org.

# ORDB has been shut down.
#ORDB-RBL   relays.ordb.org.

#Infinite-Monkeys   proxies.relays.monkeys.com.
#osirusoft.com  relays.osirusoft.com.
# These two lists are now dead and must not be used.

# MAPS now charge for their services, so you'll have to buy a contract before
# attempting to use the next 3 lines.

MAPS-RBLblackholes.mail-abuse.org.
MAPS-DULdialups.mail-abuse.org.
MAPS-RSSrelays.mail-abuse.org.

# This next line works for JANET UK Academic sites only

MAPS-RBL+   rbl-plus.mail-abuse.ja.net.

# And build a similar list for the RBL domains that work on the name
# of the domain rather than the IP address of the exact machine that
# is listed. This way the RBL controllers can blacklist entire
# domains very quickly and easily.
# These aren't used by default, as they slow down MailScanner quite a bit.

RFC-IGNORANT-DSNdsn.rfc-ignorant.org.
RFC-IGNORANT-POSTMASTER postmaster.rfc-ignorant.org.
RFC-IGNORANT-ABUSE  abuse.rfc-ignorant.org.
RFC-IGNORANT-WHOIS  whois.rfc-ignorant.org.
RFC-IGNORANT-IPWHOISipwhois.rfc-ignorant.org.
RFC-IGNORANT-BOGUSMXbogusmx.rfc-ignorant.org.

# Easynet are closing down, so don't use these any more
Easynet-DNSBL   blackholes.easynet.nl.
Easynet-Proxies proxies.blackholes.easynet.nl.
Easynet-Dynablock   dynablock.easynet.nl.

# This list is now dead and must not be used.
#OSIRUSOFT-SPEWSspews.relays.osirusoft.com.

# These folks are still going strong
SORBS-DNSBL dnsbl.sorbs.net.
SORBS-HTTP  http.dnsbl.sorbs.net.
SORBS-SOCKS socks.dnsbl.sorbs.net.
SORBS-MISC  misc.dnsbl.sorbs.net.
SORBS-SMTP  smtp.dnsbl.sorbs.net.
SORBS-WEB   web.dnsbl.sorbs.net.
SORBS-SPAM  spam.dnsbl.sorbs.net.
SORBS-BLOCK block.dnsbl.sorbs.net.
SORBS-ZOMBIEzombie.dnsbl.sorbs.net.
SORBS-DUL   dul.dnsbl.sorbs.net.
SORBS-RHSBL rhsbl.sorbs.net.
# These next 2 are Spam Domain List entries and not Spam Lists
SORBS-BADCONF   badconf.rhsbl.sorbs.net.
SORBS-NOMAILnomail.rhsbl.sorbs.net.

# Some other good lists 

CBL cbl.abuseat.org.
DSBLlist.dsbl.org.
--


I am still not confident in what this change will give me?





Matt Kettler [EMAIL PROTECTED] wrote: Umar Murtaza wrote:


 Thanks, that solved the problem.

 I had that entry under /etc/MailScanner/spam.lists.conf

 ORDB-RBL   relays.ordb.org.

 Removing/commenting it out solved the problem.
Well, that introduces another problem. Really you need to remove 
ORDB-RBL from your Spam List = in MailScanner.conf.

the spam.lists.conf really only declares that ordb exists. The Spam 
List setting tells MailScanner to use it.

By removing the declaration, you've disabled it, but only because 
there's now a syntax error in your Spam List setting..


 I hope MailScanners daily update will not revert this settings back.
I doubt any MailScanner update will do that. AFAIK ORDB hasn't been 
enabled in the MailScanner default configuration for well over a year 
now. (ORDB actually died in 2006) It's still in the current 
spam.lists.conf, but there's a note there that it's dead to warn people 
off adding it to the Spam List setting.

While we're at it.. What daily update? 

Re: spamd stops after about 90 seconds?

2008-03-27 Thread Justin Mason

Skip writes:
 That looks like it is the problem.A  I have sent BH an email asking them
 about it.A  By any chance do you know the name of the watchdog program
 that they run to keep an eye on the user processes?A  Or is it something
 compiled into the kernel?A  I have seen where sometimes depending on who
 you get a hold of in tech support, they don't even know what their own
 boxes are running and doing.

not a clue, I'm afraid.

 Justin Mason wrote:
 
  Skip writes:
   
 
  What do you know?  I got permission from my web and email hosting
  company (BlueHost) to run my own spamd process.  Cool! Now I can have a
  lot more control over the processing of my incoming mail, and I have
  access to the logs!  Well, after starting spamd, I was surprised after a
  couple of minutes when it mysteriously wasn't running any more.  After
  running some experiments, it seems it is indeed stopping after just over
  a minute.  Here's the command line I'm using to start spamd:
 
  spamd  -d -i 127.0.0.1 -p 6615  -C /home//.spamassassin
  --siteconfigpath=/home//.spamassassin
  --virtual-config-dir=/home//.spamassassin/%l -s
  /home//.spamassassin/spamd.log --user-config -D -u 
  --pidfile=/home//.spamassassin/spamd.pid --timeout-tcp=0
  --timeout-child=0
 
  I tried it without the last two timeout parameters and they don't seem
  to have any effect on this, and looking over the documentation, I
  wouldn't have expected them to.
 
  Is this a normal behavior of spamd, that if it doesn't see any action
  from spamc for a while, it just quits?  By the way, I don't see anything
  in the log that tells me spamd is shutting down or anything like that.
 
  I have been able to feed spamd some spam and it worked--I saw the scores
  and everything, but again, a short time after I did the test, alas,
  spamd shut down again.
 
  What did I miss?
  
 
  that sounds a *lot* like Bluehost's automated CPU time limiting apps
  shutting it down.  Use strace -p to trace the process activity around
  the 90 second mark, and see if it's getting a signal.
 
  --j.


Re: all emails are tagged SPAM

2008-03-27 Thread Matt Kettler

Umar Murtaza wrote:


hmmm 

it looks like pretty much messedup. I have the following lines for 
Spam List which is probably related to present issue:


---
Spam List Definitions = %etc-dir%/spam.lists.conf
Spam List = ORDB-RBL SBL+XBL # You can un-comment this to enable them
---


i think i should change the second line with:
Spam List = SBL+XBL
That would be correct. Unless you wish to make other changes to the list 
of RBLs MailScanner will check and trust absolutely as a spam criteria 
(without any regard for what SpamAssassin has to say about the message).



and my current %etc-dir%/spam.lists.conf has following entries:


snip, long list of the standard file from MailScanner

Looks normal, and appears to be the standard file other than ORDB is 
commented out.

