Hi,
I've be loosing the fight against spam because company have created groups (like commercial, finnancial, technical) and make them public to send e-mails.
This way several people receive the e-mails... but spam appears to pass thru all config on spam.
Even bayes appears do not be effective when e-mail is directed to group e-mail.
Am I doing something wrong ?no, but maybe there way to improve ;)
Do you only activate the bayes or do you ask your users to reports spams ?
Tue Jul 19 17:59:13 BRT 2016
Usuario: administrativo2 LearnAsSpam: 160 LearnAsHam: 0
Usuario: comercial3 LearnAsSpam: 34 LearnAsHam: 0
Usuario: gcontratos LearnAsSpam: 0 LearnAsHam: 52
Usuario: michel LearnAsSpam: 70 LearnAsHam: 0
Usuario: sec_dir LearnAsSpam: 165 LearnAsHam: 0
ls: cannot access supervisoradm/Maildir/.LearnAsSpam/cur: No such file or directory
---------------------------------------------------------------------------------------------
Total: Spam: 429 Ham: 52
Received: (qmail 19070 invoked by uid 453); 19 Jul 2016 20:13:33 -0000
X-Spam-Level: *
X-Spam-Status: No, hits=1.0 required=4.0
tests=HTML_IMAGE_ONLY_16,HTML_MESSAGE,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_PASS
Subject: =?ISO-8859-1?Q?Campanha_Rel=E2mpago_-_AutoCAD_LT_+_Revit_LT_+_Treinamento?=
Message-ID: <4bf778ddb69689e2798a5e0332f570b6@localhost.localdomain>
List-Unsubscribe: <http://grapho.campaignsender.com.br/admin/sair.php?id=274835|142|0&uid=142227342313080&acao=gravar>
X-List-Unsubscribe: <http://grapho.campaignsender.com.br/admin/sair.php?id=274835|142|0&uid=142227342313080&acao=gravar>
X-Unsubscribe-Web: <http://grapho.campaignsender.com.br/admin/sair.php?id=274835|142|0&uid=142227342313080&acao=gravar>
X-MessageID: 274835
X-ListMember: group@mydomain.tld
Precedence: bulk
X-LocaWeb-COR: locaweb_2009_x-mail
x-locaweb-id: 1RvfJ7/ecbQExJxUjicY0iel7v05/CrzN0nlvFses2GLdlm+uo6eNVEdCnMriVQNixGw1M+OqxWeACKmcw9AaHecZDOG13OJgvFCRtsIFiqqF6L85/NChB99OeOy90Fmafayg1ttKgQ6i/gw09iv7UIQZgm86I+Tgjypcx9PKr99I9qlslBxgDERJvQmwcuqEsUWXRdBZtJ1ielcPVIbkEU4xvxr8BsEgUfwVdu1sUk=
x-locaweb-id2: NmQ2MTcyNmI2NTc0Njk2ZTY3NDA2NzcyNjE3MDY4NmYyZTYzNmY2ZDJlNjI3Mg==
MIME-Version: 1.0
This user move all spam each day to folder LearnAsSpam... and this e-mail was target to group account! ## MailBlacklist.com Spam sources
header __RCVD_IN_MAILBLCOM_B eval:check_rbl('mailblcom-lastexternal', 'service.mailblacklist.com.')
