Bug 3814 - ALL_TRUSTED fp with AV scanner MTA inserting IP address of 127.0.0.1.
Summary: ALL_TRUSTED fp with AV scanner MTA inserting IP address of 127.0.0.1.
Status: RESOLVED WORKSFORME
Alias: None
Product: Spamassassin
Classification: Unclassified
Component: Rules (show other bugs)
Version: 3.0.0
Hardware: Other Linux
: P5 normal
Target Milestone: Undefined
Assignee: SpamAssassin Developer Mailing List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2004-09-23 16:54 UTC by Ray Dzek
Modified: 2004-11-01 02:35 UTC (History)
1 user (show)



Attachment Type Modified Status Actions Submitter/CLA Status

Note You need to log in before you can comment on or make changes to this bug.
Description Ray Dzek 2004-09-23 16:54:54 UTC
We are also seeing the ALL_TRUSTED fire on all emails inbound at -3.3 which is
obviously letting a lot of stuff through.  Our network has Symantec AV server up
front, which then enters our linux box with SpamAssassin and then travels on to
our main mail server.  Here is the header from one of the emails.

Return-Path: <PremiumCigars@notethebook.com>
Delivered-To: rdzek@specialized.com
Received: by pop.specialized.com (Postfix, from userid 501)
	id 24A163EE5; Thu, 23 Sep 2004 16:21:06 -0700 (PDT)
Received: from mail2.specialized.com (mail2.specialized.com [10.1.0.22])
	by pop.specialized.com (Postfix) with SMTP id 89EEC3EDC
	for <rdzek@specialized.com>; Thu, 23 Sep 2004 16:21:03 -0700 (PDT)
Received: from www55.bestproductcarrier.com ([83.69.178.33])
 by mail2.specialized.com (SAVSMTP 3.1.1.32) with SMTP id M2004092316462421631
 for <rdzek@specialized.com>; Thu, 23 Sep 2004 16:46:25 -0700
Received: (qmail 17264 invoked by uid 0); 23 Sep 2004 19:20:35 -0400
From: Premium Cigars <PremiumCigars@notethebook.com>
To: <rdzek@specialized.com>
Subject: Cigar Sampler and Free Gifts from Thompson Cigar
Date: Thu, 23 Sep 2004 19:20:35 -0400
Message-Id: <dkxtfwuq@notethebook.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="yemncejgfb_1095981642"
X-Spam-Checker-Version: SpamAssassin 3.0.0 (2004-09-13) on pop.specialized.com
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=ALL_TRUSTED,AWL,BAYES_20,
	DNS_FROM_AHBL_RHSBL,HTML_90_100,HTML_MESSAGE,MPART_ALT_DIFF,
	MSGID_SPAM_LETTERS,URIBL_SBL,URIBL_WS_SURBL autolearn=no version=3.0.0
Status:
Comment 1 Lance Vavricka 2004-10-11 01:31:21 UTC
I to am having a similar problem, below is one of the headers.  I'm getting a 
lot of spam with ALL_TRUSTED being fired.  I'm running exim4.43+exiscan+sa3