--


I am still not confident in what this change will give me?
It will give you a disabled list. One that is disabled the proper way... 
(and less likely to show config errors in MailScanner's lint mode)


the spam.lists.conf file is intended to define a list of valid options 
that can be declared in the Spam List setting, nothing more. Having 
something present in the file doesn't enable it.


By removing ORDB from spam.lists.conf, you're essentially causing 
MailScanner to ignore the request to use ORDB, but only because it no 
longer knows what ORDB is. It's better to not ask MailScanner to use it 
at all.








Spam abuse report plugin

2008-03-27 Thread ram
I get a lot of spam on my servers which get detected by SA though are
generated by innocent mail servers.

We see a lot of mail users have insanely simple passwords , spammers are
using these accounts and send spam. By the time the administrator
realizes the server has sent 1000's of spam 

If spamassassin had an option to send abuse report to servers
automatically and send mails to abuse@server-admin the moment the
first sure spam comes in the admin could be warned before much damage
has been done. Obviously we limit to only 1 or 2 reports in an hour to a
particular id 






Thanks
Ram


PS:

I know having strict passwords is the solution, but any admin worth his
job knows how difficult it is to get everyone change their passwords 









Re: Spam abuse report plugin

2008-03-27 Thread Matt Kettler

ram wrote:

I get a lot of spam on my servers which get detected by SA though are
generated by innocent mail servers.

We see a lot of mail users have insanely simple passwords , spammers are
using these accounts and send spam. By the time the administrator
realizes the server has sent 1000's of spam 


If spamassassin had an option to send abuse report to servers
automatically and send mails to abuse@server-admin the moment the
first sure spam comes in the admin could be warned before much damage
has been done. Obviously we limit to only 1 or 2 reports in an hour to a
particular id 
  
The problem is, where spamassassin ties into the mail chain, it doesn't 
have any power to generate emails. It's a message filter, any action 
beyond modifying the message at hand would be inappropriate.


You might want to look at a log watcher like swatch to handle this.

In my own setup, I use prelude IDS for log monitoring, and have Nagios 
configured to fire off alarm emails when the prelude event rate gets too 
high. However, that's probably very over-complicated if you don't 
already use both tools for other network monitoring needs.






Re: Howto stop SPF_FAIL from internal network?

2008-03-27 Thread Enrico Scholz
Benny Pedersen [EMAIL PROTECTED] writes:

 spamassassin 21 -D spf -t /tmp/msg  /tmp/msg.spf.debug

 post the debug file

https://www.cvg.de/people/ensc/spf_fail.txt

(full debug with configuration of

| $ sed '/^\(#.*\)\?$/d' ~/.spamassassin/user_prefs
| internal_networks   62.153.82.30
| trusted_networks62.153.82.30
| trusted_networks192.168.8.0/23
| trusted_networks!192.168.3.0/24
| msa_networks192.168.0.0/16

result is SPF_NEUTRAL now as I added 192.168.0.0 net to SPF
entry)



Enrico


RE: SORBS_DUL

2008-03-27 Thread James E. Pratt
 
 Do your own queries and whois lookups...but these address blocks are
 INCORRECTLY LISTED BY SORBS and they refuse (yes, I've heard from
them)
 to remove them.  Apparently because our inbound and outbound MTA's
 don't
 use the same addresses!  I have no idea what crack-monkey at SORBS
 wrote
 that, but that was the response we got in relation to our request to
 remove our IP's.
 
 I hope that clears it up :)
 
 Cheers,
 
 James

Sigh... Can we clear this up for _real_??

... Regardless of whether or not SORBS listings are accurate or not,
or should or should not be included in SA, apparently some people cannot
read, or are overly confused...  

--

Straight from the SORBS website:

If you are listed in the Spam Database read the Spam Database FAQ, then
and only then you have 2 options. 
Pay the fine, and get delisted. 
Argue that you shouldn't have to pay. 
Paying the fine will get you delisted very quickly (usually within 48
hours)... However, when donating to the Royal Childrens Hospital and
sending in the receipt ensure you send in the receipt number (the actual
receipt is not needed, only the number - this is usually prefixed 'IR').
Due to privacy laws and the fact SORBS is not part of or connected with
the charity. Payment confirmations can only be verified when a receipt
number is given along withe the payee's name. 

Arguing with a SORBS administrator about how you are not the person
responsible, or how you just got the address (or any other excuse) will
result in a 'boiler plate' reply. It will be blunt and usually
impersonal, this may appear rude, but is it not meant to be, it is just
meant to be efficient. 
Note: There are a few good reasons why you may get delisted without
paying the fine. These will be dealt with by an admin personally.


--

So James - Like it says above, you really have two options. Quit
complaining here and pay the AU Hospital and send sorbs the
invoice/receipt, or perhaps if you approached the situation without
downright rudeness (yes, you sound like a rude person to have to deal
with based on your posts.. Sorry!), the admin would deal with you
personally, but frankly, if anyone there reads this list-serv, well..
all I can say is good luck with that.. :\

~Ciao

jp


Header of a false negative mail

2008-03-27 Thread Sn!per
I would appreciate if folks can explain to me about the header of a false 
negative email that I received:
...
...
Reply-To:  Gene Blackwell [EMAIL PROTECTED]
Sender:  [EMAIL PROTECTED]
Subject:  vPharmacy  Big  Saving,   the very best   generic  
medication  on  net!!   ovapq 3exnri2h
To:  [EMAIL PROTECTED]
X-Sender:  [EMAIL PROTECTED]
...
...


Question: Why does the header of this false negative do not contain any score 
information from SA? For other mails, be it hams or spams, I can see that there 
are scores information written in their headers. This is the full message 
source of that false negative:

Appreciate all comments. Many thanks.

--
Roger


---
Sign Up for free Email at http://ureg.home.net.my/
---


Re: Spam abuse report plugin

2008-03-27 Thread Jari Fredriksson
 I get a lot of spam on my servers which get detected by
 SA though are generated by innocent mail servers.
 