tflags __RCVD_IN_MAILBLCOM_B net
##### MailBlacklist.com Definitions - Bad senders
# Definitions - Bad senders
#################################################
header __RCVD_IN_MAILBLCOM_S eval:check_rbl_sub('mailblcom-lastexternal', '127.0.0.2')
describe __RCVD_IN_MAILBLCOM_S Listed at MailBlacklist.com, Generic Blacklist Listing (-2)
tflags __RCVD_IN_MAILBLCOM_S net
header RCVD_IN_MAILBLCOM_B5 eval:check_rbl_sub('mailblcom-lastexternal', '127.0.0.6')
describe RCVD_IN_MAILBLCOM_B5 Listed at MailBlacklist.com, Very Bad Reputation Sender (-5)
tflags RCVD_IN_MAILBLCOM_B5 net
header RCVD_IN_MAILBLCOM_B4 eval:check_rbl_sub('mailblcom-lastexternal', '127.0.0.7')
describe RCVD_IN_MAILBLCOM_B4 Listed at MailBlacklist.com, Bad Reputation Sender (-4)
tflags RCVD_IN_MAILBLCOM_B4 net
header RCVD_IN_MAILBLCOM_B3 eval:check_rbl_sub('mailblcom-lastexternal', '127.0.0.8')
describe RCVD_IN_MAILBLCOM_B3 Listed at MailBlacklist.com, Low Reputation Sender (-3)
tflags RCVD_IN_MAILBLCOM_B3 net
header RCVD_IN_MAILBLCOM_B2 eval:check_rbl_sub('mailblcom-lastexternal', '127.0.0.9')
describe RCVD_IN_MAILBLCOM_B2 Listed at MailBlacklist.com, Suspicious Sender (-2)
tflags RCVD_IN_MAILBLCOM_B2 net
# MailBlacklist.com Bad
meta RCVD_IN_MAILBLCOM_BL RCVD_IN_MAILBLCOM_B5 || RCVD_IN_MAILBLCOM_B4 || RCVD_IN_MAILBLCOM_B3 || __RCVD_IN_MAILBLCOM_S
describe RCVD_IN_MAILBLCOM_BL MailBlacklist.com Bad Senders
tflags RCVD_IN_MAILBLCOM_BL net
score RCVD_IN_MAILBLCOM_BL 1.0
##########################################################################################
## http://mailspike.org/usage.html
##########################################################################################
header __RCVD_IN_MSPIKE eval:check_rbl('mspike-lastexternal', 'bl.mailspike.net.')
tflags __RCVD_IN_MSPIKE net
##### Reputation compensations
# Definitions
header __RCVD_IN_MSPIKE_Z eval:check_rbl_sub('mspike-lastexternal', '^127\.0\.0\.2$')
describe __RCVD_IN_MSPIKE_Z Spam wave participant
tflags __RCVD_IN_MSPIKE_Z net
header RCVD_IN_MSPIKE_L5 eval:check_rbl_sub('mspike-lastexternal', '^127\.0\.0\.10$')
describe RCVD_IN_MSPIKE_L5 Very bad reputation (-5)
tflags RCVD_IN_MSPIKE_L5 net
header RCVD_IN_MSPIKE_L4 eval:check_rbl_sub('mspike-lastexternal', '^127\.0\.0\.11$')
describe RCVD_IN_MSPIKE_L4 Bad reputation (-4)
tflags RCVD_IN_MSPIKE_L4 net
header RCVD_IN_MSPIKE_L3 eval:check_rbl_sub('mspike-lastexternal', '^127\.0\.0\.12$')
describe RCVD_IN_MSPIKE_L3 Low reputation (-3)
tflags RCVD_IN_MSPIKE_L3 net
# *_L and *_Z may overlap each other, so account for that
meta __RCVD_IN_MSPIKE_LOW RCVD_IN_MSPIKE_L5 || RCVD_IN_MSPIKE_L4 || RCVD_IN_MSPIKE_L3
meta RCVD_IN_MSPIKE_ZBI __RCVD_IN_MSPIKE_Z && !__RCVD_IN_MSPIKE_LOW
# Scores
score RCVD_IN_MSPIKE_ZBI 4.1
score RCVD_IN_MSPIKE_L5 4.1
score RCVD_IN_MSPIKE_L4 3.5
score RCVD_IN_MSPIKE_L3 2.9
# BarracudaCental.org RBL
header RCVD_IN_BRBL eval:check_rbl('brbl-lastexternal','b.barracudacentral.org')
describe RCVD_IN_BRBL Received via a relay in Barracuda BRBL
tflags RCVD_IN_BRBL net
score RCVD_IN_BRBL 3.0
