On Tue, 28 Nov 2006, Mark Martinec wrote:

Loren Wilton wrote:
Other than the fact I tend to agree with its conclusions by looking at
those hostnames, I suppose it means that the plugin needs some special case
exceptions for ebay, paypal, and amazon.

Right, too many false positives here as well.

Maybe it will need to run after domainkeys (if that is running) to help
verify that the paypal/ebay path isn't too obviously spoofed.  (Although
that check can be done fairly well simply with a regex.)

Indeed. Also coupling it with p0f (passive operating system fingerprinting)
matching on non-unix hosts seems to bring up the best of both approaches:

meta  BOTNET_W    !DKIM_VERIFIED && !DK_VERIFIED && (L_P0F_WXP ||
 L_P0F_W || L_P0F_UNKN) && (BOTNET_CLIENT+BOTNET_BADDNS+BOTNET_NORDNS) > 0
score BOTNET_W    3.2

meta  BOTNET_OTHER  !BOTNET_W &&
 (BOTNET_CLIENT+BOTNET_BADDNS+BOTNET_NORDNS) > 0
score BOTNET_OTHER  0.5

About p0f see:
 http://marc.theaimsgroup.com/?l=amavis-user&m=116439276912418
 http://marc.theaimsgroup.com/?l=amavis-user&m=116440910822408


Here is the link to the p0f SA plugin, I am running on my production server, seems working well.
Caution: It does tag email from hotmail :)

http://www.vcn.bc.ca/~vli/P0f.pm

Thank Mark for the inspiration!

Mark


Vincent Li      http://pingpongit.homelinux.com
Opensource      .Implementation. .Consulting.
Platform        .Fedora. .Debian. .Mac OS X.
Blog            http://bl0g.blogdns.com

Reply via email to