On 6/8/2016 1:20 PM, John Hardin wrote:
On Wed, 8 Jun 2016, Mark London wrote:
Hi - We received an email with several large postscript attachments, and the content type was "text/plain". This caused our spamassassin server to use up 100% CPU, parsing the attachments as text. I temporarily disabled spam scanning to allow the message to go through. How can I prevent this in the future? I know about the time limit feature, but this doesn't prevent the server from running 100% of the time, before the time limit is reached. Any suggestions? Thanks. - Mark

Content-Transfer-Encoding: base64
Content-Type: text/plain;
name=OTBW_3D_256_ngtot100_de03_coll_dissip_1248.ps
Content-Disposition: attachment;
 filename=OTBW_3D_256_ngtot100_de03_coll_dissip_1248.ps
Do you have something that could catch text/plain + *.ps before SA get handed the message (e.g. a regex milter or other test)?

I'm using MIMEDefang. I haven't looked to see what I could do with that. I've been running spamassassin for more years than I remember, and this is the first time I've encountered this situation.

Someone else asked about my file size limit. I know that for a 512K postscript file as text/plain, that it takes up 100% of the CPU of one process, for about 1 minute. But I have a much larger file size limit, which I've increased over the years, in response to spam that we've received here.

I believe the problem has always been there, but it's rarely been abused like this. I can't think of a proper solution. I guess maybe I'll just hope it never happens again. :) - Mark

Reply via email to