# Spam Eating Monkey
# SEM-BACKSCATTER
header RCVD_IN_SEMBACKSCATTER eval:check_rbl('sembackscatter-lastexternal', 'backscatter.spameatingmonkey.net')
tflags RCVD_IN_SEMBACKSCATTER net
describe RCVD_IN_SEMBACKSCATTER Received from an IP listed by SEM-BACKSCATTER
score RCVD_IN_SEMBACKSCATTER 0.5
# SEM-BLACK
header RCVD_IN_SEMBLACK eval:check_rbl('semblack-lastexternal', 'bl.spameatingmonkey.net')
tflags RCVD_IN_SEMBLACK net
describe RCVD_IN_SEMBLACK Received from an IP listed by SEM-BLACK
score RCVD_IN_SEMBLACK 0.5
# SEM-URI
urirhssub SEM_URI uribl.spameatingmonkey.net. A 2
body SEM_URI eval:check_uridnsbl('SEM_URI')
describe SEM_URI Contains a URI listed by SEM-URI
tflags SEM_URI net
score SEM_URI 0.5
# SEM-URIRED
urirhssub SEM_URIRED urired.spameatingmonkey.net. A 2
body SEM_URIRED eval:check_uridnsbl('SEM_URIRED')
describe SEM_URIRED Contains a URI listed by SEM-URIRED
tflags SEM_URIRED net
score SEM_URIRED 0.5
# SEM-FRESH
urirhssub SEM_FRESH fresh.spameatingmonkey.net. A 2
body SEM_FRESH eval:check_uridnsbl('SEM_FRESH')
describe SEM_FRESH Contains a domain registered less than 5 days ago
tflags SEM_FRESH net
score SEM_FRESH 0.5
# JunmkMailFilter (http://wiki.ctyme.com/index.php/Spam_DNS_Lists)
header __RCVD_IN_JMF eval:check_rbl('JMF-lastexternal','hostkarma.junkemailfilter.com')
describe __RCVD_IN_JMF Sender listed in JunkEmailFilter
tflags __RCVD_IN_JMF net
header RCVD_IN_JMF_W eval:check_rbl_sub('JMF-lastexternal', '127.0.0.1')
describe RCVD_IN_JMF_W Sender listed in JMF-WHITE
tflags RCVD_IN_JMF_W net nice
score RCVD_IN_JMF_W -5
header RCVD_IN_JMF_BL eval:check_rbl_sub('JMF-lastexternal', '127.0.0.2')
describe RCVD_IN_JMF_BL Sender listed in JMF-BLACK
tflags RCVD_IN_JMF_BL net
score RCVD_IN_JMF_BL 3.0
header RCVD_IN_JMF_BR eval:check_rbl_sub('JMF-lastexternal', '127.0.0.4')
describe RCVD_IN_JMF_BR Sender listed in JMF-BROWN
tflags RCVD_IN_JMF_BR net
score RCVD_IN_JMF_BR 1.0
I do not know how SME "handy" you are but I have just added NFR for SQLGrey which is very efficient for BOT type of senders.
[root@andorinha ~]# if [ -z $DAYS ]; then DAYS=1; fi; echo -n "Days of logfiles to scan [$DAYS]: "; read NEWDAYS; if [ $NEWDAYS ]; then DAYS=$NEWDAYS; fi; awk -F"[\t]" ' /logterse plugin/ { svc=$6; count[svc]++; count["Total"]++; } END { for (j in count) print count[j] "\t" j; }' $(find /var/log/qpsmtpd /var/log/sqpsmtpd -ctime -$DAYS -type f) |sort -nr
Days of logfiles to scan [1]:
5113 Total
2482 queued
945 check_goodrcptto
872 rhsbl
415 dnsbl
266 tls
68 spamassassin
43 check_spamhelo
20 check_earlytalker
2 auth::auth_cvm_unix_local
[root@andorinha ~]# if [ -z $DAYS ]; then DAYS=1; fi; echo -n "Days of logfiles to scan [$DAYS]: "; read NEWDAYS; if [ $NEWDAYS ]; then DAYS=$NEWDAYS; fi; awk -F"[\t]" ' /logterse plugin/ { svc=$6; count[svc]++; count["Total"]++; } END { for (j in count) print count[j] "\t" j; }' $(find /var/log/qpsmtpd /var/log/sqpsmtpd -ctime -$DAYS -type f) |sort -nr
Days of logfiles to scan [1]:
3948 Total
1077 queued
1070 check_goodrcptto
949 rhsbl
537 dnsbl
124 tls
95 spamassassin
92 check_spamhelo
4 check_earlytalker
So just 2% are blocked by SA.