On Thursday 04 January 2007 2:53 pm, Jens Schleusener wrote:
> On Thu, 4 Jan 2007, John Rudd wrote:
> > Dimitri Yioulos wrote:
> > > First, I wish all a very happy and healthy New Year.
> > >
> > > I hope this is the proper place to ask this:  several days ago, I
> > > upgraded to Botnet-0.7 from 0.6; the latter had apparently been working
> > > fine with the installed SA 3.1.7.  I installed as per instruction (no
> > > heavy lifting there). Now, no Botnet rules are ever hit, even though I
> > > suspect that some particular spam has been sent via a bot.  If I
> > > reinstall 0.6, I get rule hits.  What have I not done/done wrong?
> > >
> > > Thanks.
> > >
> > > Dimitri
> >
> > Do you get much output if you take one of the messages and do this
> > (assuming you're on some form of unix):
> >
> >
> > spamassassin -D < $message_file | grep -i botnet
>
> I found a similar behaviour as described on a test server.
>
> Using
>
>  spamassassin -D < $message_file 2>&1 | grep -i botnet
>
> I found that in my case probably the default Botnet.cf configuration line
>
>  # If there are trusted relays, then look to see if there's a
>  # public IP address; if so, then pass the message through.
>  botnet_pass_trusted             public
>
> is the causer since the test server receives the mails from a mail relay
> that uses a private 172.x.x.x address. Debug extract with the
> default configuration:
>
>  dbg: Botnet: starting
>  dbg: Botnet: found private trusted
>  dbg: Botnet: skipping
>
> But "undefining" the variable "botnet_pass_trusted" I got
>
>  dbg: Botnet: starting
>  dbg: Botnet: get_relay good RDNS
>  dbg: Botnet: IP is '189.156.64.193'
>  dbg: Botnet: RDNS is 'dsl-189-156-64-193.prod-infinitum.com.mx'
>  dbg: Botnet: HELO is '!189.156.64.193!'
>  dbg: Botnet: sender [EMAIL PROTECTED]
>  dbg: Botnet: hit (baddns,client,ipinhostname,clientwords)
>  dbg: rules: ran eval rule BOTNET ======> got hit
>
> Greetings
>
> Jens
>
> --
> Dr. Jens Schleusener            T-Systems Solutions for Research GmbH
> Tel: +49 551 709-2493           Bunsenstr.10
> Fax: +49 551 709-2169           D-37073 Goettingen
> [EMAIL PROTECTED]  http://www.t-systems.com/

Using Jens's debug contruct, I get the following output, which I hope will be 
useful in either coming up with a solution or [once again] proving that I'm a 
moron (please excuse for the verbosity):

[3377] dbg: config: read file /etc/mail/spamassassin/Botnet.cf
[3377] dbg: plugin: fixed relative path: /etc/mail/spamassassin/Botnet.pm
[3377] dbg: plugin: loading Mail::SpamAssassin::Plugin::Botnet 
from /etc/mail/spamassassin/Botnet.pm
[3377] dbg: Botnet: version 0.7
[3377] dbg: plugin: registered 
Mail::SpamAssassin::Plugin::Botnet=HASH(0x9833114)
[3377] dbg: plugin: Mail::SpamAssassin::Plugin::Botnet=HASH(0x9833114) 
implements 'parse_config'
[3377] dbg: Botnet: setting botnet_pass_auth to 0
[3377] dbg: Botnet: setting botnet_pass_trusted to public
[3377] dbg: Botnet: adding ^127\.0\.0\.1$ to botnet_skip_ip
[3377] dbg: Botnet: adding ^10\..*$ to botnet_skip_ip
[3377] dbg: Botnet: adding ^172\.1[6789]\..*$ to botnet_skip_ip
[3377] dbg: Botnet: adding ^172\.2[0-9]\..*$ to botnet_skip_ip
[3377] dbg: Botnet: adding ^172\.3[01]\..*$ to botnet_skip_ip
[3377] dbg: Botnet: adding ^192\.168\..*$ to botnet_skip_ip
[3377] dbg: Botnet: adding ^128\.223\.98\.16$ to botnet_pass_ip
[3377] dbg: Botnet: adding (\.|\A)amazon\.com$ to botnet_pass_domains
[3377] dbg: Botnet: adding (\.|\A)apple\.com$ to botnet_pass_domains
[3377] dbg: Botnet: adding (\.|\A)ebay\.com$ to botnet_pass_domains
[3377] dbg: Botnet: adding (\b|\d)(a|s|d(yn)?)?dsl(\b|\d) to 
botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)cable(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)catv(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)ddns(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)dhcp(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)dial(-?up)?(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)dip(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)docsis(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)dyn(amic)?(ip)?(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)modem(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)ppp(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)res(net|ident(ial)?)?(\b|\d) to 
botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)client(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)fixed(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)ip(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)pool(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)static(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)user(\b|\d) to botnet_clientwords
[3377] dbg: Botnet: adding (\b|\d)mail(\b|\d) to botnet_serverwords
[3377] dbg: Botnet: adding (\b|\d)mta(\b|\d) to botnet_serverwords
[3377] dbg: Botnet: adding (\b|\d)mx(\b|\d) to botnet_serverwords
[3377] dbg: Botnet: adding (\b|\d)relay(\b|\d) to botnet_serverwords
[3377] dbg: Botnet: adding (\b|\d)smtp(\b|\d) to botnet_serverwords
[3377] dbg: Botnet: adding (\b|\d)exch(ange)?(\b|\d) to botnet_serverwords
[3377] dbg: rules: ran header rule __BOTNET_NOTRUST ======> got hit: "negative 
match"
[3377] dbg: Botnet: starting
[3377] dbg: Botnet: no trusted relays
[3377] dbg: Botnet: All skipped/no untrusted
[3377] dbg: Botnet: skipping
[3377] dbg: check: 
subtests=__BOTNET_NOTRUST,__CD,__CT,__ENV_AND_HDR_FROM_MATCH,__FB_NATIONAL,
__FB_S_PRICE,__FM_LARGE_MONEY,__FM_MY_PRICE,__FRAUD_DBI,__FRAUD_LTX,
__FR_HTML_HAS_AHREF,__F_LARGE_MONEY_2,__HTML_LENGTH_1536_2048,
__KAM_NUMBER2,__LOCAL_PP_NONPPURL,__MIME_ATTACHMENT,__MIME_HTML,
__MIME_QP,__NONEMPTY_BODY,__SARE_BODY_BLNK_5_100,__SARE_LOTTO_LOTTERY,
__SARE_META_MURTY3,__SARE_URI_ANY,__TAG_EXISTS_BODY,__TAG_EXISTS_HEAD,
__TAG_EXISTS_HTML,__TAG_EXISTS_META,__UNUSABLE_MSGID

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

Reply via email to