> For the past few days lots of missed spam has been getting through, running >>> SA 3.4.1 on Fedora 25 with sendmail. I see that they are being tagged with >>> URIBL_RHS_DOB, i.e., domains registered in the last five days. Since we >>> are not running our own DNS server (yet--need permission from our CISO) >>> URIBL_BLOCKED is also being triggered. Is there a way to update this? > >> Update what how?
You answered below…thanks. > >> I note that message hit BAYES_00. If content like that is getting a >> "strong ham" Bayes score, you should review your training processes and >> Bayes corpora - you *do* keep copies of messages you train Bayes with, >> right? :) Yes just re-synced. > If you trust URIBL_RHS_DOB to not hit your ham, you can increase the score >> of URIBL_RHS_DOB in your local rules file. > >> If you'd prefer a more-focused solution, use a meta rule; perhaps: > >> meta LCL_DOB_FROM_INFO __FROM_DOM_INFO && URIBL_RHS_DOB >> score LCL_DOB_FROM_INFO 2.500 # or whatever you're comfortable with Great trying this now. > >> But: fixing your Bayes and getting a non-forwarding DNS server for your >> mail system so that you're not hitting RBL query limits are the biggest >> things you need to do to address this. It’s enabled and looks like it’s working based on this and that use_bayes 1 in local.cf sa-learn --dump magic 0.000 0 3 0 non-token data: bayes db version 0.000 0 688 0 non-token data: nspam 0.000 0 80012 0 non-token data: nham 0.000 0 164827 0 non-token data: ntokens 0.000 0 1485101489 0 non-token data: oldest atime 0.000 0 1496149547 0 non-token data: newest atime 0.000 0 0 0 non-token data: last journal sync atime 0.000 0 1496152035 0 non-token data: last expiry atime 0.000 0 11059200 0 non-token data: last expire atime delta 0.000 0 99547 0 non-token data: last expire reduction count > >>> I have't seen an update in sa-update since 03-May-2017 01:52:05: > >> Masscheck and updates are *almost* back. Great I’ll keep an eye out. > >>> Here's a typical mail header & message content: >>> https://urldefense.proofpoint.com/v2/url?u=https-3A__pastebin.com_Rw1S7mWe&d=DwIFAw&c=aqMfXOEvEJQh2iQMCb7Wy8l0sPnURkcqADc2guUW8IM&r=X0jL9y0sL4r4iU_qVtR3lLNo4tOL1ry_m7-psV3GejY&m=bpKADIzstZa5G-g1qsGBa7gWKq4zTcrA_-E0jGYOsdo&s=_uJa-KDGfZ2CN8vjSlDNEmfotigbWHyD9TZaKnJwzNM&e= >>> >>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__pastebin.com_Rw1S7mWe&d=DwIFAw&c=aqMfXOEvEJQh2iQMCb7Wy8l0sPnURkcqADc2guUW8IM&r=X0jL9y0sL4r4iU_qVtR3lLNo4tOL1ry_m7-psV3GejY&m=bpKADIzstZa5G-g1qsGBa7gWKq4zTcrA_-E0jGYOsdo&s=_uJa-KDGfZ2CN8vjSlDNEmfotigbWHyD9TZaKnJwzNM&e=> >>> > >> Thanks for that. Looks like the IP is being picked up on a few RBLs now. > > Do you have any RBLs setup in sendmail? You need > to use bb.barracudacentral.org <http://bb.barracudacentral.org/> and > zen.spamhaus.org <http://zen.spamhaus.org/> > at a minimum. Hopefully your DNS server situation > can get fixed soon so you can use BLs successfully. > Indeed we do plus spamcop: FEATURE(`dnsbl', `b.barracudacentral.org', `', `"550 Mail from " $&{client_addr} " refused. Rejected for bad WHOIS info on IP of your SMTP server " in http://www.barracudacentral.org/lookups "')dnl FEATURE(`dnsbl',`zen.spamhaus.org')dnl FEATURE(`enhdnsbl', `bl.spamcop.net', `"Spam blocked see: http://spamcop.net/bl.shtml?"$&{client_addr}', `t')dnl > If you switched to Postfix, there are many benefits > to using Postscreen with weighted RBLs. I have over > 20 RBLs working together for best accuracy and low > false positives. We have several mailing lists and users past & present and the transition would be a bit painful. > SpamAssassin is primarily going to be a content filter > with some reputation checks. Setup the MTA to be > primarily reputation checks with DNS (i.e. make sure > the sending IP has a PTR record [RDNS_NONE]) and > RBL lookups. > > The MTA should be blocking the majority of spam > before it gets to SpamAssassin. That’s what I thought, and we have even more filters in place, including the suggestion in https://www.autonarcosis.com/2015/10/14/vanity-top-level-domains-how-to-block-them-using-sendmail/ <https://www.autonarcosis.com/2015/10/14/vanity-top-level-domains-how-to-block-them-using-sendmail/> to use the access file to block all of those vanity top level domains. I even have a regex to block anysubdomain.anydomain.us|info. And we have clamavjunofficial-sigs from extremeshok enabled. Anything else to check?