Re: Re[2]: [SAtalk] New trick

2003-06-27 Thread Daniel Quinlan
[EMAIL PROTECTED] (Justin Mason) writes: > For PGP/GPG to be useful as an unforgeable bonus-points mechanism, it > needs key distribution. We can no longer just say "it has *some* > PGP signature" -- because spammers are actively forging them, cutting > them from other mails, etc. as far as I k

Re[4]: [SAtalk] New trick

2003-06-27 Thread Robert Menschel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Justin, Friday, June 27, 2003, 7:21:47 PM, you wrote: JM> BTW, I have seen spam using a real person's PGP sig, cut and pasted from JM> one of their messages. Yes, and that's why just having a syntactically correct PGP sig shouldn't get any sig

Re: Re[2]: [SAtalk] New trick

2003-06-27 Thread Justin Mason
BTW, I have seen spam using a real person's PGP sig, cut and pasted from one of their messages. > If we added the ability to include lines in local.cf or user_prefs like > > validpgp 0x38AA1D47 > (a list of space-separated hex numbers), then THOSE specific signatures > could score strong negative

Re[2]: [SAtalk] New trick

2003-06-27 Thread Robert Menschel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Robert, Friday, June 27, 2003, 8:33:17 AM, you wrote: >>> I could almost bet my left index finger on the fact that 99% >>> of those PGP-signatures are invalid. ... >>I'll profess some degree of ignorance about PGP signatures, but does >>it mat

Re: [SAtalk] New trick

2003-06-27 Thread Matt Kettler
At 10:40 PM 6/27/2003 +0100, Martin Radford wrote: They could do this. On the other hand, there's some computational cost in generating the PGP signature, which is going to slow down the spam run. Alternatively, if they use the same message body for all messages (and hence the same signature) the

Re: [SAtalk] New trick

2003-06-27 Thread Martin Radford
At Fri Jun 27 16:33:17 2003, Robert Strickler wrote: > I too have large gaps in the operation of PGP, but is it not tied to an > email address or some other publicly available validation of the senders > identity? No. Well, you could use anything as an "email address" in the key - for example,

Re: [SAtalk] New trick

2003-06-27 Thread Martin Radford
At Fri Jun 27 15:27:18 2003, Chris Blaise wrote: > > > I could almost bet my left index finger on the fact that 99% > > of those PGP-signatures are invalid. This is something that > > SA could exploit. > > I'll profess some degree of ignorance about PGP signatures, but > does it matter if

RE: [SAtalk] New trick

2003-06-27 Thread Eetu Rantanen
> >> I could almost bet my left index finger on the fact that 99% > >> of those PGP-signatures are invalid. This is something that > >> SA could exploit. [..] > I too have large gaps in the operation of PGP, but is it not tied to an > email address or some other publicly available validation of the

RE: [SAtalk] New trick

2003-06-27 Thread Robert Strickler
>> I could almost bet my left index finger on the fact that 99% >> of those PGP-signatures are invalid. This is something that >> SA could exploit. >I'll profess some degree of ignorance about PGP signatures, but does it matter if it's valid or not? Couldn't a spammer generate a perfectly valid

AW: [SAtalk] New trick

2003-06-27 Thread Martin Bene
> I'll profess some degree of ignorance about PGP signatures, but >does it matter if it's valid or not? Couldn't a spammer generate a >perfectly valid PGP signature and use it in their messages to get the >lower score? Depends on how you define "valid": if it's just syntactical correctness

RE: [SAtalk] New trick

2003-06-27 Thread Chris Blaise
> I could almost bet my left index finger on the fact that 99% > of those PGP-signatures are invalid. This is something that > SA could exploit. I'll profess some degree of ignorance about PGP signatures, but does it matter if it's valid or not? Couldn't a spammer generate a perfectly v

Re: [SAtalk] New trick

2003-06-26 Thread Eetu Rantanen
Hi list, Having read this for long I thought it could be my time to contribute something. :-) > A message just slipped through, no text, just an image. It slipped through > with a ridiculously low score, minus .6 > > When I expanded the headers, I found that the message got through mostly > becau

Re: [SAtalk] New trick

2003-06-25 Thread Jack Gostl
> > A message just slipped through, no text, just an image. It slipped through > > with a ridiculously low score, minus .6 > > You know better by now :-) That's what you get for using SA 1.1 I'm using 2.55. -- Jack Gostl [EMAIL PROTECTED] -

Re: [SAtalk] New trick

2003-06-25 Thread Jack Gostl
No... I'm not suggesting anything about PGP sigs. What (I think) happened here was that a marginally passable PGP sig was buried in the HTML portion of the message. I almost didn't see it. So not only do I question the negative value on a PGP sig, I'm noting that this is a suspicious sig that slip

Re: [SAtalk] New trick

2003-06-25 Thread Jonathan Vanasco
How can you suggest incorporating a PGP into the ruleset though? You can check if its a valid length, but then spammers will use valid PGP sigs. You can't pointify all PGP sigs, because lots of valid mail is signed w/a PGP So you can either: Remove the negative points for PGP sigs -- essential

Re: [SAtalk] New trick

2003-06-25 Thread Tony Earnshaw
Jack Gostl wrote: A message just slipped through, no text, just an image. It slipped through with a ridiculously low score, minus .6 You know better by now :-) That's what you get for using SA 1.1 Tony -- Tony Earnshaw Humor him, and he'll go away again http://j-walk.com/blog/docs/conference.h

[SAtalk] New trick

2003-06-25 Thread Jack Gostl
A message just slipped through, no text, just an image. It slipped through with a ridiculously low score, minus .6 When I expanded the headers, I found that the message got through mostly because of the following. USER_AGENT_MSN (-2.3 points) Headers indicate valid mail from MSN PGP_SIGNAT