On Oct 29, 2015, at 4:04 PM, Bill Cole 
<sausers-20150...@billmail.scconsult.com> wrote:

> On 29 Oct 2015, at 11:09, Alex wrote:
> 
>> Hi,
>> 
>> I've been receiving tons of messages not being tagged by spamassassin
>> on one host, despite it hitting bayes999, and wanted to see if there
>> was something that could be done.
>> 
>> http://pastebin.com/vxrUdEvy
>> 
>> As of right now, 23.246.233.6 isn't listed on zen or any other popular
>> RBL, and there doesn't appear to be anything standing out in the
>> header that could be used.

Sorry to reply to Bill instead of Alex, don’t have the original message.

I am a bit surprised that even this long after the original report how few RBLs 
have this listed:

http://multirbl.valli.org/lookup/23.246.233.6.html

> 
> [ INTENTIONAL VAGUENESS FOLLOWS ]
> 
> Well, there might be, if you look for things that might have been added by 
> the spammer to trace the source of "sanitized" spam reports, for the purpose 
> of listwashing.
> 
> I'm VERY careful about adding SA rules that hit on non-standard+non-X-* 
> headers broadly, but those sorts of rules can be very productive if you have 
> adequate time and mailstream to test them. Snowshoers are the vanguard of the 
> spam arms race and can't seem to resist effectively giving their messages 
> fingerprints

Only one piece of the headers there looks a bit odd to me, but I may not be 
seeing the same thing. :)

Charles

> 
>> I realize I could write some body rules
>> (this is what I miss most about SOUGHT), but as you know it's often
>> too late to catch such a moving target. I'm finding very large blocks
>> of IPs are typically involved with these campaigns.
> 
> Or in this case, not so much: "whois -h whois.arin.net '+ 23.246.233.6'" 
> shows a /28 SWIP'ed earlier this month.
> 
> I wish there were a usable way to automate whois lookups across RIRs to 
> identify recently reassigned small blocks like that to add a probationary 
> point to SA scores (i.e. IP in a /25 or smaller net reassigned within 30 days 
> => score 1.0) but unfortunately the various bodies managing IP addresses are 
> in aggregate an obstinately anti-interop collection of narcissists, many of 
> whom have actively fought against any publicly usable federation of their 
> precious proprietary databases. (BUT: see below)
> 
>> I have dozens of these that get through before they are blacklisted
>> and would like a more general or broad solution.
> 
> Tools used in front of handling messages can help:
> 
> 1. Greylisting. As you seem to understand, these don't take terribly long to 
> ruin the reputations of their IPs and/or the domains of URLs in their bodies, 
> so making the sender wait 10 minutes can often get you past the window of 
> novelty.
> 
> 2. DNS patterns. Note that the HELO name resolves to the client IP but that 
> IP's PTR resolves to a generic name programmatically derived from the IP. The 
> spammer has taken care with DNS to get affirmative SPF results for the 
> envelope sender and HELO, but hasn't bothered to fix his PTR? Sloppy 
> spammer...
> 
> 3. Hacky imperfect whois-checking scripts. I wouldn't advise this on a 
> high-volume system, but if you can tolerate missing some cases in order to 
> err on the side of safety & taking an extra half second on every SMTP 
> session, it isn't terribly hard to identify ~75% of the snowshoe blocks at 
> connect time (and almost never penalize a legitimate sender, because 
> legitimate senders with SWIP'ed IP ranges tend to keep them for more than one 
> billing period.)
> 
>> They typically hit at least bayes80 with sa-3.4.1.
>> 
>> Are there any routines out there that can extract the last-external IP
>> and either store it in a file or otherwise make it available to be
>> added to a check_client_access map?
> 
> I'm not aware of any existing canned tools that try to automate detection of 
> messages that SA has made a mistake on and block by IP based on that 
> second-guessing. It seems like an unwise tactic.

Reply via email to