|
The SpamBouncer
|
2/23/03 |
This release contains a large number of housekeeping updates. That includes updates to various autocomplaint recipes for known spammers, additions to the Small Fry and Haven Domains lists, updates and additions to the Pattern Matching recipes, and some minor bug fixes. There is no significant new code or features to the product. Since the last update was over two months ago, however, everyone should update. (I was busy with a product release at work, and didn't have time to work on the SpamBouncer for a couple of months.) A new beta release with some significant new code should follow in about a week. :) | |
---|---|---|
12/13/02 |
This release updates the AdProSolutions/HiSpeedMedia recipe to autocomplain more effectively, the TESMedia recipe to include a new netblock and new domains, and fixes a couple of bugs that affect mostly autocomplaint filters. Even if you updated yesterday, the new recipe will catch some new, prolific TES spew that might have escaped otherwise. | |
12/12/02 |
The current update contains a considerable amount of new stuff. The most important includes:
If you do business with a site whose order confirmations or other administrative email gets caught by the SpamBouncer, please let me know and send me the headers of the emails that get trapped. That will enable me to add those sites to the whitelist. If you run an ecommerce site and have a firm no-spamming policy, feel free to contact me about getting into the whitelist. After I verify that your idea of "no-spamming policy" is the same as mine :), I'll be happy to whitelist your site.
Please feel free to let me know about any mailing lists or list servers that I should add to this whitelist. After I confirm that a list or list server's confirmation process for new subscriptions is appropriate, I'll be happy to whitelist the list or list server. Together with your personal whitelists -- your
NOTE: If you get spam from a server on the HUL or that bears the Habeas SWE warrant mark in the headers, you should report that spam to Habeas by sending email to reports@habeas.com or via their web site. Please send a copy to spamtrap@spambouncer.org as well.
After I'm certain that the code is stable, HUL whitelisting and HIL blacklisting will move to the production version of the SpamBouncer, probably in the next release. I am also working on code for detecting the Habeas SWE warrant mark in email (which is easy) and using that information appropriately when filtering email (which is much harder). Since the Habeas SWE warrant mark does not contain a digital signature, it is trivially forgeable. However, legitimate businesses are unlikely to forge it because the legal consequences of doing so can be severe -- they can be sued and loose lots of money. I'll keep you posted. :)
Please update. I think you will like the new stuff. :) | |
11/22/02 |
Couple of things....
In addition, I cleaned up the code yet some more in preparation for adding several new features with the next major release, and (as before) did a day's worth of tuning, updates to the Haven Domain and Small Fry lists. Please update if you run in COMPLAIN mode. If you do not, you'll still catch more spam with this. :) | |
11/21/02 |
Wayne Mansfield of T3 Direct has reappeared. For those who aren't aware of him, he's an extremely abusive spammer who sued an Australian anti-spammer, allegedly for reporting his spam to SPEWS, a widely-used blacklist. Mansfield lost his lawsuit, and recently dropped his appeal. He also started spamming again. :/ So I updated that recipe, and wanted to post it ASAP. I also did a day's worth of tuning, updates to the Haven Domain and Small Fry lists, etc. If you didn't update yesterday, you're getting a slightly better update. If you did, update again if you want to autocomplain about Mansfield's spam. Unless you run in complain mode, this probably won't make much difference because his spam is caught by a number of pattern matching filters, as well. | |
11/20/02 |
This is primarily a housekeeping update. I am posting it instead of waiting for the significant changes I promised you in the last release for two reasons.
In addition to these changes, I've added several new autocomplaining recipes over the past week, and also made the usual additions to the Small Fry, Haven Domains, and Spam Phone filters. Please update. | |
11/12/02 |
A user forwarded a couple of spams that were sent via an email list he/she is on, without explaining that the email list itself was legitimate, so I added it to the SpamBouncer. :/ All email addresses associated with that email list were just removed from various recipes. <wry grin> Please do NOT forward spam that arrives in your inbox via an email list to which you are subscribed without adding an explanation at the top, so that I won't mistake a private email list for a spammer. I also made several additions to the Small Fry and Haven Domains filters. Please update. | |
11/11/02 |
This update contains autocomplaining recipes for several new spammers, updates to recipes for known spammers, two new pattern matching filters, a bunch of minor bug fixes, and lots of new small fry and haven domains. I will be adding some significant new code in the next release of the beta version of the SpamBouncer, and wanted to get the production version in good shape before I did so.