Return-path: <bounceto-10006-1814118845@bounceto.staghug.com>
Envelope-to: lancev@interpod.net
Received: from localhost ([127.0.0.1] helo=staghug.com)
	by mail.interpod.net with smtp (Exim 4.43)
	id 1CGvNo-0007Eq-R0
	for lancev@interpod.net; Mon, 11 Oct 2004 03:18:17 -0500
Content-Type: multipart/alternative; boundary="----------=_1097462325-10565-0"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.411 (Entity 5.404)
To: <lancev@interpod.net>
Received: from img.staghug.com by staghug.com id
 <10006.288622.1814118845@staghug.com> for lancev@interpod.net;
 Mon, 11 Oct 2004 08:15:11 GMT
From: "P.T.P." <P.T.P.-replyto-10006-1814118845@lists.staghug.com>
Subject: Complimentary Computer- find out how to get it!
Date: Mon, 11 Oct 2004 08:15:11 GMT
Message-ID: <10006.288622.1814118845@staghug.com>
Errors-To: <bounceto-10006-1814118845@bounceto.staghug.com>
Reply-To: P.T.P.-replyto-288622-1814118845@lists.staghug.com
List-Unsubscribe: <http://www.staghug.com/unsub.php?id=BIBEBBIIEF5BAAAG600>,
 <mailto:P.T.P.-unsubscribe-10006@lists.staghug.com?subject=unsubscribe>
X-Spam-Score: 0.5 (/)
X-Spam-Report: Spam detection software, running on the 
system "mordor.interpod.net", has
	identified this incoming email as possible spam.  The original message
	has been attached to this so you can view it (if it isn't spam) or 
label
	similar future email.  If you have any questions, see
	abuse@interpod.net for details.
	Content preview:  Do you need a laptop? Here's your chance to get one 
for
	free! http://www.staghug.com/link.php?BIBEBBIIEF5CIIGCC4IACEIH00 It's a
	New Member Incentive Promotion- Complete the program and get a
	complimentary IBM Laptop computer! [...] 
	Content analysis details:   (0.5 points, 5.0 required)
	pts rule name              description
	---- ---------------------- -------------------------------------------
-------
	0.5 FROM_ENDS_IN_NUMS      From: ends in numbers
	-2.9 ALL_TRUSTED            Did not pass through any untrusted hosts
	2.4 MARKETING_PARTNERS     BODY: Claims you registered with a partner
	0.0 EXCUSE_3               BODY: Claims you can be removed from the 
list
	0.0 EXCUSE_7               BODY: Claims you can be removed from the 
list
	0.0 HTML_80_90             BODY: Message is 80% to 90% HTML
	0.8 HTML_TEXT_AFTER_BODY   BODY: HTML contains text after BODY close 
tag
	1.1 HTML_IMAGE_RATIO_02    BODY: HTML has a low ratio of text to image 
area
	0.0 HTML_MESSAGE           BODY: HTML included in message
	0.0 HTML_TEXT_AFTER_HTML   BODY: HTML contains text after HTML close 
tag
	-1.7 BAYES_00               BODY: Bayesian spam probability is 0 to 1%
	[score: 0.0000]
	0.1 MIME_QP_LONG_LINE      RAW: Quoted-printable line longer than 76 
chars
Comment 2 Lance Vavricka 2004-10-11 02:09:31 UTC
I would also like to mention that I am having Interscan Viruswall loading 
exim.  viruswall scans the msg and the exim handles the rest.
Comment 3 Theo Van Dinter 2004-10-11 05:53:38 UTC
Subject: Re:  ALL_TRUSTED

On Mon, Oct 11, 2004 at 01:31:22AM -0700, bugzilla-daemon@bugzilla.spamassassin.org wrote:
> I to am having a similar problem, below is one of the headers.  I'm getting a 
> lot of spam with ALL_TRUSTED being fired.  I'm running exim4.43+exiscan+sa3

ALL_TRUSTED says that the message is received without even going through an
untrusted machine.

> Received: from localhost ([127.0.0.1] helo=staghug.com)
> 	by mail.interpod.net with smtp (Exim 4.43)
> 	id 1CGvNo-0007Eq-R0
> 	for lancev@interpod.net; Mon, 11 Oct 2004 03:18:17 -0500

This is the only usable Received header available, which specifies the message
was sent from localhost (127.0.0.1).  Therefore the message is considered
"trusted".

It looks like either exim or exiscan either isn't putting in proper Received
headers before calling SA, or the message actively came from localhost
somehow.

Comment 4 Lance Vavricka 2004-10-11 09:45:41 UTC
I think the problems are from Interscan's Viruswall, on the same machine as 
exim.  Viruswall passes the scanned message to exim, thus coming from 
localhost.  Is there a way around this, without disabling or moving Viruswall 
to another machine?  This sounds like the same problem rdzek is having with 
the AV program passing the message from within the network, then becoming 
trusted.
Comment 5 Ray Dzek 2004-10-11 10:57:32 UTC
Subject: RE:  ALL_TRUSTED




Ray Dzek
Network Operations Supervisor
Specialized Bicycle Components
PH:  408-782-5420
FX:  408-782-5421 

-----Original Message-----
From: bugzilla-daemon@bugzilla.spamassassin.org
[mailto:bugzilla-daemon@bugzilla.spamassassin.org] 
Sent: Monday, October 11, 2004 9:46 AM
To: rdzek@pop.specialized.com
Subject: [Bug 3814] ALL_TRUSTED


http://bugzilla.spamassassin.org/show_bug.cgi?id=3814





------- Additional Comments From lancev@interpod.net  2004-10-11 09:45
------- I think the problems are from Interscan's Viruswall, on the same
machine as 
exim.  Viruswall passes the scanned message to exim, thus coming from 
localhost.  Is there a way around this, without disabling or moving
Viruswall 
to another machine?  This sounds like the same problem rdzek is having with 
the AV program passing the message from within the network, then becoming 
trusted.



