Re: antiphishing

2011-11-02 Thread Matus UHLAR - fantomas
On Sat, Oct 15, 2011 at 12:38 AM, wrote: And I need to remind you that it hits almost as much ham as spam: http://ruleqa.spamassassin.org/20111008-r1180336-n/T_SPOOFED_URL/detail I agree it seems like we should be able to improve it. Maybe make exceptions for known marketing trackers, as Adam

Re: antiphishing

2011-10-31 Thread Mahmoud Khonji
On Sat, Oct 15, 2011 at 12:38 AM, wrote: > And I need to remind you that it hits almost as much ham as spam: > http://ruleqa.spamassassin.org/20111008-r1180336-n/T_SPOOFED_URL/detail > > I agree it seems like we should be able to improve it. Maybe make > exceptions for known marketing trackers, a

Re: SPOOFED_URL Re: antiphishing

2011-10-18 Thread darxus
On 10/18, Matus UHLAR - fantomas wrote: > Very nice, however due to these and other circumstances mentioned I > think that a plugin would be better, since it could define where to Thanks. It didn't work out, the results were worse than the older rule: http://ruleqa.spamassassin.org/?daterev=2011

Re: SPOOFED_URL Re: antiphishing

2011-10-18 Thread Matus UHLAR - fantomas
On 14.10.11 18:07, dar...@chaosreigns.com wrote: Existing rule: rawbody __SPOOFED_URL m/]{0,2048}\bhref=(?:3D)?.?(https?:[^>"'\# ]{8,29}[^>"'\# :\/?&=])[^>]{0,2048}>(?:[^<]{0,1024}<(?!\/a)[^>]{1,1024}>){0,99}\s{0,10}(?!\1)https?[^\w<]{1,3}[^<]{5}/i How about this, to only check for a change

Re: SPOOFED_URL Re: antiphishing

2011-10-14 Thread darxus
Not relevant to the subject. We're talking about where somebody is maliciously making you think you're clicking on "www.youtube.com" when in fact you're clicking on "www.ILikeSpam.com". Somebody linking to one domain with an image hosted on another domain has plenty of possibility to be legit. Y

Re: SPOOFED_URL Re: antiphishing

2011-10-14 Thread Christian Grunfeld
you should be able to check against img src content, right? 2011/10/14 Christian Grunfeld : > and what about when there is no anchor text in the link ? eg. paypal > image button > > > 2011/10/14  : >> Existing rule: >> >> rawbody  __SPOOFED_URL  m/]{0,2048}\bhref=(?:3D)?.?(https?:[^>"'\# >> ]{8,

Re: SPOOFED_URL Re: antiphishing

2011-10-14 Thread darxus
None of these rules will hit that. That's what the second "http" is for. "Hit the host name part of the href value of an anchor tag, then do *not* match the same host name in the value part of the anchor, then hit 'href'". I should've called it SPOOFED_URL_HOST, because this one is matching the f

Re: SPOOFED_URL Re: antiphishing

2011-10-14 Thread Christian Grunfeld
and what about when there is no anchor text in the link ? eg. paypal image button 2011/10/14 : > Existing rule: > > rawbody  __SPOOFED_URL  m/]{0,2048}\bhref=(?:3D)?.?(https?:[^>"'\# > ]{8,29}[^>"'\# > :\/?&=])[^>]{0,2048}>(?:[^<]{0,1024}<(?!\/a)[^>]{1,1024}>){0,99}\s{0,10}(?!\1)https?[^\w<]{1

Re: SPOOFED_URL Re: antiphishing

2011-10-14 Thread darxus
Existing rule: rawbody __SPOOFED_URL m/]{0,2048}\bhref=(?:3D)?.?(https?:[^>"'\# ]{8,29}[^>"'\# :\/?&=])[^>]{0,2048}>(?:[^<]{0,1024}<(?!\/a)[^>]{1,1024}>){0,99}\s{0,10}(?!\1)https?[^\w<]{1,3}[^<]{5}/i How about this, to only check for a changed domain part instead? rawbody SPOOFED_URL_DOMAIN

SPOOFED_URL Re: antiphishing

2011-10-14 Thread darxus
On 10/14, dar...@chaosreigns.com wrote: > rawbody __SPOOFED_URL > m/]{0,2048}\bhref=(?:3D)?.?(https?:[^>"'\# ]{8,29}[^>"'\# > :\/?&=])[^>]{0,2048}>(?:[^<]{0,1024}<(?!\/a)[^>]{1,1024}>){0,99}\s{0,10}(?!\1)https?[^\w<]{1,3}[^<]{5}/i > I agree it seems like we should be able to improve it.

