Howdy, Dave. Thanks for the reply. On 2 Jun 2003, Yorkshire Dave wrote:
> Call them all and use a meta || rule for the score, or call and score > them all then use a meta && rule to subtract some score back off, that's > what I'm doing here > > meta Z_OPEN_PROXY (X_OSIRU_OPEN_PROXY || X_OSIRU_OPEN_SOCKS || > X_MONKEYS_OPEN_PROXY) > describe Z_OPEN_PROXY Host is an open proxy server > score Z_OPEN_PROXY 1.4 > > Of course I could be totally wrong, but it works for me. That's a good idea. So in my case I'd do something like meta Z_DIALUPS (RCVD_IN_OSIRU_DUL || RCVD_IN_NJABL_DIALUP || RCVD_IN_MAPS_DUL || RCVD_IN_VISI_DIALUPS) describe Z_DIALUPS Host has a dynamically assigned IP score 2 So if any or all of them are hit, the only score any of them can score is 2, correct? Would this be something worth doing with blackholes.us rules? That's probably a bad example. SOCKS, proxy, formmail.cgi, and direct-to-mx are probably the best examples. I'm trying to learn more about the rule generation. I asked a while back but didn't get much in the way of responses. Tonight, while looking through my rules, I saw a number of things I need to change/fix. I need to actually organize my DNSBL rules. I didn't notice until tonight that I'm not actually re-querying the ORSS BL for the proxy check. I have it set up with check_rbl_sub. Now I actually see how that works! :) I need to find docs on how to create rules the right way before I seriously break something. > Yet again I could be totally wrong about this, but I think you're > wasting a lookup by querying proxies.relays.osirusoft.com, spamassassin > already did RCVD_IN_OSIRUSOFT_COM for you so all you need to do is > rbleval:check_rbl_results_for('osirusoft', '127.0.0.9') > I can't get to osirusoft website right now to check but istr something > like:- > > 127.0.0.2 = open relay > 127.0.0.3 = dialup > 127.0.0.4 = spam source > 127.0.0.5 = smart host > 127.0.0.6 = mirror of spamhaus.org/spamsites.org > 127.0.0.7 = non-confirm mailing lists > 127.0.0.8 = insecure formmail > 127.0.0.9 = open proxy > > as I said, I could be wrong, shouldn't be difficult to check when the > website comes back up. I was on it just a little while ago. Your list looks right. Smart host shouldn't be ready yet. It's going to be renamed to "outputs" when it's ready. IIRC it's a multihop list so no one should block with it. I'd score off it though. :) I wish Joe wouldn't put the SBL in 127.0.0.6 or with anything else. I'd like to reference seperately. I'm going to half to call it seperately I guess. While I have a human reading this thread, and one that knows more about rule creation than I do, I'm going to include the rules I created if you don't mind. (sorry for the ugly wrapping) # Reenabled MAPS checks score RCVD_IN_RSS 1 score RCVD_IN_DUL 1 ############### BEGIN relays.orsirusoft.com ###################### score RCVD_IN_OSIRU_PROXY 1 header RCVD_IN_OSIRU_PROXY rbleval:check_rbl_sub('osirusoft', '127.0.0.9') describe RCVD_IN_OSIRU_PROXY DNSBL: Insecure Proxy tflags RCVD_IN_OSIRU_PROXY net score RCVD_IN_OSIRU_INSECURE_LIST 1 header RCVD_IN_OSIRU_INSECURE_LIST rbleval:check_rbl_sub('osirusoft', '127.0.0.8') describe RCVD_IN_OSIRU_INSECURE_LIST DNSBL: Opts in without confirmation tflags RCVD_IN_OSIRU_INSECURE_LIST net ############### END relays.orsirusoft.com ###################### ############### BEGIN blackholes.us ###################### score RCVD_IN_BLKHO_ARGENTINA 