Mark Martinec wrote the following on 6/15/2007 10:41 AM -0800:
Bill,

There is now an additional patch at:
  http://issues.apache.org/SpamAssassin/show_bug.cgi?id=5511
which should fix this.

Mark, thanks for the patches.  However, even with both Dns.pm patches
applied, unless I set "rbl_timeout" to a high enough time interval, SA
still misses the URIBL test results in the sample messages I posted in
bugzilla 5506.
For example, if I set "rbl_timeout 15", I get no URIBL hit results.
However, if I set "rbl_timeout 60", I do get URIBL hit results.  This is
because the 60 interval is long enough for Botnet's (in this case) RDNS
test to timeout before the "rbl_timeout" interval.

Don't know. I was using your test case (test1.txt) to cause a Botnet hang,
had rbl_timeout at 15, and I did get the RBL hits.

Try spamassassin from a command line with -t -D.
If you applied both patches, there should be something
like the following in the debug output.

19:26:55.558 8.010 0.000 [13051] dbg: Botnet: no trusted relays
19:26:55.558 8.010 0.000 [13051] dbg: Botnet: get_relay didn't find RDNS
...a bug pause here...
19:27:24.558 37.010 28.999 [13051] dbg: Botnet: IP is '66.17.235.109'
19:27:24.558 37.010 0.001 [13051] dbg: Botnet: RDNS is ''
19:27:24.559 37.011 0.001 [13051] dbg: Botnet: HELO is 'xxxxxx'
19:27:24.559 37.011 0.000 [13051] dbg: Botnet: BADDNS miss
...
19:27:26.269 38.721 0.002 [13051] dbg: rules: running meta tests; score so 
far=12.753
19:27:26.269 38.721 0.001 [13051] dbg: rules: compiled meta tests
19:27:26.271 38.723 0.002 [13051] dbg: check: running tests for priority: 500
19:27:26.274 38.726 0.002 [13051] dbg: async: select found 1 socks ready
19:27:26.275 38.727 0.001 [13051] dbg: uridnsbl: query for xxx took 35 seconds 
to look up (dob.sibl.support-intelligence.net:xxx)
...
19:27:26.281 38.733 0.001 [13051] dbg: async: queries completed: 15 started: 2
19:27:26.283 38.735 0.001 [13051] dbg: async: queries active: at Fri Jun 15 
19:27:26 2007

vvvvvvvvvvv
19:27:26.283 38.735 0.001 [13051] dbg: dns: harvest_dnsbl_queries: on extended
  time, overdue by 30.000 s, still 1.200 s
^^^^^^^^^^^^

19:27:26.295 38.747 0.011 [13051] dbg: async: select found 1 socks ready
19:27:26.297 38.749 0.002 [13051] dbg: async: queries completed: 1 started: 2
19:27:26.297 38.749 0.000 [13051] dbg: async: queries active: URI-A=1 at Fri ...

  0.1 RDNS_NONE              Delivered to trusted network by a host with no rDNS
  3.4 HEADER_SPAM            Bulk email fingerprint (header-based) found
  0.1 BOTNET                 Relay might be a spambot or virusbot
                             [botnet0.7,ip=66.17.235.109,nordns]
  0.0 DKIM_POLICY_SIGNSOME   Domain Keys Identified Mail: policy says domain
                             signs some mails
  0.0 BOTNET_NORDNS          Relay's IP address has no PTR record
                             [botnet_nordns,ip=66.17.235.109]
  1.2 HTML_IMAGE_ONLY_28     BODY: HTML: images with 2400-2800 bytes of words
  0.2 HTML_MESSAGE           BODY: HTML included in message
  3.0 BAYES_95               BODY: Bayesian spam probability is 95 to 99%
                             [score: 0.9658]
  1.5 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
  0.5 RAZOR2_CHECK           Listed in Razor2 (http://razor.sf.net/)
  2.8 DCC_CHECK              Listed in DCC (http://rhyolite.com/anti-spam/dcc/)
  2.0 URIBL_BLACK            Contains an URL listed in the URIBL blacklist
                             [URIs: xxx]
  1.5 URIBL_OB_SURBL         Contains an URL listed in the OB SURBL blocklist
                             [URIs: xxx]
  0.0 DIGEST_MULTIPLE        Message hits more than one network digest check
  0.5 BOTNET_OTHER           BOTNET_OTHER
 -1.2 AWL                    AWL: From: address is in the auto white-list

(I had to strike the uri in the log to be able to post the message :)

  Mark
Mark, I'm really sorry if I caused you to unnecessarily spin your wheels on this, I applied the second patch to the wrong SA version of Dns.pm. The patches work fine. Again, my sincere apologies... :-(

Bill

Reply via email to