Re: BOTNET rules question

2011-01-05 Thread Bill Landry
On 1/5/2011 5:11 PM, Mark Martinec wrote: Combining p0f with BOTNET is indended to *reduce* the high number of false positives that BOTNET alone produces, *at least* for the non-windows machines. The windows hosts are left alone and are not protected by p0f from BOTNET FP. If someone is scoring

Re: How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread George Spelvin
Michael Scheidell wrote: > put all of your local ip addresses in internal_networks. > you will avoid unnecessary rbl lookups, spf failures and it should set a > ALL_TRUSTED flag also. Bingo, that's the clue I needed. Thank you very much. Sorry it didn't dawn on me to read the .cf file carefully

Re: What NOT to use?

2011-01-05 Thread Karsten Bräckelmann
On Wed, 2011-01-05 at 16:29 -1000, Warren Togami Jr. wrote: > Can anyone think of custom rules or old sites that continue to be > online, misleading people into believing that they should be using > some custom rule or plugin that is no longer effective or safe? Gazillions of 'em. A hell of a lot

What NOT to use?

2011-01-05 Thread Warren Togami Jr.
Can anyone think of custom rules or old sites that continue to be online, misleading people into believing that they should be using some custom rule or plugin that is no longer effective or safe? The former SARE repo was the only one that I know about, but there are apparently others. http://ww

Re: Exceeded time limit Plugin::Check::_rawbody_tests_0

2011-01-05 Thread Karsten Bräckelmann
On Wed, 2011-01-05 at 16:29 -0800, Frank Chan wrote: > I noticed recently (within the past two months) I'm getting this > error message from spamassassin. Here is line from the maillog: > > Jan 5 15:07:40 s1 spamd[21160]: check: exceeded time limit in > Mail::SpamAssassin::Plugin::Check::_rawbo

Re: BOTNET rules question

2011-01-05 Thread Mark Martinec
Combining p0f with BOTNET is indended to *reduce* the high number of false positives that BOTNET alone produces, *at least* for the non-windows machines. The windows hosts are left alone and are not protected by p0f from BOTNET FP. If someone is scoring p0f in combination with BOTNET differently,

Re: BOTNET rules question

2011-01-05 Thread Lawrence @ Rogers
On 05/01/2011 8:38 PM, RW wrote: Aside from BOTNET_WIN the p0f rules are low-scoring and add-up to zero. Since BOTNETS are 100% Windows it doesn't seem unreasonable to use p0f in a metarule. However, you might want to look into this inconsistency: You are right about the overlapping and one rule

Exceeded time limit Plugin::Check::_rawbody_tests_0

2011-01-05 Thread fchan
Hello, I noticed recently (within the past two months) I'm getting this error message from spamassassin. Here is line from the maillog: Jan 5 15:07:40 s1 spamd[21160]: check: exceeded time limit in Mail::SpamAssassin::Plugin::Check::_rawbody_tests_0, skipping further tests I have set spamd

Re: BOTNET rules question

2011-01-05 Thread RW
On Wed, 05 Jan 2011 18:40:41 -0330 "Lawrence @ Rogers" wrote: > I would suspect that you are using non-standard rules. What's most > concerning is the old p0f rules that are looking for Windows XP. That > is dangerous and a bad thing to use as a rule (the OS of the sender). Aside from BOTNET_W

Re: Off topic: best RBLs to use to block at smtp connection?

2011-01-05 Thread Karsten Bräckelmann
On Thu, 2011-01-06 at 00:27 +0100, mouss wrote: > Le 05/01/2011 02:15, Karsten Bräckelmann a écrit : > > On Tue, 2011-01-04 at 00:58 +0100, mouss wrote: > > > Recipient unknown: 5318 ( 73.85 %) > > > DNSBL zen.spamhaus.org...: 816 ( 11.33 %) > > > > This alone tells some

Re: Off topic: best RBLs to use to block at smtp connection?

2011-01-05 Thread mouss
Le 05/01/2011 17:00, Rob McEwen a écrit : > On 1/3/2011 6:58 PM, mouss wrote: >> as you can see, all DNSBLs but spamhaus are more or less useless. > > Mouss, > > [ignoring content filtering for a moment... per the original poster's > request] > > If one DNSBL removed 90% of all spams, and that m

Re: Off topic: best RBLs to use to block at smtp connection?

