I've had a rule like this from way back. Works great!

header MY_IP Received =~/\b(from xxx\.xxx\.xxx\.xxx)\b/i
describe MY_IP WHy would I get email from myself?
score MY_IP 1.0

Where xxx is your server ip address. 

I highly recommend people use this rule. 81 hits in December. It used to be
a LOT more. 

--Chris

> -----Original Message-----
> From: Pierre Thomson [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, January 14, 2004 2:52 PM
> To: [EMAIL PROTECTED]
> Subject: [SAtalk] a goof-proof (?) test for evil mailers
> 
> 
> I have noticed that some spam engines (zombies?) use the 
> receiving relay's IP address as the HELO name, presumably 
> trying to look like a trusted source.  I made a simple test 
> for this, and it triggers for nearly 10% of inbound spam.
> 
> # substitute your relay's numeric IP address for AAA BBB CCC DDD below
> 
> header PT_SPOOFME         Received =~ /from AAA\.BBB\.CCC\.DDD/
> describe PT_SPOOFME       pretending to be from ourselves!
> score PT_SPOOFME          3.0
> 
> I can't imagine a configuration where a relay would receive 
> mail from itself; that's the definition of a mail loop.  (And 
> if it did, it would use the loopback interface...)  Therefore 
> I gave this test a pretty high score.  I have been using it 
> for at least a month with no FP's.
> 
> Does anyone want to run a mass check against a large corpus?  
> Has anyone seen a valid sending MTA that behaves this way?  
> Improvements?
> 
> [BTW, it was neat to see my crude "WORDWORD" test taken to 
> pieces.  Someone streamlined the regexp, several more tweaked 
> it, it got a new name and a second-level test, and now we 
> have another weapon against Bayes poison.  Keep up the good work!]
> 
> Pierre Thomson
> BIC
> 
> 
> 
> 
> # a sample spam header fragment as seen by SA on a box with 
> address 64.72.85.5 :
> 
> Received: from 64.72.85.5 ([219.248.110.109])
>         by mail1.rifton.com (8.11.6/8.11.6) with SMTP id i0EJC2Z07868
>         for <[EMAIL PROTECTED]>; Wed, 14 Jan 2004 14:12:02 -0500
> Received: from [219.248.110.109] by 3001hosting.comIP with HTTP;
>         Thu, 15 Jan 2004 00:09:43 +0500
> 
> 
> # and another spam from a different X-mailer:
> 
> Received: from 64.72.85.5 (c-24-2-238-98.client.comcast.net 
> [24.2.238.98])
>         by mail1.rifton.com (8.11.6/8.11.6) with SMTP id i0EJM4Z09102
>         for <[EMAIL PROTECTED]>; Wed, 14 Jan 2004 14:22:06 -0500
> Received: from [46.12.70.8] by 64.72.85.5 with SMTP; Wed, 14 
> Jan 2004 05:11:32 -0200
> 
> 
> # and a valid mail from a known ISP:
> 
> Received: from imo-r08.mx.aol.com (imo-r08.mx.aol.com 
> [152.163.225.104])
>         by mail1.rifton.com (8.11.6/8.11.6) with SMTP id i0EJhYZ12005
>         for <[EMAIL PROTECTED]>; Wed, 14 Jan 2004 14:43:34 -0500
> Received: from [EMAIL PROTECTED]
>         by imo-r08.mx.aol.com (mail_out_v36_r4.12.) id 
> r.1e1.1761647e (18555);
>         Wed, 14 Jan 2004 14:41:05 -0500 (EST)
> 
> 
> -------------------------------------------------------
> This SF.net email is sponsored by: Perforce Software.
> Perforce is the Fast Software Configuration Management System offering
> advanced branching capabilities and atomic changes on 50+ platforms.
> Free Eval! http://www.perforce.com/perforce/loadprog.html
> _______________________________________________
> Spamassassin-talk mailing list
> [EMAIL PROTECTED]
> https://lists.sourceforge.net/lists/listinfo/spamassassin-talk
> 


-------------------------------------------------------
This SF.net email is sponsored by: Perforce Software.
Perforce is the Fast Software Configuration Management System offering
advanced branching capabilities and atomic changes on 50+ platforms.
Free Eval! http://www.perforce.com/perforce/loadprog.html
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to