 We see a lot of mail users have insanely simple passwords
 , spammers are using these accounts and send spam. By the
 time the administrator realizes the server has sent
 1000's of spam 
 
 If spamassassin had an option to send abuse report to
 servers automatically and send mails to
 abuse@server-admin the moment the first sure spam comes
 in the admin could be warned before much damage has been
 done. Obviously we limit to only 1 or 2 reports in an
 hour to a particular id 
 

You could open a reporting account at SpamCop.net, and carefully redirect 
certain spam messages to their service (via email). SpamCop then generates an 
abuse report.

After SpamCop receives your report, they send you (the configured email address 
there) a confirmation mail, which has to be handled by you manually, or by a 
robot (like spamcup). When confirmed, they send abuse-reports on your behalf.

If you want to automate this, it needs some scripting (and automating it may be 
against SpamCop's policy), but it can be done.

Automatic system works quite well, if you can be sure not to post false 
positives there.

Abuse reporting is not SA's job, but it's a job well done by SpamCop.net





Re: Celebrity spams

2008-03-27 Thread penny/dell

here is the raw body of one of the emails

http://pastebin.com/m71e204d



Luis Hernán Otegui wrote:
 
 
 
 Could you please post a full message to some place accessible to
 everybody? (e.g., pastebin).
 
 
 
 

-- 
View this message in context: 
http://www.nabble.com/Celebrity-spams-tp16274451p16325030.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Spam abuse report plugin

2008-03-27 Thread Justin Mason

Jari Fredriksson writes:
  I get a lot of spam on my servers which get detected by
  SA though are generated by innocent mail servers.
  
  We see a lot of mail users have insanely simple passwords
  , spammers are using these accounts and send spam. By the
  time the administrator realizes the server has sent
  1000's of spam 
  
  If spamassassin had an option to send abuse report to
  servers automatically and send mails to
  abuse@server-admin the moment the first sure spam comes
  in the admin could be warned before much damage has been
  done. Obviously we limit to only 1 or 2 reports in an
  hour to a particular id 
  
 
 You could open a reporting account at SpamCop.net, and carefully redirect 
 certain spam messages to their service (via email). SpamCop then generates an 
 abuse report.
 
 After SpamCop receives your report, they send you (the configured email 
 address there) a confirmation mail, which has to be handled by you manually, 
 or by a robot (like spamcup). When confirmed, they send abuse-reports on your 
 behalf.
 
 If you want to automate this, it needs some scripting (and automating it may 
 be against SpamCop's policy), but it can be done.
 
 Automatic system works quite well, if you can be sure not to post false 
 positives there.
 
 Abuse reporting is not SA's job, but it's a job well done by SpamCop.net

in fact, SpamAssassin supports it using the Spamcop plugin.

--j.


Re: SORBS_DUL

2008-03-27 Thread Justin Mason

James E. Pratt writes:
  Do your own queries and whois lookups...but these address blocks are
  INCORRECTLY LISTED BY SORBS and they refuse (yes, I've heard from
  them) to remove them.  Apparently because our inbound and outbound
  MTA's don't use the same addresses!  I have no idea what crack-monkey
  at SORBS wrote that, but that was the response we got in relation to
  our request to remove our IP's.
  
  I hope that clears it up :)
  
  Cheers,
  
  James
 
 Sigh... Can we clear this up for _real_??
 
 ... Regardless of whether or not SORBS listings are accurate or not,
 or should or should not be included in SA, apparently some people cannot
 read, or are overly confused...   [...]
 If you are listed in the Spam Database read the Spam Database FAQ, then
 and only then you have 2 options. 
 Pay the fine, and get delisted. 

Actually, I think you're the one who's confused.

That's the SORBS Spam Database, which SpamAssassin does not use due to
this delisting fee.  James is talking about the DUHL, an entirely
different SORBS list.

--j.


Re: Spam abuse report plugin

2008-03-27 Thread Michael Scheidell

 From: ram [EMAIL PROTECTED]
 Date: Thu, 27 Mar 2008 15:36:04 +0530
 To: spamassassin-users users@spamassassin.apache.org
 Subject: Spam abuse report plugin
 
 I get a lot of spam on my servers which get detected by SA though are
 generated by innocent mail servers.
 
 We see a lot of mail users have insanely simple passwords , spammers are
 using these accounts and send spam. By the time the administrator
 realizes the server has sent 1000's of spam
So you would spam the abuse@ account '-)

 
 If spamassassin had an option to send abuse report to servers
 automatically and send mails to abuse@server-admin the moment the
 first sure spam comes in the admin could be warned before much damage
 has been done. Obviously we limit to only 1 or 2 reports in an hour to a
 particular id 

Best is to set up something to use 'spamassassin -r' (report) feature.
Set up a SpamCop account, put that information in local.cf.
SpamCop will scan the emails for uri's add them to uri blacklists, add the
server to spamcop blacklists, track down the responsible isp, and pre-format
a complain email.

If you have DCC and RAZOR, it will also submit the information to those
databases.

NOTE: YOU DO NOT WANT TO AUTOMATICALLY SEND REPORTS AS THIS _WILL_ SPAM
INNOCENT, FORGED DOMAINS ADDING TO THE BACKSCATTER PROBLEMS.


-- 
Michael Scheidell, CTO
|SECNAP Network Security
Winner 2008 Network Products Guide Hot Companies
FreeBSD SpamAssassin Ports maintainer
Charter member, ICSA labs anti-spam consortium

_
This email has been scanned and certified safe by SpammerTrap(tm). 
For Information please see http://www.spammertrap.com
_


Re: Spam abuse report plugin

2008-03-27 Thread ram
On Thu, 2008-03-27 at 10:04 -0400, Michael Scheidell wrote:
  From: ram [EMAIL PROTECTED]
  Date: Thu, 27 Mar 2008 15:36:04 +0530
  To: spamassassin-users users@spamassassin.apache.org
  Subject: Spam abuse report plugin
  
  I get a lot of spam on my servers which get detected by SA though are
  generated by innocent mail servers.
  