2011-01-05 Thread Noel Butler
On Thu, 2011-01-06 at 00:27 +0100, mouss wrote: > > My understanding was that OP asked about smtp time rejections. > obviously, this won't check received headers, nor junk from yahoo/gmail/... > milter-regex signature.asc Description: This is a digitally signed message part

Re: Off topic: best RBLs to use to block at smtp connection?

2011-01-05 Thread mouss
Le 05/01/2011 02:15, Karsten Bräckelmann a écrit : > On Tue, 2011-01-04 at 00:58 +0100, mouss wrote: >> Le 03/01/2011 13:28, Jari Fredriksson a écrit : >>> >>> I want to secure a postfix site with rbls, no spamassassin at this >>> moment. (I use SpamAssassin on other sites, and no RBLs at SMTP time

Re: How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread Matthew Hunter
On 01/05/2011 01:13 PM, John Hardin wrote: On Wed, 5 Jan 2011, George Spelvin wrote: The best way is to tell your glue layer not to pass internal-to-internal mails to SA in the first place. What is your MTA (I'm assuming qmail) and how is SA hooked into it? It's qmail (yes, I know; it REALLY

Re: BOTNET rules question

2011-01-05 Thread Lawrence @ Rogers
On 05/01/2011 6:22 PM, Michael Monnerie wrote: Dear list, I received this info from a customer, whose order confirmation from the londontheatredirect.com got marked as spam because of BOTNET* rules. Are those rules too old, or is that server in a botnet? How to find out? Or which rules scores sh

Re: BOTNET rules question

2011-01-05 Thread Michael Scheidell
On 1/5/11 4:52 PM, Michael Monnerie wrote: server88-208-245-26.live- servers.net botnet is NOT an stock SA rule plus, look at the silly DYNAMIC RULE LOOKING rdns. fix rdns. -- Michael Scheidell, CTO o: 561-999-5000 d: 561-948-2259 ISN: 1259*1300 >*| *SECNAP Network Security Corporation *

Re: How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread Jason Haar
On 01/06/2011 08:13 AM, John Hardin wrote: > > Ok, I'm not a qmail guru so somebody else will have to suggest how to > prevent SA from scanning mail from internal IP addresses destined for > local mailboxes. > Doing it at the MTA level using Qmail-Scanner would allow you to easily not invoke SA on

BOTNET rules question

2011-01-05 Thread Michael Monnerie
Dear list, I received this info from a customer, whose order confirmation from the londontheatredirect.com got marked as spam because of BOTNET* rules. Are those rules too old, or is that server in a botnet? How to find out? Or which rules scores should I tune to optimize? -- Forwarde

Re: How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread John Hardin
On Wed, 5 Jan 2011, George Spelvin wrote: The best way is to tell your glue layer not to pass internal-to-internal mails to SA in the first place. What is your MTA (I'm assuming qmail) and how is SA hooked into it? It's qmail (yes, I know; it REALLY should be replaced...), and SA is hooked in

Re: How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread Karsten Bräckelmann
On Wed, 2011-01-05 at 12:14 -0500, George Spelvin wrote: > > The best way is to tell your glue layer not to pass internal-to-internal > > mails to SA in the first place. > What confuses me about your suggestion is that it's basically > a filtering rule, so I wonder why I can't use SA to do it...

Re: How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread George Spelvin
> The best way is to tell your glue layer not to pass internal-to-internal > mails to SA in the first place. > > What is your MTA (I'm assuming qmail) and how is SA hooked into it? It's qmail (yes, I know; it REALLY should be replaced...), and SA is hooked in via the .qmail delivery file. So it

Re: IPv6 DNSBL/WL design, was Fwd: [Asrg] draft-levine-iprangepub-01

2011-01-05 Thread Rob McEwen
On 1/4/2011 11:14 AM, David F. Skoll wrote: > On Tue, 04 Jan 2011 11:01:52 -0500 > Rob McEwen wrote >> I've thought this through and... best case scenario is that spammers >> then get 5+ years of play time because it will take at least that time >> for those other techniques to catch up. > Umm.. n

