Installed the OCR thingy and i still get those darn imgae spams going through.....

John Rudd jrudd at ucsc.edu
Thu Nov 23 21:53:07 GMT 2006


Jeff Mills wrote:
> 
>> Have you tried my Botnet plugin?  It doesn't look at the images 
>> directly, but it does seem to catch just about all of those messages, 
>> because they're coming from botnet hosts.
>>
> Where does one get your botnet plugin?
> I'll give it a shot!
> 
> 

I had just announced the latest release here this morning.  Here's the 
announcement:


(since I've recently mentioned this plugin on the mailscanner and 
communigate pro mailing lists, as an effective means of catching spam 
from botnets, I'm cross-posting this message)


I've changed RelayChecker's name to Botnet (since that's its real 
purpose: identify potential botnet submitted messages).  Here's the 0.4 
release.

Botnet is a spam assassin plugin which attempts to identify whether or 
not a message was submitted via a botnet host.  It does this by looking 
at its DNS characteristics.

http://people.ucsc.edu/~jrudd/spamassassin/Botnet.tar

Install instructions are in the Botnet.txt file and in the INSTALL text 
file.


Changes:

1) Changed all of the rules from RELAY_CHECKER_* to BOTNET_*

2) Changed all of the config items from relaychecker_* to botnet_*

3) While the config items were stored in the global Spam Assassin Config 
hash, they were stored with names like "skip_ip" instead of 
relaychecker_skip_ip.  Now they're stored with botnet_skip_ip, so that 
they don't conflict with any other plugin's potential "skip_ip" 
configuration parameter.

4) I've removed the '*_reduced_dns' option.  Instead, Botnet 
automatically uses the rdns= part of the Untrusted Relay pseudo-header 
for the hostname.  This reduces the number of DNS checks by up to 5 
checks.  It still does a DNS check in the BOTNET_BADDNS rule.  You can 
avoid that one DNS check if you set that rule's score to 0.

5) BOTNET_BADDNS has a 4 part score now (0.01 0.01 0.00 0.01) so that it 
will properly be disabled if you're not doing network checks.

6) the *_IPHOSTNAME rule changed to BOTNET_IPINHOSTNAME.  Similarly, the 
corresponding function is botnet_ipinhostname.

7) There are now two keyword checks.  BOTNET_CLIENTWORDS is the same as 
the old keyword rule: it looks for words that look like client 
hostnames.  Now there is also a BOTNET_SERVERWORDS for words that look 
like mail server hostnames.  It acts as a counter to BOTNET_CLIENTWORDS 
and BOTNET_IPINHOSTNAME.

(I honestly wasn't sure what to think of what became the SERVERWORDS 
feature when it was suggested ... but it hasn't been causing any 
problems with its default word list ("mail" and "smtp"))

8) The botnet_serverwords config option works like the old 
relaychecker_keywords config option (space delimited regular expressions 
for words to use in the BOTNET_SERVERWORDS rule).  The 
relaychecker_keywords config has been changed to botnet_clientwords.

9) The BOTNET meta rule has 3 things it looks at: BOTNET_NORDNS, 
BOTNET_BADDNS and a new meta rule BOTNET_CLIENT.  BOTNET_CLIENT is as 
follows:

(BOTNET_IPINHOSTNAME || BOTNET_CLIENTWORDS) && !BOTNET_SERVERWORDS

10) There's now an INSTALL file with very general installation 
instructions, and some install instructions in Botnet.txt (less general 
than the INSTALL file).

11) Oh, and, the included cf file had one of my own local address 
exceptions in it (my mail server subnet at work).  I have taken that out 
of the released cf file.  (I was surprised no one had mentioned it)

12) The BOTNET rule is now worth 5 points, instead of 6.  It would be 
interesting to know what people have found as useful scores for the plugin.



So, let me know what you think.  Let me know if you find any bugs, what 
your hit/miss/fp stats are (one person said 78% accuracy with 1% fp's), 
things like that.  I hope no one has any new feature suggestions... it 
seems like it's pretty close to addressing the complete picture.  I'm 
hoping my next release is going to be 1.0.

Also, I'm trying to decide on two things:

a) Does anyone think I _should_ switch to Net::DNS for the botnet_baddns 
function?  Or is the gethostbyname() call good enough?

b) It seems kind of cluttered to have all of the various BOTNET_* rules 
show up in the test list and detailed report.  But I have kept it that 
way, instead of changing their names to have __ in front, so that I can 
see what sub-rules were specifically triggered.  What are people's 
opinions on that, for the 1.0 release:
     i) do you want me to leave it as it is, or
    ii) put in the __ so that the sub-rules stop showing up in the
        final report?



More information about the MailScanner mailing list