  We see a lot of mail users have insanely simple passwords , spammers are
  using these accounts and send spam. By the time the administrator
  realizes the server has sent 1000's of spam
 So you would spam the abuse@ account '-)
 
  
  If spamassassin had an option to send abuse report to servers
  automatically and send mails to abuse@server-admin the moment the
  first sure spam comes in the admin could be warned before much damage
  has been done. Obviously we limit to only 1 or 2 reports in an hour to a
  particular id 
 
 Best is to set up something to use 'spamassassin -r' (report) feature.
 Set up a SpamCop account, put that information in local.cf.
 SpamCop will scan the emails for uri's add them to uri blacklists, add the
 server to spamcop blacklists, track down the responsible isp, and pre-format
 a complain email.
 
Ok.  Will definitely try this Thanks. Does this work with the free
spamcop report id too 

 If you have DCC and RAZOR, it will also submit the information to those
 databases.
 
 NOTE: YOU DO NOT WANT TO AUTOMATICALLY SEND REPORTS AS THIS _WILL_ SPAM
 INNOCENT, FORGED DOMAINS ADDING TO THE BACKSCATTER PROBLEMS.
 
 

I personally dont like the traditional spamcop report method of
forwarding
Spamcop uses a double confirm method, and to confirm all mails is a
pain. I will look at how to automate this. I trust spamcop should not
mind. This is building spamcops database of spam originating machines 

  I do not see how I will spam the abuse@domain or contribute to
backscatter, because the report will not be sent to the email-from
domain , but to the administrator of the mailserver from where the mail
originated ( That could be forged too .. but the percentages are too
small to bother about ), I assume these ips will have PTR's and point to
proper domains  else discard 
 anyway 2 report mails an hour , will not spam an abuse@ account IMHO


Thanks
Ram



















Re: Celebrity spams

2008-03-27 Thread --[ UxBoD ]--
why not :-

util_rb_2tld  grupogsv.com

as that appears as part of the link ?

Regards,

-- 
--[ UxBoD ]--
// PGP Key: curl -s http://www.splatnix.net/uxbod.asc | gpg --import
// Fingerprint: F57A 0CBD DD19 79E9 1FCC A612 CB36 D89D 2C5A 3A84
// Keyserver: www.keyserver.net Key-ID: 0x2C5A3A84
// Phone: +44 845 869 2749 SIP Phone: [EMAIL PROTECTED]

- penny/dell [EMAIL PROTECTED] wrote:

 here is the raw body of one of the emails
 
 http://pastebin.com/m71e204d
 
 
 
 Luis Hernán Otegui wrote:

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.



Re: SORBS_DUL

2008-03-27 Thread mouss

James Gray wrote:

Matt Kettler wrote:

James Gray wrote:


Sorbs sux, don't use it.  Last time we had this problem they wanted 
money (and not an insignificant amount either) to remove a listing 
from their systems.  They arbitrarily add addresses to a database 
the IP's owner can't control, then demand money to remove the 
listing; where I come from, that's called extortion.
SORBS is an Australian entity, so they're local to you, at least in 
a legal system sense..  If it is extortion in your legal system, you 
might want to take advantage of that fact.


Yes I'm aware of that :-/  Embarrassing isn't it?  Unfortunately, 
being on SORBS_DUL doesn't impact us directly, and despite the claims 
that removal is free, th reality is proving to be quite different.


Regardless,  what matters from a spamassassin perspective is the 
accuracy of the list. That's the primary criteria that will get a 
list kicked out.


Indeed.  Having not used SORBS, and not missing them, I have no stats 
of my own to confirm or deny the accuracy of the list.  Only that our 
IP blocks have been listed and we have been given no explanation why; 
only that we must overhaul our DNS and MTA systems to suit SORBS, then 
maybe they will delist us.


SORBS-DUL is one of the most accurate RBLs spamassassin uses in the 
mass-check tests. 99.4% of its hits are spam. This beats out all 
other RBLs in spamassassin's config except PBL (which ties it), XBL, 
and 4 lists with very low hit rates that wound up with no nonspam hits.


See above.

If it's really as arbitrary and random as you claim, how's it so 
accurate in real world tests?


No idea.  I'd hazard a guess that the previous admin's actions at some 
point got us listed; but he's moved to the opposite side of the 
country and the silence from SORBS as to why we were listed in the 
first place leaves me with one of two conclusions: previous admin 
screwed up royally (possible but unlikely), SORBS listed our IP's 
without fair justification.


Personally, it sounds like they listed you, and you've got a personal 
beef. The real world tests don't support your claims that it's 
operated on an arbitrary basis.


I've just got customers (ISP's) on my back to get the MTA's IPs off 
the list.  SORBS are being about as unco-operative as I've ever 
experienced in my years as an admin.  My frustrations are firmly aimed 
at the one body that is causing me pain: SORBS.  When all this is 
over, I still wont use SORBS :)


We've crossed paths on other lists Matt, thanks for your objectivism.  
I need sleep and some quiet (from the customers and management) so 
maybe some of comment regarding SORBS have been a little harsh.  
Interestingly  the customers (mostly APAC ISP wholesalers) *all* have 
similar opinions of SORBS as an entity to interact with.


and you continue. please stop this now. if you have real information 
about sorbs or any dnsbl, say it, but once again, provide evidence. if 
it's just litterature, we don't care.


1) you started this thread by accusing sorbs of many things without 
providing any evidence (what IP, what you did to get delisted, ... etc) 
and when I asked you, you went saying random stuff. then you continued 
insulting sorbs people (crack-monkey...). 


2) At the same time:

- the address you use had a bogus MX (didn't check if you fixed this)
- two of the IPs you showed didn't have rDNS (like most IPs of your block)
- your NS servers had a TTL of less about 7 minutes. whether this is RFC 
compliant or not is irrelavant. No RFC forbids spam. and in any case, 
this can hardly match your claim ... The default TTL is the recommended 
3600 seconds for both forward and reverse...


these few points give you a bad reputation. as a result, you need to 
do efforst to become nuetral, lest to be able to claim things against 
a widely used DNSBL.


3) After few exchanges, we learn that the network was administered by 
someone else. you didn't say this at start. if we continue, may be we'll 
learn other stuff...


4) you feel very confortable at attacking others without accepting your 
share of responsibility. it's someone else's fault... don't you think 
it's too easy?


5) instead of asking for information first, you started a crusade. this 
is not the way to go. more people know sorbs than you.