------- You are receiving this mail because: -------
You reported the bug, or are watching the reporter.

Comment 6 Sidney Markowitz 2004-10-11 11:34:00 UTC
This header should be preventing it from being ALL_TRUSTED. Whatever is adding
this header meeds to use a proper format for Received headers.

Received: from img.staghug.com by staghug.com id
 <10006.288622.1814118845@staghug.com> for lancev@interpod.net;
 Mon, 11 Oct 2004 08:15:11 GMT

This doesn't say anything about why the originalo bug reporter is seeing this
header from comment 1 treated as trusted:

Received: from www55.bestproductcarrier.com ([83.69.178.33])
 by mail2.specialized.com (SAVSMTP 3.1.1.32) with SMTP id M2004092316462421631
 for <rdzek@specialized.com>; Thu, 23 Sep 2004 16:46:25 -0700

Does anyone have insight on that?
Comment 7 Justin Mason 2004-10-11 12:06:10 UTC
yeah, I don't know -- I can't repro Ray's bug.  If I paste those into a file and run

    ./spamassassin -D -Lt < tst

I get these debug lines in the output:

debug: metadata: X-Spam-Relays-Trusted:
debug: metadata: X-Spam-Relays-Untrusted: [ ip=10.1.0.22
rdns=mail2.specialized.com helo=mail2.specialized.com by=pop.specialized.com
ident= envfrom= intl=0 id=89EEC3EDC ] [ ip=83.69.178.33
rdns=www55.bestproductcarrier.com helo=www55.bestproductcarrier.com
by=mail2.specialized.com ident= envfrom= intl=0 id=M2004092316462421631 ]

in other words, the two handovers are *not* trusted.   it's possible that inside
specialized.com's network, the first one would be trusted, but that'd leave the
second one as untrusted, so it should work fine.

Ray, do you have trusted_networks or internal_networks set in your local.cf? 
can you try the command above and see what those two lines look like for you?

Sidney and Theo are right for the second mail.

--j.
Comment 8 Ray Dzek 2004-10-11 12:33:50 UTC
I do not have trusted or internal networks defined in my local.cf  
Comment 9 Ray Dzek 2004-10-11 12:40:27 UTC
Here is the debug header output from spamassassin -D -Lt

debug: received-header: parsed as [ ip=10.1.0.22 rdns=mail2.specialized.com helo
=mail2.specialized.com by=pop.specialized.com ident= envfrom= intl=0 id=89EEC3ED
C ]
debug: received-header: parsed as [ ip=83.69.178.33 rdns=www55.bestproductcarrie
r.com helo=www55.bestproductcarrier.com by=mail2.specialized.com ident= envfrom=
 intl=0 id=M2004092316462421631 ]
debug: is DNS available? 0
debug: received-header: 'from' 10.1.0.22 has reserved IP
debug: received-header: cannot use DNS, do not trust any hosts from here on
debug: received-header: relay 10.1.0.22 trusted? yes internal? no
debug: received-header: cannot use DNS, do not trust any hosts from here on
debug: received-header: relay 83.69.178.33 trusted? no internal? no
debug: metadata: X-Spam-Relays-Trusted: [ ip=10.1.0.22 rdns=mail2.specialized.co
m helo=mail2.specialized.com by=pop.specialized.com ident= envfrom= intl=0 id=89
EEC3EDC ]
debug: metadata: X-Spam-Relays-Untrusted: [ ip=83.69.178.33 rdns=www55.bestprodu
ctcarrier.com helo=www55.bestproductcarrier.com by=mail2.specialized.com ident=
envfrom= intl=0 id=M2004092316462421631 ]
Comment 10 Justin Mason 2004-10-11 12:49:39 UTC
that looks fine -- it identifies the correct trusted handover, and the correct
untrusted handover.  did it hit ALL_TRUSTED that time?
Comment 11 Lance Vavricka 2004-10-11 13:42:20 UTC
hmm, maybe some insight on this then..  here's a legit email I sent from my 
yahoo account, below are the headers, received from localhost like the 
previous header but ALL_TRUSTED was not fired.  I'm confused now.. Since my AV 
program is acting as a frontend and passing the email to exim, then it will 
always come from localhost, so then why would some emails fire ALL_TRUSTED and 
other's don't..  I'm not seeing that much of a difference in headers, alteast 
no the received from part.  The email's I get from here for bugzilla, they get 
fired with ALL_TRUSTED.... 

