Bug 1923 - Multicast address in received should be scored
Summary: Multicast address in received should be scored
Status: RESOLVED FIXED
Alias: None
Product: Spamassassin
Classification: Unclassified
Component: Rules (show other bugs)
Version: 2.20
Hardware: All Linux
: P5 enhancement
Target Milestone: 3.0.0
Assignee: SpamAssassin Developer Mailing List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2003-05-18 15:15 UTC by Robert Strickler
Modified: 2004-03-14 12:16 UTC (History)
0 users



Attachment Type Modified Status Actions Submitter/CLA Status
This is an Outlook msg file, hopefully someone can convert or other wise make it usable in a *nix environment application/octet-stream None Robert Strickler [NoCLA]

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Strickler 2003-05-18 15:15:56 UTC
Attached is the full message. Note the where
a) It tries to spoof being our external mail server (207.177.192.13)
b) (231.9.141.26) (probably forged) a multicast address  according to ARIN 
whois.

I do not think there is a rule yet for scoring the use of a multicast address 
in the delivery chain.
Comment 1 Robert Strickler 2003-05-18 15:23:18 UTC
Created attachment 970 [details]
This is an Outlook msg file, hopefully someone can convert or other wise make it usable in a *nix environment
Comment 2 Hannu Liljemark 2003-05-25 03:25:19 UTC
Best way to show Outlook mails to non-outlooking folks is probably the 
following: right-click over the mail and select options from the bottom of the 
list, or double-click the mail to open it and select options from the View 
menu. You'll see the "Internet headers", and those along with the body ('view 
source' if it's html mail) should be enough... :-) I guess that leaves out 
jpeg/gif and other attachments, though.

Anyways, here with SA 2.54 the spam scored:

Content analysis details:   (22.10 points, 5 required)
X_MSMAIL_PRIORITY_HIGH (0.4 points)  Sent with 'X-Msmail-Priority' set to high
X_PRIORITY_HIGH    (1.9 points)  Sent with 'X-Priority' set to high
SMTPD_IN_RCVD      (0.6 points)  Received via SMTPD32 server (SMTPD32-n.n)
EXTRA_MPART_TYPE   (0.7 points)  Message with extraneous Content-type:...type= 
header
FROM_HAS_MIXED_NUMS (0.1 points)  From: contains numbers mixed in with letters
MARKETING_PARTNERS (2.1 points)  BODY: Claims you registered with some kind of 
partner
OPT_OUT            (0.5 points)  BODY: Talks about opting out (lowercase 
version)
BAYES_80           (2.9 points)  BODY: Bayesian classifier says spam 
probability is 80 to 90%
                   [score: 0.8722]
HTML_40_50         (0.7 points)  BODY: Message is 40% to 50% HTML
HTML_IMAGE_ONLY_06 (0.6 points)  BODY: HTML has images with 400-600 bytes of 
words
RCVD_IN_NJABL      (0.8 points)  RBL: Received via a relay in dnsbl.njabl.org
                   [RBL check: found 154.240.75.220.dnsbl.njabl.org., type: 
127.0.0.9]
RCVD_IN_OSIRUSOFT_COM (0.9 points)  RBL: Received via a relay in 
relays.osirusoft.com
                   [RBL check: found 154.240.75.220.relays.osirusoft.com., 
type: 127.0.0.9]
RCVD_IN_OPM        (4.3 points)  RBL: Received via a relay in opm.blitzed.org
                   [RBL check: found 154.240.75.220.opm.blitzed.org., type: 
127.1.0.4]
FORGED_MUA_OUTLOOK (2.2 points)  Forged mail pretending to be from MS Outlook
MIME_HTML_ONLY     (0.1 points)  Message only has text/html MIME parts
MISSING_MIMEOLE    (0.1 points)  Message has X-MSMail-Priority, but no X-MimeOLE
OBFUSCATING_COMMENT (3.2 points)  HTML comments which obfuscate text

And now to the real reason I wanted to reply: it seems all reserved netblocks 
are popular in the Received fakes/spoofs spammers use. Not just multicast 
addresses, but others as well. And using addresses that actually are used is 
also common... at least DoD networks seem to appear often :-)

Some firewall scripts drop stuff coming from blocks listed as reserved at 
http://www.iana.org/assignments/ipv4-address-space, but I'm not sure if that's 
a good idea for SA to somehow score based on that. Doesn't SA have some kind of 
Received forgery detection anyways.
Comment 3 Riku Voipio 2003-09-18 04:20:06 UTC
I did quick statistics on how much spam includes spoofed IANA reserved 
addresesses by creating a local DNSBL. sorry for the small corpus, due to 
full hard drive I deleted all spam folders last week... 
 