6) you'll have a hard time convincing me that being listed at sorbs 
causes SA to tag your mail as spam. as I said earlier, SA is score based 
and being listed at sorbs is not enough. in fact, you are frustrated and 
want a revenge. This is not the right place.


7) you failed to find the mailing list address on the sorbs site. a 
simple search of mailing with a browser finds it immediately.


8) your Talk to some admins who've been in this situation. is 
completely silly. This is not honest as it suggests to the unaware 
reader that sorbs has many problems. besides, most problems we have are 
caused by some admins.


9) there is no evidence that your network didn't spam people before. 

Net::DNS .060 allows remote attackers to cause DOS

2008-03-27 Thread Michael Scheidell

From:
http://search.cpan.org/src/OLAF/Net-DNS-0.63/Changes

Fix rt.cpan.org #30316  Security issue with Net::DNS Resolver.

 Net/DNS/RR/A.pm in Net::DNS 0.60 build 654 allows remote attackers  to 
cause a denial of service (program croak) via a crafted DNS
 response (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6341). Packet  
parsing routines are now enclosed in eval blocks to trap exception

 and avoid premature termination of user program.

Fix: Update to 0.63.

Note: to Freebsd Ports SpamAssassin users: A minor update to SA will 
include dependency on 0.63.  pt-Net-DNS was updated on ports tree 10 
days ago:

http://www.freebsd.org/cgi/query-pr.cgi?pr=120702

An official update to SA ports version 3.4.2_3 will be send to ports 
shortly.


--
Michael Scheidell, CTO
Main: 561-999-5000, Office: 561-939-7259
 *| *SECNAP Network Security Corporation
Winner 2008 Technosium hot company award.
www.technosium.com/hotcompanies/ http://www.technosium.com/hotcompanies/


_
This email has been scanned and certified safe by SpammerTrap(tm). 
For Information please see http://www.spammertrap.com

_


Re: OT: uribl.com folks awake?

2008-03-27 Thread Dallas Engelken

Jonathan Nichols wrote:
div class=moz-text-flowed style=font-family: -moz-fixedSorry for 
the OT. I've been trying to get in touch with whoever is in charge of 
URIBL zonefile mirrors without success.


Is this thing on? Ping me offlist, por favor. I may have just been 
pinging the wrong people.




http://www.uribl.com/contact.shtml
---  For DNS questions not related to listings.. that includes zone 
information, transfers, outages, etc. Use dnsadmin at uribl dot com 
mailto:[EMAIL PROTECTED].


Have you done that?

--
Dallas Engelken
[EMAIL PROTECTED]
http://uribl.com



Blogspot spam update information (NetCraft statistics)

2008-03-27 Thread Bookworm
According to the Netcraft News for March, 2008, they showed some 
interesting growth in Blogspot.


Google increases its developer share by gaining 842 thousand hostnames; 
most of which are used for blogspot.com blogs.


I wonder how many of those 842,000 blogspot.com blogs were autocreated 
spam sites? 
Also, if that will drop next month as Google hopefully figures out how 
to slow down the bots, and deletes the existing spamsites.







Re: Net::DNS .060 allows remote attackers to cause DOS

2008-03-27 Thread Justin Mason

Michael Scheidell writes:
 From:
 http://search.cpan.org/src/OLAF/Net-DNS-0.63/Changes
 
 Fix rt.cpan.org #30316  Security issue with Net::DNS Resolver.
 
   Net/DNS/RR/A.pm in Net::DNS 0.60 build 654 allows remote attackers  to
 cause a denial of service (program croak) via a crafted DNS
   response (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6341). Packet 
 parsing routines are now enclosed in eval blocks to trap exception
   and avoid premature termination of user program.


worth noting this --
https://bugzilla.redhat.com/show_bug.cgi?id=426437 :

  Comment #1 From Josh Bressers (Security Response Team) on
  2008-01-07 21:12 EST
  
  This issue has no security impact.  The flaw will cause Net::DNS to
  croak, which in turn should be handled by the calling application.  In
  the case of RHEL, the only known application that uses this
  functionality is Spamassassin. Spamassassin handles this failure
  gracefully and continues to function, minus the DNS tests.

we haven't seen details of the vulnerability, but I think Josh's take on
the issue sounds correct.

if anyone has a demo of the bug, please pass it on so we can try it out.

--j.


Re: Net::DNS .060 allows remote attackers to cause DOS

2008-03-27 Thread Michael Scheidell

Justin Mason wrote:
  
  This issue has no security impact.  The flaw will cause Net::DNS to

  croak, which in turn should be handled by the calling application.  In
  the case of RHEL, the only known application that uses this
  functionality is Spamassassin. Spamassassin handles this failure
  gracefully and continues to function, minus the DNS tests.

we haven't seen details of the vulnerability, but I think Josh's take on
the issue sounds correct.

if anyone has a demo of the bug, please pass it on so we can try it out.

  

i guess a 'croak' isn't a dos... ;-)

its in freebsd ports, a 'portupgrade p5-Net-DNS' should update it quickly.


--j.

  



--
Michael Scheidell, CTO
Main: 561-999-5000, Office: 561-939-7259
 *| *SECNAP Network Security Corporation
Winner 2008 Technosium hot company award.
www.technosium.com/hotcompanies/ http://www.technosium.com/hotcompanies/

_
This email has been scanned and certified safe by SpammerTrap(tm). 
For Information please see http://www.spammertrap.com

_


What to do about address spoofing

2008-03-27 Thread R.Smits
Hello,

Is there something I can do that our company addresses cannot be used
for sending spam ? Is DKIM an answer ?
A lot of our users get delivery failed messages. So a spammer is
sending spam with our addresses :-(

A difficult problem I think ?

Greetings... Richard Smits


RE: :DNS .060 allows remote attackers to cause DOS

2008-03-27 Thread Robert - elists
 

 

From: 
http://search.cpan.org/src/OLAF/Net-DNS-0.63/Changes

Fix rt.cpan.org #30316  Security issue with Net::DNS Resolver.

  Net/DNS/RR/A.pm in Net::DNS 0.60 build 654 allows remote attackers  to
cause a denial of service (program croak) via a crafted DNS
  response (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6341). Packet
parsing routines are now enclosed in eval blocks to trap exception
  and avoid premature termination of user program.