1 header RCVD_IN_BLKHO_ARENTINA rbleval:check_rbl('blackholes.us-ar', 'argentina.blackholes.us.') describe RCVD_IN_BLKHO_ARENTINA ccTLD: sender is in Argentina tflags RCVD_IN_BLKHO_ARENTINA net score RCVD_IN_BLKHO_BRAZIL 1 header RCVD_IN_BLKHO_BRAZIL rbleval:check_rbl('blackholes.us-br', 'brazil.blackholes.us.') describe RCVD_IN_BLKHO_BRAZIL ccTLD: sender is in Brazil tflags RCVD_IN_BLKHO_BRAZIL net score RCVD_IN_BLKHO_CHINA 1 header RCVD_IN_BLKHO_CHINA rbleval:check_rbl('blackholes.us-ch', 'china.blackholes.us.') describe RCVD_IN_BLKHO_CHINA ccTLD: sender is in China tflags RCVD_IN_BLKHO_CHINA net score RCVD_IN_BLKHO_HONGKONG 1 header RCVD_IN_BLKHO_HONGKONG rbleval:check_rbl('blackholes.us-hk', 'hongkong.blackholes.us.') describe RCVD_IN_BLKHO_HONGKONG ccTLD: sender is in Hong Kong tflags RCVD_IN_BLKHO_HONGKONG net score RCVD_IN_BLKHO_JAPAN 1 header RCVD_IN_BLKHO_JAPAN rbleval:check_rbl('blackholes.us-jp', 'japan.blackholes.us.') describe RCVD_IN_BLKHO_JAPAN ccTLD: sender is in Japan tflags RCVD_IN_BLKHO_JAPAN net score RCVD_IN_BLKHO_KOREA 1 header RCVD_IN_BLKHO_KOREA rbleval:check_rbl('blackholes.us-kr', 'korea.blackholes.us.') describe RCVD_IN_BLKHO_KOREA ccTLD: sender is in Korea tflags RCVD_IN_BLKHO_KOREA net score RCVD_IN_BLKHO_MALAYSIA 1 header RCVD_IN_BLKHO_MALAYSIA rbleval:check_rbl('blackholes.us-my', 'malaysia.blackholes.us.') describe RCVD_IN_BLKHO_MALAYSIA ccTLD: sender is in Malaysia tflags RCVD_IN_BLKHO_MALAYSIA net score RCVD_IN_BLKHO_NIGERIA 1 header RCVD_IN_BLKHO_NIGERIA rbleval:check_rbl('blackholes.us-ng', 'nigeria.blackholes.us.') describe RCVD_IN_BLKHO_NIGERIA ccTLD: sender is in Nigeria tflags RCVD_IN_BLKHO_NIGERIA net score RCVD_IN_BLKHO_RUSSIA 1 header RCVD_IN_BLKHO_RUSSIA rbleval:check_rbl('blackholes.us-ru', 'russia.blackholes.us.') describe RCVD_IN_BLKHO_RUSSIA ccTLD: sender is in Russia tflags RCVD_IN_BLKHO_RUSSIA net score RCVD_IN_BLKHO_SINGAPORE 1 header RCVD_IN_BLKHO_SINGAPORE rbleval:check_rbl('blackholes.us-sg', 'singapore.blackholes.us.') describe RCVD_IN_BLKHO_SINGAPORE ccTLD: sender is in Singapore tflags RCVD_IN_BLKHO_SINGAPORE net score RCVD_IN_BLKHO_TAIWAN 1 header RCVD_IN_BLKHO_TAIWAN rbleval:check_rbl('blackholes.us-tw', 'taiwan.blackholes.us.') describe RCVD_IN_BLKHO_TAIWAN ccTLD: sender is in Taiwan tflags RCVD_IN_BLKHO_TAIWAN net score RCVD_IN_BLKHO_THAILAND 1 header RCVD_IN_BLKHO_THAILAND rbleval:check_rbl('blackholes.us-th', 'thailand.blackholes.us.') describe RCVD_IN_BLKHO_THAILAND ccTLD: sender is in Thailand tflags RCVD_IN_BLKHO_THAILAND net score RCVD_IN_BLKHO_TURKEY 1 header RCVD_IN_BLKHO_TURKEY rbleval:check_rbl('blackholes.us-tr', 'turkey.blackholes.us.') describe RCVD_IN_BLKHO_TURKEY ccTLD: sender is in Turkey tflags RCVD_IN_BLKHO_TURKEY net ############### END blackholes.us ###################### ############### BEGIN SORBS ###################### score RCVD_IN_SORBS 1 header RCVD_IN_SORBS rbleval:check_rbl('sorbs', 'dnsbl.sorbs.net.') describe RCVD_IN_SORBS SORBS: sender is listed in SORBS tflags RCVD_IN_SORBS net score RCVD_IN_SORBS_HTTP 1 header RCVD_IN_SORBS_HTTP rbleval:check_rbl('sorbs-http', 'http.dnsbl.sorbs.net.') describe RCVD_IN_SORBS_HTTP SORBS: Open HTTP Proxy tflags RCVD_IN_SORBS_HTTP net score RCVD_IN_SORBS_SOCKS 1 header RCVD_IN_SORBS_SOCKS rbleval:check_rbl('sorbs-socks', 'socks.dnsbl.sorbs.net.') describe RCVD_IN_SORBS_SOCKS SORBS: Open SOCKS Proxy tflags RCVD_IN_SORBS_SOCKS net score