I'm not familiar enough to tell if an address is forged or not.
Here is the scoring from one of the spam messages from autoconf...@amazon.com 
which I suspect tainted AWL:

Content analysis details:   (29.4 points, 5.0 required)

pts rule name              description
---- ---------------------- --------------------------------------------------
1.9 URIBL_AB_SURBL         Contains an URL listed in the AB SURBL blocklist
                           [URIs: bestcomputerized.com]
1.5 URIBL_WS_SURBL         Contains an URL listed in the WS SURBL blocklist
                           [URIs: bestcomputerized.com]
1.5 URIBL_JP_SURBL         Contains an URL listed in the JP SURBL blocklist
                           [URIs: bestcomputerized.com]
3.5 URIBL_BLACK            Contains an URL listed in the URIBL blacklist
                           [URIs: bestcomputerized.com]
4.0 BAYES_99               BODY: Bayesian spam probability is 99 to 100%
                           [score: 1.0000]
2.5 HELO_DYNAMIC_IPADDR2   Relay HELO'd using suspicious hostname (IP addr
                           2)
1.0 FH_HELO_EQ_D_D_D_D     Helo is d-d-d-d
0.4 HTML_MESSAGE           BODY: HTML included in message
1.5 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL
                           [95.134.111.12 listed in zen.spamhaus.org]
4.1 RCVD_IN_XBL            RBL: Received via a relay in Spamhaus XBL
3.0 URIBL_SBL              Contains an URL listed in the SBL blocklist
                           [URIs: bestcomputerized.com]
3.0 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
                           [URIs: bestcomputerized.com]
              [Blocked - see <http://www.spamcop.net/bl.shtml?95.134.111.12>]
1.5 RDNS_DYNAMIC           Delivered to trusted network by host with
                           dynamic-looking rDNS

--- and the headers:

Received: (qmail 25679 invoked from network); 22 Aug 2010 06:47:56 -0600
Received: from 12-111-134-95.pool.ukrtel.net (95.134.111.12)
  by mail.smallgod.net with SMTP; 22 Aug 2010 06:47:55 -0600
Received-SPF: unknown (mail.smallgod.net: domain at spf.smallgod.net does not 
designate permitted sender hosts)
Received: from mm-notify-out-209-84.amazon.com (mm-notify-out-209-84.amazon.com 
[72.21.209.84])
        by server94.appriver.com with asmtp 
        id 8064CA-0003F6-18;
        for <host...@jpkvideo.net>; Sun, 22 Aug 2010 15:47:34 +0200
Date: Sun, 22 Aug 2010 15:47:34 +0200
From: "auto-conf...@amazon.com" <auto-conf...@amazon.com>
To: <host...@jpkvideo.net>
Message-ID: 
<000d01cb41f8$31007700$6400a8c0.javamail.corre...@na-mm-relay.amazon.com>
Subject: Your Order with Amazon.com
MIME-Version: 1.0
Content-Type: multipart/alternative; 
        boundary="----=_Part_9404548_33090959.9063490075401"
Bounces-to: da5f1995b875ded4537402d6b10da455cf04fa500aa...@bounces.amazon.com
X-AMAZON-MAIL-RELAY-TYPE: notification
X-AMAZON-RTE-VERSION: 2.0


 
On Mar 6, 2011, at 12:33 PM, Karsten Bräckelmann wrote:

> On Sun, 2011-03-06 at 11:39 -0800, JP Kelly wrote:
>> Yeah that sender's email address had been forged for a bunch of spam I
>> received.
> 
> Without reading the following paragraph, I'd immediately suspect a
> cracked account, not address forgery. The AWL is limited by address and
> originating net-block (default /16, configurable since 3.3), thus it is
> rather unlikely, spam with that address forged is sent from a nearby
> address...
> 
>> I used spamasassin --remove-addr-from-whitelist for that address 
>> Also I did not have internal_networks and trusted_networks lines in my
>> local.cf, which I added. Hopefully that will help. Thanks!
> 
> Bad internal and trusted networks settings would also explain this,
> though.
> 
> If those are missing a forwarding / relay system, that one will be
> considered the handing-over machine -- which renders most DNSBLs as well
> as a lot of rules useless. Plus, as far as AWL is concerned, the
> net-block constraint effectively is disabled.
> 
> 
> Kind of wonder though, why that Amazon outgoing SMTP cluster should be
> part of your internal network. Or, how a forged address ended up being
> sent through it...
> 
>>>> -4.0 RCVD_IN_DNSWL_MED    RBL: Sender listed at http://www.dnswl.org/, 
>>>> medium trust
>>>>                          [72.21.212.35 listed in list.dnswl.org]
> 
> -- 
> char *t="\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4";
> main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
> (c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}
> 

Reply via email to