Fix: Update to 0.63.

Note: to Freebsd Ports SpamAssassin users: A minor update to SA will include
dependency on 0.63.  pt-Net-DNS was updated on ports tree 10 days ago:
http://www.freebsd.org/cgi/query-pr.cgi?pr=120702

An official update to SA ports version 3.4.2_3 will be send to ports shortly

 

Hm.

 

Is the post above from Scheidell a BSD *port* update only related issue
posting ???

 

There have been 3 updates to perl-Net-DNS in the last 8 months since .60

 

We have been using .63 since about Feb 21 2008

 

 - rh



RE: What to do about address spoofing

2008-03-27 Thread Bowie Bailey
R.Smits wrote:
 Hello,
 
 Is there something I can do that our company addresses cannot be used
 for sending spam ? Is DKIM an answer ?
 A lot of our users get delivery failed messages. So a spammer is
 sending spam with our addresses :-(
 
 A difficult problem I think ?
 
 Greetings... Richard Smits

There is really nothing that you can do to prevent spammers from using
your address.  You can do things like DKIM and SPF to attempt to
validate good mail from your domain, but this relies on the receiving
server doing the necessary checks.

We are having the same problem.  One of our addresses has been used
consistently by spammers for the past couple of years.  Recently the
problem has gotten much worse.  This address has received over 57,000
bounce messages in the past two weeks!  I now have a rule in my mail
server to detect and drop these messages.

-- 
Bowie


RE: Spam abuse report plugin

2008-03-27 Thread Michele Neylon :: Blacknight
As long as you whitelist MailScanner.info

I am sick to my teeth of receiving abuse reports about a domain that never 
sends email and is used to block spam

/me wanders off to rant elsewhere


--
Mr Michele Neylon
Blacknight Solutions
Hosting  Colocation, Brand Protection
http://www.blacknight.com/
http://blog.blacknight.com/
Intl. +353 (0) 59  9183072
Locall: 1850 929 929
Direct Dial: +353 (0)59 9183090
Fax. +353 (0) 1 4811 763
---
Blacknight Internet Solutions Ltd, Unit 12A,Barrowside Business Park,Sleaty 
Road,Graiguecullen,Carlow,Ireland  Company No.: 370845


Re: Spam abuse report plugin

2008-03-27 Thread Jari Fredriksson
 As long as you whitelist MailScanner.info
 
 I am sick to my teeth of receiving abuse reports about a
 domain that never sends email and is used to block spam 
 
 /me wanders off to rant elsewhere

WTF? is this all about?

Who has reported MailScanner.info as a spammer?




purge byes in sql

2008-03-27 Thread Miguel
Hi, does SA takes care of purging old bayesian records stored in mysql 
similar what it does to the traditional DB files?

If not, what is the recommended procedure to do so?
regards


Re: What to do about address spoofing

2008-03-27 Thread Bookworm

Bowie Bailey wrote:

R.Smits wrote:
  

Hello,

Is there something I can do that our company addresses cannot be used
for sending spam ? Is DKIM an answer ?
A lot of our users get delivery failed messages. So a spammer is
sending spam with our addresses :-(

A difficult problem I think ?

Greetings... Richard Smits



There is really nothing that you can do to prevent spammers from using
your address.  You can do things like DKIM and SPF to attempt to
validate good mail from your domain, but this relies on the receiving
server doing the necessary checks.

We are having the same problem.  One of our addresses has been used
consistently by spammers for the past couple of years.  Recently the
problem has gotten much worse.  This address has received over 57,000
bounce messages in the past two weeks!  I now have a rule in my mail
server to detect and drop these messages.

  
At least _part_ of this problem could be fixed by more sites using a 
valid rcptto check _before_ they accept the message, rather than 
taking any and all messages to their domain, THEN spamming everyone with 
rejections. 

I used to have hundreds of 'can't send the failure message' messages in 
my queue prior to enabling this for most customers.  Now it's down to 
two or three, at most, from people inside the customer site doing 
strange things.





Re: purge byes in sql

2008-03-27 Thread Theo Van Dinter
On Thu, Mar 27, 2008 at 11:32:17AM -0600, Miguel wrote:
 Hi, does SA takes care of purging old bayesian records stored in mysql 
 similar what it does to the traditional DB files?

Yes.

-- 
Randomly Selected Tagline:
My opinions may have changed, but not the fact that I am right.
  - Ashleigh Brilliant


pgp3aNSXcjhLM.pgp
Description: PGP signature


RE: Spam abuse report plugin

2008-03-27 Thread Michele Neylon :: Blacknight
Jari

A LOT of clueless mail server admins send us reports about mailscanner.info

We have a standard reply telling them to get a $clue, but I'd prefer that my 
staff's time was spent dealing with proper issues :)


--
Mr Michele Neylon
Blacknight Solutions
Hosting  Colocation, Brand Protection
http://www.blacknight.com/
http://blog.blacknight.com/
Intl. +353 (0) 59  9183072
Locall: 1850 929 929
Direct Dial: +353 (0)59 9183090
Fax. +353 (0) 1 4811 763
---
Blacknight Internet Solutions Ltd, Unit 12A,Barrowside Business Park,Sleaty 
Road,Graiguecullen,Carlow,Ireland  Company No.: 370845





tmp file handling

2008-03-27 Thread NFN Smith
I'm currently running spamassassin 3.2.1-1~bpo.1 from the Debian 
etch-backports branch (yes, I know that backports now has 3.2.4 
available, and I'll be upgrading shortly).


On my installation, I'm calling SpamAssassin from MIMEDefang, and so I'm 
not running spamc and spamd .


I just discovered that over the last several weeks, I'm getting an 
accumulation of hidden .spamassassin temporary files accumulating in 
/tmp, that aren't getting deleted, and as a result, that volume is 
filling up.


I'm not aware of any operational changes that have been made, so this 
one is puzzling.


I can easily set a cron job to find and discard the accumulation, but 
I'd prefer to find the source of why these files are getting left in 
/tmp, and fix the problem, rather than simply managing the symptoms.


Any idea of why this might be happening?

