> -----Original Message-----
> From: Jim Maul [mailto:[EMAIL PROTECTED] 
> Sent: donderdag 2 november 2006 19:58
> To: users@spamassassin.apache.org
> Subject: Re: BIG increase in spam today
> 
> 
> 
> > 92% (!) of all incoming spam uses an invalid HELO.
> > 
> > 9% pretends to be me in their HELO.
> > 
> 
> Is this 9% included in the above 'invalid HELO' number?

Yes. I should have been more clear about that. 92% fails the HELO tests,
for one reason or another. Of those 92%, 9% are HELOs pretending to be me
(either my primary domain, or the domains I host, or address literals
pretending to be me). The 8% that fails the PTR != HELO country TLD is
also included in the 92%.

The rest of the invalid HELOs are just non-FQDNSs (like "HELO friend"), or
IP addresses (not inside braces, like an address literal).

Then there's a complex HELO category I mark, to counter spam bursts, based
on sequence heuristics within a very short time-frame, like:

Nov  2 18:23:43 asarian-host sendmail[6152]: kA2HNhKN006152: <-- EHLO
MATTHIAS.uuuiguu.net
Nov  2 18:23:46 asarian-host sendmail[6155]: kA2HNkDE006155: <-- EHLO
MATTHIAS.me1n93.net
Nov  2 18:23:50 asarian-host sendmail[6161]: kA2HNo6N006161: <-- EHLO
MATTHIAS

(where the third-level TLD, in caps, is the basis for the group as a
total). I'm still experimenting with it (not actually blocking on it yet);
but the number of FPs is zero so far (running for several weeks).

Seriously, HELO tests rock!

- Mark

Reply via email to