Re: Weird scores despite having assigned custom score for URIBL

2011-01-05 Thread Karsten Bräckelmann
On Wed, 2011-01-05 at 15:54 +0400, selven wrote: > a surbl analysis of [...] does give me [...] is on SURBL lists: PH, > but for some reasons the score so far is still 2.943, any clue? > > part of my /usr/local/etc/mail/spamassassin/local.cf > > my custom score: [ custom rules for URIBL_(BLACK|

Re: How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread Karsten Bräckelmann
On Wed, 2011-01-05 at 10:03 -0500, Michael Scheidell wrote: > On 1/5/11 9:33 AM, George Spelvin wrote: > > I'm having trouble with intracompany e-mail. When a Windows/Outlook user > > sends mail to a local user, there is exactly one MX in the path. > > Which is the office mail server. > > Should

Re: How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread John Hardin
On Wed, 5 Jan 2011, George Spelvin wrote: I'm having trouble with intracompany e-mail. When a Windows/Outlook user sends mail to a local user, there is exactly one MX in the path. Which is the office mail server. Everything is wonderful until Spamassassin sees the short delivery path and assig

Re: Off topic: best RBLs to use to block at smtp connection?

2011-01-05 Thread Rob McEwen
On 1/3/2011 6:58 PM, mouss wrote: > as you can see, all DNSBLs but spamhaus are more or less useless. Mouss, [ignoring content filtering for a moment... per the original poster's request] If one DNSBL removed 90% of all spams, and that made a users's spam go from 100-per-day to 10-per-day, that

Re: How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread Benny Pedersen
On ons 05 jan 2011 15:33:53 CET, George Spelvin wrote I'm having trouble with intracompany e-mail. When a Windows/Outlook user sends mail to a local user, there is exactly one MX in the path. Which is the office mail server. qmail did not add server sender ip spamassassin says its dynamic sin

Re: How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread Michael Scheidell
On 1/5/11 9:33 AM, George Spelvin wrote: I'm having trouble with intracompany e-mail. When a Windows/Outlook user sends mail to a local user, there is exactly one MX in the path. Which is the office mail server. Everything is wonderful until Spamassassin sees the short delivery path and assigns

Re: Weird scores despite having assigned custom score for URIBL

2011-01-05 Thread Mark Martinec
$3|v3n, > Jan 5 12:39:34 spamassasin-test amavis[53483]: (53483-01) SA dbg: async: > completed in 0.131 s: URI-DNSBL, DNSBL:dbl.spamhaus.org.:pornhunter.co.tv > Jan 5 12:39:34 spamassasin-test amavis[53483]: (53483-01) SA dbg: async: > completed in 0.128 s: URI-DNSBL, DNSBL:multi.surbl.org.:porn

How to prevent DOS_OUTLOOK_TO_MX false positive?

2011-01-05 Thread George Spelvin
I'm having trouble with intracompany e-mail. When a Windows/Outlook user sends mail to a local user, there is exactly one MX in the path. Which is the office mail server. Everything is wonderful until Spamassassin sees the short delivery path and assigns 2.8 points because of it, and a few other

Re: New plugin: DecodeShortURLs

2011-01-05 Thread Warren Togami Jr.
On Sat, Jan 1, 2011 at 7:19 AM, Steve Freegard wrote: > On 01/01/11 11:51, Warren Togami Jr. wrote: > > I'll help you start the process with a Bugzilla ticket. I also hope you > could get it into some sort of public source control mechanism soon so we > can see the changes that go into it befor

Weird scores despite having assigned custom score for URIBL

2011-01-05 Thread selven
Jan 5 12:39:34 spamassasin-test amavis[53483]: (53483-01) SA dbg: async: completed in 0.131 s: URI-DNSBL, DNSBL:dbl.spamhaus.org.:pornhunter.co.tv Jan 5 12:39:34 spamassasin-test amavis[53483]: (53483-01) SA dbg: async: completed in 0.128 s: URI-DNSBL, DNSBL:multi.surbl.org.:porncrazytube.info Ja