Smith



RE: tmp file handling

2008-03-27 Thread Jason Bertoch
-Original Message-
From: news [mailto:[EMAIL PROTECTED] On Behalf Of NFN Smith
Sent: Thursday, March 27, 2008 2:35 PM
To: users@spamassassin.apache.org
Subject: tmp file handling

I'm currently running spamassassin 3.2.1-1~bpo.1 from the Debian 
etch-backports branch 

On my installation, I'm calling SpamAssassin from MIMEDefang, and so I'm 
not running spamc and spamd .

I just discovered that over the last several weeks, I'm getting an 
accumulation of hidden .spamassassin temporary files accumulating in 
/tmp, that aren't getting deleted, and as a result, that volume is 
filling up.


There was a version upgrade to SpamAssassin some time ago that broke the way
MIMEDefang was handling those files.  David released a new version of MD
shortly thereafter that fixed the issue.

Jason A. Bertoch
Network Administrator
[EMAIL PROTECTED]
Electronet Broadband Communications
3411 Capital Medical Blvd.
Tallahassee, FL 32308
(V) 850.222.0229 (F) 850.222.8771




Re: tmp file handling

2008-03-27 Thread NFN Smith

Jason Bertoch wrote:

I just discovered that over the last several weeks, I'm getting an 
accumulation of hidden .spamassassin temporary files accumulating in 
/tmp, that aren't getting deleted, and as a result, that volume is 
filling up.



There was a version upgrade to SpamAssassin some time ago that broke the way
MIMEDefang was handling those files.  David released a new version of MD
shortly thereafter that fixed the issue.



Hmmm... So this may be an issue with MIMEDefang.

The Debian release number of MIMEDefang I'm running is 2.57-5.  It may 
be that when Debian froze what went into etch, the current copy of MD 
was the one with that glitch in it.


I'll check the MD archives for release notes, and see what's in the 
Testing branch.


Thanks for the tip.

Smith



Re: What to do about address spoofing

2008-03-27 Thread mouss

R.Smits wrote:

Hello,

Is there something I can do that our company addresses cannot be used
for sending spam ? Is DKIM an answer ?
A lot of our users get delivery failed messages. So a spammer is
sending spam with our addresses :-(

A difficult problem I think ?
  


you can reject (or tag) some of these by looking for forgery signs, 
provided the NDR reports the headers of the original message. for 
instance, nothing on earth should put a Received header with by 
netoyen.net, from netoyen.net or helo netoyen.net (the domain name 
is never used without a host label).


unfortunately, some sites send plain dumb NDRs: you can't even guess the 
original sender (because some sites send NDRs to the From header, mostly 
because of broken mix of software that loses the envelope sender).


Most of these are from sites that fail to validate recipients at 
reception time (at the edge of their network). this setup was once 
considered valid, but in these joe job days, it is no more acceptable 
(some sites even include the original attachment, which may be spammy or 
even infected). For this reason, blacklisting may be appropriate.


The rare times I tried complaining to postmaster and abuse, I got an NDR 
(again?). And once, I got directions on how to remove viruses from my 
machine (!!!) together with links to symantec (so not only do they 
ignore complaints, but they use them to send commercial ads!). of 
course, the ISP (wanadoo.fr) was overwhelmed (I alone got 2000 NDRs in 
few hours. this should give an idea about the number of NDRs they sent) 
and sat up an auto-responder targetting their users (since then, they no 
more send backscatter. so the situation is good for us, but not for 
their users, who reportedly lose mail).


from experience, backscatter storms have a relatively short duration for 
a given address (spam run). if this happens to you, you can block NDRs 
for the victim address until the storm stops. in case this is too risky, 
most of the times, the original messages have common patterns (they got 
out via few hosts, they have the same structure, charset, ...) so simple 
header and body matching can catch them.


Re: tmp file handling

2008-03-27 Thread Kris Deugau

NFN Smith wrote:

Hmmm... So this may be an issue with MIMEDefang.

The Debian release number of MIMEDefang I'm running is 2.57-5.  It may 
be that when Debian froze what went into etch, the current copy of MD 
was the one with that glitch in it.


I'll check the MD archives for release notes, and see what's in the 
Testing branch.


Just checked the changelog;  there was a fix for this in MD 2.63 upstream:

2007-08-13  David F. Skoll  [EMAIL PROTECTED]

* VERSION 2.63 RELEASED

* mimedefang.pl.in(spam_assassin_status): Call $mail-finish()
to prevent temporary files from accumulating.


Backporting the Debian package should be a matter of snagging the source 
from testing or unstable and rebuilding on stable.  I'd suggest unstable 
unless it has bizarre dependencies on too many things.


You might also check the volatile repository;  there might be a newer 
MD in there.  (As well as SA, come to think of it.)


-kgd


Re: tmp file handling

2008-03-27 Thread Kelson

NFN Smith wrote:
The Debian release number of MIMEDefang I'm running is 2.57-5.  It may 
be that when Debian froze what went into etch, the current copy of MD 
was the one with that glitch in it.


I'll check the MD archives for release notes, and see what's in the 
Testing branch.


The fix went into MIMEDefang 2.63.  That's only one release back (the 
latest is 2.64), so you might want to look into the 2.64 changes while 
you're at it.


Relevant section from the 2.63 changelog:

mimedefang.pl.in(spam_assassin_status): Call $mail-finish() to
prevent temporary files from accumulating.


http://mimedefang.org/node.php?id=64

--
Kelson Vibber
SpeedGate Communications www.speed.net


Re: tmp file handling

2008-03-27 Thread NFN Smith

Kris Deugau wrote:

NFN Smith wrote:




I'll check the MD archives for release notes, and see what's in the 
Testing branch.


Just checked the changelog;  there was a fix for this in MD 2.63 upstream:


Yep.  I found that shortly after I posted.

Backporting the Debian package should be a matter of snagging the source 
from testing or unstable and rebuilding on stable.  I'd suggest unstable 
unless it has bizarre dependencies on too many things.


You might also check the volatile repository;  there might be a newer 
MD in there.  (As well as SA, come to think of it.)



In Debian, 2.64-1 are the current versions in both Testing and Unstable.

As a general rule, I try to not use stuff from Unstable on working 
servers.  I checked, and there's updates for SA at volatile.debian.org, 
but not for MD.


For now, I think getting MD 2.64-1 from Testing will do what I need.

Thanks for the responses.

