On 25 Apr 2021, at 22:26, Alan wrote:

On 2021-04-25 19:31, Bill Cole wrote:
On 25 Apr 2021, at 18:40, Alan wrote:
[...]
If I recall correctly, the "X-OutGoing-Spam-Status" header which triggers that rule (with some exemptions) is not actually used by anything within cPanel, and a non-spam result in that header certainly should not be trusted anywhere but the system generating it. So it may be helpful to do the scan but to forego adding the header or to at least make cPanel use a local name.

I've posted to a 13 month old thread on the cPanel forums that was left at "we'll update you", asking for an update. I can't see any useful purpose to having that header in there.

It is probably worth digging into the cPanel exim.conf editor (I don't recall what they call it, but it's there somewhere at the WHM level...) to kill the header. You may want to look through the deployed exim.conf to make sure that it's not somehow using the header for internal communication between different stages of handling.

Obfuscated headers follow. Haven't dug into it but it looks like another FP on KAM_MXURI, I'm guessing that's because the message is coming from my.our-domain.net and "my" is close enough to "mx", which would be unfortunate.

If KAM_MXURI is hitting on 'my' then it is not from the current version of KAM.cf. I have a vague recollection of a 'my.' URI match somewhere being removed recently for too many FPs, but I can't find evidence of it being here. The current version of that rule is:

uri             KAM_MXURI       /^(?:http:\/\/)?(mail|mx)\..{1,40}\..{1,8}/i

So, that would likely be a body URI hit, as I see no match in the headers.

At least the NUMERIC_HTTP_ADDR is something I can fix.

MPART_ALT_DIFF should also be fixable simply by making the text/plain part of the message a reasonable rendering of the HTML part or by only sending a text/plain message, which would be even safer but I find hard to get anyone to do. I guess sending only HTML would achieve the same thing, but, ewwww.

You also should look at your trusted_networks and internal_networks settings. If I'm understanding this correctly through the obfuscation, it should have hit ALL_TRUSTED. Keep in mind that trusted_networks is machines whose MTAs you trust to not forge Received headers, it is not necessarily machines you trust to not send spam. That won't help with mail leaving your system, but it will give mail from your machines to you a strong advantage.



Return-Path: <our-domain.supp...@our-domain.com>
Delivered-To: our-domain.supp...@our-domain.com
Received: from ssc010.our-domain.net
        by ssc010.our-domain.net with LMTP
        id KGkdFSHVhWBRCgAAk/bwIA
        (envelope-from <our-domain.supp...@our-domain.com>)
for <our-domain.supp...@our-domain.com>; Sun, 25 Apr 2021 16:46:25 -0400
Return-path: <our-domain.supp...@our-domain.com>
Envelope-to: our-domain.supp...@our-domain.com
Delivery-date: Sun, 25 Apr 2021 16:46:25 -0400
Received: from our-server.our-domain.net ([100.101.102.103]:34044)
by ssc010.our-domain.net with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
        (Exim 4.94)
        (envelope-from <our-domain.supp...@our-domain.com>)
        id 1lale4-0002xo-LD
for our-domain.supp...@our-domain.com; Sun, 25 Apr 2021 16:46:25 -0400
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
d=my.our-domain.net; s=default; h=Content-Transfer-Encoding:Content-Type:
        
MIME-Version:Message-ID:Subject:Reply-To:From:To:Date:Sender:Cc:Content-ID:
        
Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
        
:Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
        List-Subscribe:List-Post:List-Owner:List-Archive;
bh=j53ixXbMXzxOWOuh7uN7dlHw0Vr6LfiGnD/j577LPKs=; b=0nJJlFR/3NPsGrwKOpTGdc+6Vu
        
YO7UqkOwYydYNQijRJqe0dxqUwdHt06x57tx1DhoAJC/EmM6buHejeghdXLO+K+X3Di9rQ/hU85bj
        
uvZnd2jvf4kn/Hg47bCEw7/3oByYNbTJ8VK2WhNTb6x3q0zsbT//ODf5t2afLOM1SqWNW65i2YR2J
        
OvoY+VLh6dH44zhssa0XWuDZ+JYJYKoDMYKLN5SQ9PLqu+tQo50frwLmvfULLqP5scNCir9xWvDHH
        
/WRF490NRwD5ljrTNxAxT6xQgTQV2KGM/ND6WnajJJpT5JeAsGP41C/YzNUOZyhX62DNB4XbYId6b
        Mgj3eN4w==;
Received: from [100.101.102.103] (port=54664 helo=my.our-domain.net)
by our-server.our-domain.net with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
        (Exim 4.94)
        (envelope-from <our-domain.supp...@our-domain.com>)
        id 1lale3-0002hS-Sp; Sun, 25 Apr 2021 16:46:24 -0400
Date: Sun, 25 Apr 2021 20:46:23 +0000
To: "First Last (Customer, Inc.)" <first-l...@their-domain.com>
From: "our-domain Inc." <our-domain.supp...@our-domain.com>
Reply-To: "our-domain Inc." <our-domain.supp...@our-domain.com>
Message-ID: <rqx1wokfk2hpwh7li3bl39dqajytzhujijod1cf...@my.our-domain.net>
X-Mailer: our-domain Inc.
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="b1_rqx1wOkfk2HPwH7li3bl39DQAjYTzhuJiJOD1cfpxU"
Content-Transfer-Encoding: 8bit
X-OutGoing-Spam-Status: No, score=1.3
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - our-server.our-domain.net
X-AntiAbuse: Original Domain - our-domain.com
X-AntiAbuse: Originator/Caller UID/GID - [xx yy] / [xx yy]
X-AntiAbuse: Sender Address Domain - our-domain.com
X-Get-Message-Sender-Via: our-server.our-domain.net: authenticated_id: system-nore...@my.our-domain.net X-Authenticated-Sender: our-server.our-domain.net: system-nore...@my.our-domain.net
X-Source:
X-Source-Args:
X-Source-Dir:
X-Spam-Status: Yes, score=6.7
X-Spam-Score: 67
X-Spam-Bar: ++++++
X-Spam-Report: Spam detection software, running on the system "ssc010.our-domain.net",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
Content preview: our-domain Hosting Services To protect against forged messages, we are using a verification code, set by you, in every message we send. Please check the code below against the value you set. If you have not set a verification
    co [...]
 Content analysis details:   (6.7 points, 5.0 required)
  pts rule name              description
---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
                             blocked.  See
                             
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: list-manage.com]
  0.8 BAYES_50               BODY: Bayes spam probability is 40 to 60%
                             [score: 0.5000]
 -0.0 SPF_HELO_PASS          SPF: HELO matches SPF record
 -0.0 SPF_PASS               SPF: sender matches SPF record
0.0 WEIRD_PORT URI: Uses non-standard port number for HTTP
  1.2 NUMERIC_HTTP_ADDR      URI: Uses a numeric IP address in URL
1.5 KAM_MXURI URI: URI begins with a mail exchange prefix, i.e.
                             mx.[...]
0.0 NORMAL_HTTP_TO_IP URI: URI host has a public dotted-decimal IPv4
                              address
  0.0 HTML_MESSAGE           BODY: HTML included in message
  0.8 MPART_ALT_DIFF         BODY: HTML and text parts are different
0.1 MIME_HTML_MOSTLY BODY: Multipart message mostly text/html MIME 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
                             valid
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
  2.3 HAS_X_OUTGOING_SPAM_STAT Has header claiming outbound spam scan
                             - why trust the results?
X-Spam-Flag: YES
Subject:  ***SPAM***  New Account Information

--
For SpamAsassin Users List


--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire

Reply via email to