OVERALL     SPAM      HAM     S/O   SCORE  NAME 
    622      210      412    0.338   0.00    0.00  (all messages) 
     14       14        0    1.000   0.00   1.00  RCVD_IN_IANA 
 
Later I noticed that these IP's are already listed in 
$IP_IN_RESERVED_RANGE , togetether  with RFC1918 and other special 
purpose addresses, which is not very usefull for scoring. There are 
RFC1918 valid reasons to have RFC1918 addressess in mail, unlike an 
IANA reserved or multicast address which are obvious forgery. 
 
spamassassin should split IP_IN_RESERVED_RANGE to 
IP_ILLEGAL_RANGE all the addressess that can be safely assumed to be 
forged on sight. 
IP_IN_NONPUBLIC_RANGE loopback, RFC1918 and similar legal but 
non-routable addressess, used for ignoring (like 
IP_IN_RESERVED_RANGE is used now) 
 
 
 
 
 
 
 
Comment 4 Rich Puhek 2003-09-18 09:50:02 UTC
Subject: Re: [SAdev]  Multicast address in received should be scored


bugzilla-daemon@bugzilla.spamassassin.org wrote:

> http://bugzilla.spamassassin.org/show_bug.cgi?id=1923
> 
> ------- Additional Comments From nchip@kos.to  2003-09-18 04:20 -------
> I did quick statistics on how much spam includes spoofed IANA reserved 
> addresesses by creating a local DNSBL. sorry for the small corpus, due to 
> full hard drive I deleted all spam folders last week... 
>  
> OVERALL     SPAM      HAM     S/O   SCORE  NAME 
>     622      210      412    0.338   0.00    0.00  (all messages) 
>      14       14        0    1.000   0.00   1.00  RCVD_IN_IANA 
>  
> Later I noticed that these IP's are already listed in 
> $IP_IN_RESERVED_RANGE , togetether  with RFC1918 and other special 
> purpose addresses, which is not very usefull for scoring. There are 
> RFC1918 valid reasons to have RFC1918 addressess in mail, unlike an 
> IANA reserved or multicast address which are obvious forgery. 
>  
> spamassassin should split IP_IN_RESERVED_RANGE to 
> IP_ILLEGAL_RANGE all the addressess that can be safely assumed to be 
> forged on sight. 
> IP_IN_NONPUBLIC_RANGE loopback, RFC1918 and similar legal but 
> non-routable addressess, used for ignoring (like 
> IP_IN_RESERVED_RANGE is used now) 
>  

I highly agree. Although, perhaps it would just be simpler to remove the 
RFC1918 addresses from IP_ILLEGAL_RANGE?

In my own setup, for instance, My external SMTP gateway (which also 
virus scans using Amavis) passes inbound email to my main mailserver 
over a 10.x.x.x network. Similarily, my webmail server passes outbound 
email to the SMTP servers over the 10.x.x.x network.

Also worth mentioning is the need to periodically review IANA's 
allocation. As anyone using the IANA-RESERVED blocks at their edge 
routers (hopefully) knows, they're occasionally released (like 
69.0.0.0/8, which was reserved until Aug of 2002, and now includes SBC, 
among others).

--Rich

_________________________________________________________

Rich Puhek
ETN Systems Inc.
2125 1st Ave East
Hibbing MN 55746

tel:   218.262.1130
email: rpuhek@etnsystems.com
_________________________________________________________

Comment 5 Justin Mason 2004-03-14 21:16:37 UTC
ok, now in testing as T_RCVD_ILLEGAL_IP