Return-path: <altere987@yahoo.com>
Envelope-to: lancev@interpod.net
Received: from localhost ([127.0.0.1] helo=web51909.mail.yahoo.com)
	by mail.interpod.net with smtp (Exim 4.43)
	id 1CH6p8-0001v6-0M
	for lancev@interpod.net; Mon, 11 Oct 2004 15:31:14 -0500
Message-ID: <20041011203116.59358.qmail@web51909.mail.yahoo.com>
Received: from [66.90.168.76] by web51909.mail.yahoo.com via HTTP; Mon, 11 Oct 
2004 13:31:16 PDT
Date: Mon, 11 Oct 2004 13:31:16 -0700 (PDT)
From: Lance Vavricka <altere987@yahoo.com>
Subject: test from yahoo acct
To: lancev@interpod.net
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.2 (/)
X-Spam-Report: Spam detection software, running on the 
system "mordor.interpod.net", has
	identified this incoming email as possible spam.  The original message
	has been attached to this so you can view it (if it isn't spam) or 
label
	similar future email.  If you have any questions, see
	abuse@interpod.net for details.
	Content preview:  testing headers from yahoo acct. Do you Yahoo!? 
Yahoo!
	Mail Address AutoComplete - You start. We finish.
	http://promotions.yahoo.com/new_mail [...] 
	Content analysis details:   (0.2 points, 5.0 required)
	pts rule name              description
	---- ---------------------- -------------------------------------------
-------
	0.2 FROM_ENDS_IN_NUMS      From: ends in numbers
Comment 12 Sidney Markowitz 2004-10-11 14:36:53 UTC
Lance, I think I see your problem. I thought that in your example in comment #1
the second Received header was added by the virus scanner and was the problem. I
see from your second example that I was wrong about that. The second Received
header is inserted by the sender, so you don't have any control over it and
don't need to. Yahoo happened to put something there with an ip address so
SpamAssassin used it, while in your first example staghug.com did not. But that
is just circumstantial.

The real problem is that the virus scanner is not inserting any Received header,
yet it is acting as an SMTP relay. Mail is received from the sending relay, in
the first case staghug.com and in the second case web51909.mail.yahoo.com, but
the virus scanner does not create a Received heder showing that. It does pass
the name of the server to Exim in the helo, but Exim just sees mail arriving via
SMTP from localhost.

This has to be a configuration problem in your installation of the Symantec AV
server.
Comment 13 Sidney Markowitz 2004-10-11 15:06:28 UTC
Changing target milestone so this doesn't get lost. I don't have time to fix it
right now but the fix is too trivial to put off indefinitely.

If anybody gets around to this soon, consider putting it in 3.0.1. It's minor,
but annoying if you happen to be installing on a system that uses port 9 for the
discard service.

My suggested fix is 1) change the port to 8; 2) add a warning if the rule fails
saying that if port 8 is already in use by a service the test should be changed
to use an unused port.

Comment 14 Sidney Markowitz 2004-10-11 15:07:45 UTC
Ack! I did that in the wrong window. Ignore last comment. Changing milestone
back to where it was.
Comment 15 Dallas Engelken 2004-11-01 11:14:46 UTC
for people reading this bug, you might want to read bug 3406 since ALL_TRUSTED 
is directly releated to trusted_networks.
Comment 16 Justin Mason 2004-11-01 11:35:50 UTC
I'm closing this WORKSFORME.   it's definitely something that needs to be fixed
in the AV scanner; it's simply not recording the external hop *at all*.  this is
*not* a normal situation ;)

either fix the AV scanner, or set ALL_TRUSTED score to 0.   I'd recommend fixing
the AV scanner, because you'll miss a massive amount of useful rules without
that data getting into the headers.  there's a huge amount of data that is used
in spam-detection based around what the last untrusted machine claimed as HELO,
what its IP was, what its rDNS was, etc. etc.