Re: antiphishing

2011-10-14 Thread darxus
On 10/14, Matus UHLAR - fantomas wrote: > While I have no doubt there is much of wanted mail with URL and text > mismatch, I still would like to have such rule. It exists, you're welcome to copy it out of the rules sandbox and use it, false positives and all. I already linked to it: http://svn.ap

Re: antiphishing

2011-10-14 Thread Matus UHLAR - fantomas
On 10/12, Christian Grunfeld wrote: Many phishing mails exploit the bad knowledge of the difference between real url and link anchor text by simple users. So they show On 10/12/2011 2:25 PM, dar...@chaosreigns.com wrote: Does spamassassin really not have a rule to detect this? I just dug up

Re: antiphishing

2011-10-12 Thread David B Funk
On Wed, 12 Oct 2011, Christian Grunfeld wrote: > > Modifying headers -might- mess up DKIM, gpg, etc sigs (depending upon > > how they were done). Modifying bodies -will- mess up sigs. > > I was not specifically talking about dkim signed mails. It is clear > that body rewriting mess up sigs. It is

Re: antiphishing

2011-10-12 Thread John Hardin
On Wed, 12 Oct 2011, Christian Grunfeld wrote: Certainly SA should detect and score such obfuscation, if the FP rate can be kept low. But controlling what the end user sees in the body of the mail is properly the MUA's job. No, MUAs interprets and shows html like browsers does and does not mo

Re: antiphishing

2011-10-12 Thread John Hardin
On Wed, 12 Oct 2011, David B Funk wrote: On Wed, 12 Oct 2011, Bowie Bailey wrote: The example I gave was taken from a newsletter where the url was hidden. Almost all email newsletters that I have seen do the same thing. Currently, most of the spam I'm seeing does not attempt to hide the url

Re: antiphishing

2011-10-12 Thread Christian Grunfeld
> Large numbers of spammers use DKIM. We've been under attack for weeks > now by some outfit who is buying up old, "clean" IP subnets and using it > to spew their non-pharma, really "clean looking" spam onto us - no > RBL/SURBL hits for 3-5 *days*, getting scores from 0.5-3.0 - really > tough - not

Re: antiphishing

2011-10-12 Thread Jason Haar
On 13/10/11 14:05, Christian Grunfeld wrote: > > I was not specifically talking about dkim signed mails. It is clear > that body rewriting mess up sigs. It is also clear that phishers dont > use dkim ! > Large numbers of spammers use DKIM. We've been under attack for weeks now by some outfit who i

Re: antiphishing

2011-10-12 Thread Christian Grunfeld
> Modifying headers -might- mess up DKIM, gpg, etc sigs (depending upon > how they were done). Modifying bodies -will- mess up sigs. I was not specifically talking about dkim signed mails. It is clear that body rewriting mess up sigs. It is also clear that phishers dont use dkim ! and if they do y

Re: antiphishing

2011-10-12 Thread Adam Katz
On 10/12/2011 11:48 AM, dar...@chaosreigns.com wrote: > Which uses it as part of SPOOFED_URL (the "__" in the other rule is > important), which is described as: > "Has a link whose text is a different URL". But that one hasn't made it > into the default rule set yet. Ah, it hits 1.1% of spam but

Re: antiphishing

2011-10-12 Thread David B Funk
On Wed, 12 Oct 2011, Bowie Bailey wrote: > The example I gave was taken from a newsletter where the url was > hidden. Almost all email newsletters that I have seen do the same > thing. Currently, most of the spam I'm seeing does not attempt to hide > the url at all. Not too many spam do that bu

Re: antiphishing

2011-10-12 Thread David B Funk
On Wed, 12 Oct 2011, Christian Grunfeld wrote: > > SA is a scoring filter, not a modifcation filter. Changing SA to rewrite > > message bodies is, I think most if all will agree, beyond the scope of what > > SA is intended to do, and beyond the scope of what it _should_ do. > > it does modify head

Re: antiphishing

2011-10-12 Thread Christian Grunfeld
> SA is a scoring filter, not a modifcation filter. Changing SA to rewrite > message bodies is, I think most if all will agree, beyond the scope of what > SA is intended to do, and beyond the scope of what it _should_ do. it does modify headers, subjectswhy not bodies ? > Certainly SA should

Re: antiphishing

2011-10-12 Thread Christian Grunfeld
2011/10/12 Bowie Bailey : > Please keep list traffic on the list. sorry but you reply only to me first ! Check it! > On 10/12/2011 3:25 PM, Christian Grunfeld wrote: >> I see all genuine (non-spam) mails for subscriptions, checking and >> activating accounts showing the long and crapy url ! >> An