RCVD_IN_SORBS_MISC 1 header RCVD_IN_SORBS_MISC rbleval:check_rbl('sorbs-misc', 'misc.dnsbl.sorbs.net.') describe RCVD_IN_SORBS_MISC SORBS: Miscellaneous Open Proxy tflags RCVD_IN_SORBS_MISC net score RCVD_IN_SORBS_SMTP 1 header RCVD_IN_SORBS_SMTP rbleval:check_rbl('sorbs-smtp', 'smtp.dnsbl.sorbs.net.') describe RCVD_IN_SORBS_SMTP SORBS: Open SMTP Relay tflags RCVD_IN_SORBS_SMTP net score RCVD_IN_SORBS_WEB 1 header RCVD_IN_SORBS_WEB rbleval:check_rbl('sorbs-web', 'web.dnsbl.sorbs.net.') describe RCVD_IN_SORBS_WEB SORBS: Vulnerable WWW server (formmail.cgi, Code Red, Nimda) tflags RCVD_IN_SORBS_WEB net score RCVD_IN_SORBS_SPAM 1 header RCVD_IN_SORBS_SPAM rbleval:check_rbl('sorbs-spam', 'spam.dnsbl.sorbs.net.') describe RCVD_IN_SORBS_SPAM SORBS: Spam Source/Support tflags RCVD_IN_SORBS_SPAM net score RCVD_IN_SORBS_ZOMBIE 1 header RCVD_IN_SORBS_ZOMBIE rbleval:check_rbl('sorbs-zombie', 'zombie.dnsbl.sorbs.net.') describe RCVD_IN_SORBS_ZOMBIE SORBS: Hijacked netblock tflags RCVD_IN_SORBS_ZOMBIE net ############### END SORBS ###################### score RCVD_IN_MONKEYS_PROXIES 1 header RCVD_IN_MONKEYS_PROXIES rbleval:check_rbl('monkeys-proxies', 'proxies.relays.monkeys.com.') describe RCVD_IN_MONKEYS_PROXIES MONKEYS: Unsecured Proxy tflags RCVD_IN_MONKEYS_PROXIES net #dynablock.easynet.nl #blackholes.easynet.nl #proxies.blackholes.easynet.nl ############### BEGIN EASYNET ###################### # Formerly Wirehub score RCVD_IN_EASYNET 1 header RCVD_IN_EASYNET rbleval:check_rbl('easynet', 'blackholes.easynet.nl.') describe RCVD_IN_EASYNET EASYNET: Listed at Easynet.nl tflags RCVD_IN_EASYNET net score RCVD_IN_EASYNET_PROXIES 1 header RCVD_IN_EASYNET_PROXIES rbleval:check_rbl('easynet-proxies', 'proxies.blackholes.easynet.nl.') describe RCVD_IN_EASYNET_PROXIES EASYNET: Unsecured Proxy tflags RCVD_IN_EASYNET_PROXIES net score RCVD_IN_EASYNET_DYNABLOCK 1 header RCVD_IN_EASYNET_DYNABLOCK rbleval:check_rbl('easynet-dynablock', 'dynablock.blackholes.easynet.nl.') describe RCVD_IN_EASYNET_DYNABLOCK EASYNET: sender has a dynamically assigned IP tflags RCVD_IN_EASYNET_DYNABLOCK net ############### END EASYNET ###################### ############### BEGIN MISC CHECKS ###################### score RCVD_IN_DSBL_MULTIHOP 1 header RCVD_IN_DSBL_MULTIHOP rbleval:check_rbl_txt('dsbl', 'multihop.dsbl.org.') describe RCVD_IN_DSBL_MULTIHOP DSBL: received via a relay in multihop.dsbl.org tflags RCVD_IN_DSBL_MULTIHOP net score RCVD_IN_VISI_DIALUPS 1 header RCVD_IN_VISI_DIALUPS rbleval:check_rbl('visi-dialups', 'dialups.visi.com.') describe RCVD_IN_VISI_DIALUPS DNSBL: sender has a dynamically assigned IP tflags RCVD_IN_VISI_DIALUPS net Do you see any glaring mistakes in all of that? (we are DUL and RSS customers) I can send it as an attachment if desired. I don't know if I used the correct rbleval options or not. I see a number of rules in 20_dnsbl that look like check_rbl('osirusoft-notfirsthop' Is "-notfirsthop" some sort of code that SA looks for that I can use or dialups.visi.com for example? Is any of this documented anywhere? I can't find any mention of this. Thanks Justin ------------------------------------------------------- This SF.net email is sponsored by: eBay Get office equipment for less on eBay! http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5 _______________________________________________ Spamassassin-talk mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/spamassassin-talk