Smith



Re: Net::DNS .060 allows remote attackers to cause DOS

2008-03-27 Thread mouss

Michael Scheidell wrote:

From:
http://search.cpan.org/src/OLAF/Net-DNS-0.63/Changes

Fix rt.cpan.org #30316  Security issue with Net::DNS Resolver.

 Net/DNS/RR/A.pm in Net::DNS 0.60 build 654 allows remote attackers  
to cause a denial of service (program croak) via a crafted DNS
 response (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6341). Packet  
parsing routines are now enclosed in eval blocks to trap exception

 and avoid premature termination of user program.

Fix: Update to 0.63.

Note: to Freebsd Ports SpamAssassin users: A minor update to SA will 
include dependency on 0.63.  pt-Net-DNS was updated on ports tree 10 
days ago:

http://www.freebsd.org/cgi/query-pr.cgi?pr=120702

An official update to SA ports version 3.4.2_3 will be send to ports 
shortly.


you mean 3.4.2_3 I guess.

PS. shouldn't the audit db be updated?




Re: What to do about address spoofing

2008-03-27 Thread Martin Gregorie
On Thu, 2008-03-27 at 16:05, R.Smits wrote:
 Hello,
 
 Is there something I can do that our company addresses cannot be used
 for sending spam ? Is DKIM an answer ?
 A lot of our users get delivery failed messages. So a spammer is
 sending spam with our addresses :-(
 
 A difficult problem I think ?
 
It might be co-incidence, but the amount of back-scatter[1] I was
getting dried up very soon after I set up an SFP record for my domain.
Backscatter is now almost non-existent. See http://www.openspf.org/ for
a definition and http://www.kitterman.com/spf/validate.html for useful
tools for creating and testing an SFP record. 

[1] mail rejection notices received as the result of my address being
forged as the sender of spam. 

Martin




Re: Header of a false negative mail

2008-03-27 Thread Matt Kettler

Sn!per wrote:

I would appreciate if folks can explain to me about the header of a false 
negative email that I received:
...
...
Reply-To:  Gene Blackwell [EMAIL PROTECTED]
Sender:  [EMAIL PROTECTED]
Subject:  vPharmacy  Big  Saving,   the very best   generic  
medication  on  net!!   ovapq 3exnri2h
To:  [EMAIL PROTECTED]
X-Sender:  [EMAIL PROTECTED]
...
...


Question: Why does the header of this false negative do not contain any score 
information from SA? For other mails, be it hams or spams, I can see that there 
are scores information written in their headers. This is the full message 
source of that false negative:

Appreciate all comments. Many thanks.


Well, I can only conclude the message was never fed to SpamAssassin. 
There's no way to stop SA from at least adding an X-Spam-Checker-Version 
header to every message it scans, short of modifying the code.


Can you tell us a bit about your setup? How do you integrate SA into 
your mail chain? Procmail?


Does your domain have multiple MXes? Did the message come in through a 
lower-priority MX than the rest of your mail?





Unsubscribe

2008-03-27 Thread Femitha Majeed

Hi,
 
Can you please tell me how to unsubscribe to this mailing list. I tried all 
that they suggested on the website but failed.
 
Thanks.
_
In a rush?  Get real-time answers with Windows Live Messenger.
http://www.windowslive.com/messenger/overview.html?ocid=TXT_TAGLM_WL_Refresh_realtime_042008

Re: Unsubscribe

2008-03-27 Thread Matt Kettler

Femitha Majeed wrote:

Hi,
 
Can you please tell me how to unsubscribe to this mailing list. I 
tried all that they suggested on the website but failed.

Could you be more specific?

The SpamAssassin lists website 
(http://wiki.apache.org/spamassassin/MailingLists) advises you send mail 
to [EMAIL PROTECTED]


Is that what you did?

What happened?

Did you get anything back in response?




Detail Spam Scoring

2008-03-27 Thread Jeff Koch


We used to get detailed spam scoring in the email headers but it seems to 
have disappeared after installing 3.2.4. Is there some command for turning 
the detailed scoring back on. Can someone please tell me what it is?


Thanks



Best Regards,

Jeff Koch, Intersessions 



Bounce back spam

2008-03-27 Thread Jeff Koch


Our users are getting inundated with bounce-back, joe-job spam. We have the 
Vbounce.pm plugin enabled (v3.2.4) and have a 'whitelist_bounce_relays' 
with the name of the mailserver in the local.cf file and the 'failure 
notices', 'mail delay' and undeliverables don't seem to be getting any 
score at all.


Here's the portion of the header from one showing almost no score: ('s 
added to protect our innocent mailserver.)



Received: (qmail 29961 invoked for bounce); 28 Mar 2008 03:48:18 +0900
X-Spam-Checker-Version: SpamAssassin 3.2.4 (2008-01-01) on x.x.com
X-Spam-Status: No, score=0.1 required=5.0 tests=MISSING_MID,RDNS_NONE 
autolearn=no version=3.2.4


Hi. This is the qmail-send program at xsp.fenics.jp.
I'm afraid I wasn't able to deliver your message to the following addresses.
This is a permanent error; I've given up. Sorry it didn't work out.





Best Regards,

Jeff Koch, Intersessions 



Re: Bounce Back Spam

2008-03-27 Thread Jeff Koch


Hi Matus:

Thanks but I don't even see these rules getting triggered. We have the
plugin enabled and the 'whitelist_bounce_relays  mailserver_name' line in
local.cf


At 12:09 PM 3/25/2008, you wrote:
On 25.03.08 12:00, Jeff Koch wrote:
  Our users are getting tons of bounce-back (joe job) spam starting Monday.
  The bounces-backs are getting very low scores. Is there anything we can
  do/change/adjust in SA to block these?

load VBounce plugin and increase scores for BOUNCE_MESSAGE,
CRBOUNCE_MESSAGE, VBOUNCE_MESSAGE and ANY_BOUNCE_MESSAGE

maybe SA could look at included headers (if they are RFC822 bounces)
to check if the original message was spam, and score apropriately, if it was
--
Matus UHLAR - fantomas, [EMAIL PROTECTED] ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Emacs is a complicated operating system without good text editor.

Best Regards,

Jeff Koch, Intersessions

Best Regards,

Jeff Koch, Intersessions