Re: antiphishing

2011-10-12 Thread Martin Gregorie
On Wed, 2011-10-12 at 15:46 -0400, Bowie Bailey wrote: > Currently, most of the spam I'm seeing does not attempt to hide > the url at all. > +1

Re: antiphishing

2011-10-12 Thread John Hardin
On Wed, 12 Oct 2011, Christian Grunfeld wrote: It certainly seems like it would be very useful.  I see there's a __SPOOFED_URL rule, but it's hard to read and doesn't have a description. This is an issue that comes up on this list occasionally.  It sounds like a good idea at first, but when yo

Re: antiphishing

2011-10-12 Thread Bowie Bailey
Please keep list traffic on the list. On 10/12/2011 3:25 PM, Christian Grunfeld wrote: > I see all genuine (non-spam) mails for subscriptions, checking and > activating accounts showing the long and crapy url ! > And when the url is hidden and text is shown you have 99% phising chance. > It is tru

Re: antiphishing

2011-10-12 Thread Noel
On 10/12/2011 1:57 PM, Kelson Vibber wrote: > Yeah. There's an awful lot of newsletter, opt-in advertisement, > and even transactional mail traffic that uses URL redirectors for > click-tracking purposes, and far too often they'll put the > destination URL (or a simplified form of it) in as the lin

RE: antiphishing

2011-10-12 Thread Kelson Vibber
> -Original Message- > From: Bowie Bailey [mailto:bowie_bai...@buc.com] > > This is an issue that comes up on this list occasionally. It sounds like a > good > idea at first, but when you start looking into it, you find that there is WAY > too > much legitimate email that does this for t

Re: antiphishing

2011-10-12 Thread Christian Grunfeld
>> It certainly seems like it would be very useful.  I see there's a >> __SPOOFED_URL rule, but it's hard to read and doesn't have a description. > > This is an issue that comes up on this list occasionally.  It sounds > like a good idea at first, but when you start looking into it, you find > that

Re: antiphishing

2011-10-12 Thread darxus
On 10/12, Christian Grunfeld wrote: > the point is that I dont think it would be a good idea to let SA give > a high score based on an "apparently" missmatch between text and url. SpamAssassin rule QA and optimized score generation infrastructure means we can find out if it's useful before deployi

Re: antiphishing

2011-10-12 Thread Bowie Bailey
On 10/12/2011 2:25 PM, dar...@chaosreigns.com wrote: > On 10/12, Christian Grunfeld wrote: >> Many phishing mails exploit the bad knowledge of the difference >> between real url and link anchor text by simple users. So they show > Does spamassassin really not have a rule to detect this? I just dug

Re: antiphishing

2011-10-12 Thread darxus
On 10/12, Christian Grunfeld wrote: > > It certainly seems like it would be very useful.  I see there's a > > __SPOOFED_URL rule, but it's hard to read and doesn't have a description. > > where did you find that rule ? On my server in the file /var/lib/spamassassin/3.004000/updates_spamassassin_o

Re: antiphishing

2011-10-12 Thread Christian Grunfeld
> Rather than tampering with the original mail, surely the solution is to > clearly detect the mail as spam in the first place so it hopefully never > reaches the user. the point is that I dont think it would be a good idea to let SA give a high score based on an "apparently" missmatch between tex

Re: antiphishing

2011-10-12 Thread Christian Grunfeld
> It certainly seems like it would be very useful.  I see there's a > __SPOOFED_URL rule, but it's hard to read and doesn't have a description. where did you find that rule ?

Re: antiphishing

2011-10-12 Thread Ned Slider
On 10/12/2011 07:01 PM, Christian Grunfeld wrote: Hi, I have an idea that I want to discuss with users and developers. Many phishing mails exploit the bad knowledge of the difference between real url and link anchor text by simple users. So they show atractive link text that points to hiden, un

Re: antiphishing

2011-10-12 Thread darxus
On 10/12, Christian Grunfeld wrote: > Many phishing mails exploit the bad knowledge of the difference > between real url and link anchor text by simple users. So they show Does spamassassin really not have a rule to detect this? I just dug up a perfect example - trying to look like an email from

Re: antiphishing

2011-10-12 Thread Martin Hepworth
Like mailscanner does then :-) On Wednesday, 12 October 2011, Christian Grunfeld < christian.grunf...@gmail.com> wrote: > Hi, > > I have an idea that I want to discuss with users and developers. > > Many phishing mails exploit the bad knowledge of the difference > between real url and link anchor