On Tue, 22 Feb 2005, Andy Jezierski wrote:

> Kelson <[EMAIL PROTECTED]> wrote on 02/22/2005 11:30:46 AM:
>
> > Jay Levitt wrote:
> > > I have SA 3.01 running under mimedefang 2.43 with sendmail 8.13.1.  At
> > > some point, SA seems to stop doing lookups on the DNSBLs; spam gets
> > > through that is listed in multiple BLs; if I check manually with
> > > spamassassin -t, it detects the BL entry, even if I run it moments
> after
> > > the spam was received.
[snip..]
> > Make sure MIMEDefang hasn't created a new /etc/mail/sa-mimedefang.cf on
> > an upgrade.
> >
> > That happened to my server a while back -- We were just using
> > /etc/mail/spamassassin/local.cf, and upgraded MD, and MD saw there was
> > no sa-mimedefang.cf, so it created it with the defaults -- and the
> > defaults disable DNSBLs.
>
> Could this be the same problem as the discussion in the "Spammer
> Anti-SURBL tactic" thread?

No, the problem that I saw was caused by the contents of the message.
it didn't matter how I fed it to SA, SURBL did not 'fire' on the spammer
"payload" URL, eventho the site was in several lists.

When I first saw the spam I was puzzled and ran it thru SA with full
debugging to see what was going on.
( spamassassin -D rulesrun=255 < message.txt )

I saw lots of SURBL tests on the "decoy" URLs but none of the "payload".

I removed the CR characters from the "payload" URL, retested but still
no hits, removed most of the "decoy" URLs from the message, then a
retest did hit. So it was entirely due to the message content
exploiting two weaknesses in SA.

PS: if you do a full debug SA run, it's best to redirect the output to
a file for reading, it produces thousands of lines of output. ;)

-- 
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to