The new filters will ensure that spam sent by these rogue spammers gets trapped more efficiently and, for those who run in COMPLAIN mode, that their spam gets handed back to the spammers and to their upstream providers. :)
| |
10/18/02 |
The current update is primarily a housekeeping update. In addition, I've had a number of problem reports about a particular issue for which there is a fix. The scoop follows. :)
Fortunately, you can fix this problem easily and permanently in one of two ways. If you have only one local domain, you can manually set the NOTE: Setting any internal SpamBouncer variable in your
Please update ASAP. | |
10/05/02 |
This continues the housekeeping update released a few days ago. The most important changes are:
Please update. :) | |
10/01/02 |
This is a fairly extensive, but routine, housekeeping update. The following things have been done:
Please update ASAP. :) | |
8/16/02 |
This is another bug-fix update only. The following problems have been fixed:
I'll be posting a regular update, with additional Small Fry and Haven Domains, in a few days. :) | |
8/12/02 |
This is a bug-fix update only. The ALWAYSBLOCK code had a bug that a sharp-eyed user spotted. Today's update fixes that bug. If you already downloaded the 8/11/02 update and do not use the new ALWAYSBLOCK feature, you do not need to update. In addition, the SpamBouncer web page is undergoing a long-needed edit to make the instructions a bit clearer. The edit is about half done as of this posting. :) | |
8/11/02 |
I've made a number of changes to the SpamBouncer this update, some of which appear only in the beta release for this version. I'll review changes to the production release first. These also appear in the beta release. After reviewing those changes, I'll review the changes to the beta release. Even if you use the production release, you may want to review the changes to the beta release, because they'll appear in the production release as soon as I'm confident that they are working properly. :) Production Version updates
As a consequence, if you ever look at the headers of spam you receive, you will notice fewer X-SBRule: headers. This isn't because the Pattern Matching filters or other block filters quit working; they just aren't run when email is already recognized as spam. If you want to see headers as you always have and don't care if the SpamBouncer eats lots of CPU cycles, you can force it to run all filters on all email by setting
WARNING! ALWAYSBLOCK IS DANGEROUS IF MISUSED! If you put a blank line in your ALWAYSBLOCK file, it will match on every incoming email it sees. If you put a partial email address or entire domain in your ALWAYSBLOCK file, it may match on email you did not intend to block. The same code is used as with the NOBOUNCE file, and the same precautions apply, except that the consequences of a mistake are greater. Use ALWAYSBLOCK at your own risk -- and be careful! To implement this capability, you must create a text file of the addresses you want to block, and then in your
If you do not explicitly set the ALWAYSBLOCK variable to point to a file, the ALWAYSBLOCK functionality will remain turned off, as a safety measure.
I did this to make it possible for users who have good anti-virus programs on their mail servers to disable the SpamBouncer's less comprehensive filters. I recommend that you turn off virus checking, however, only if you have good virus checking capability on your mailserver itself, not just your local workstation. The SpamBouncer's virus checking is not a substitute for an anti-virus program, but it can get rid of a lot of virus-laden email before you download it. If you use a local antivirus program instead of a server-based program, the SpamBouncer's virus filters will save you time downloading your email, and also CPU cycles on your workstation or PC.
Beta Version updates
To implement this capability, you should create a text file that contains a list of your local hosts and domains, one host or domain per line. (This file should be in the same format as your NOBOUNCE file.) Include all hosts and domains that receive email for any email address that ultimately ends up in the mailbox where you are using the SpamBouncer. Then, set the If you run the beta version of the SpamBouncer, please send in bug reports for this code, and let me know how it is working for you.
You can find more information about the blocklists on
This is beta code; please report any misfires to the spamtrap so that I can fix it.
These filters check for the following types of embedded and attached data in email:
This is beta code; please report any misfires to the spamtrap so that I can fix it. |
The SpamBouncer is a set of procmail recipes, or instructions, which search the headers and text of your incoming email to see if it meets one or more of the following conditions:
The SpamBouncer sorts suspected spam into three categories -- email sent by a virus, email from known spam sources which is definitely spam, and email which is probably spam, but might also be legitimate. It then tags each email with appropriate headers for the spam classification, and responds according to the parameters you have set.
Depending on how you set it up, it will:
If you get mail from friends who have accounts at a site listed in the SpamBouncer, you can put their names and email addresses in a text file and set the NOBOUNCE variable to point to it. If you want to receive mail from a site I have listed as a spam site, you can add the entire site name to the NOBOUNCE file. The SpamBouncer will check the NOBOUNCE file before filtering your email and will skip any email from a person or site listed in the NOBOUNCE file.
Please note that you can put entire domain names, not just email addresses, in NOBOUNCE. For example, if you want to accept all email from concentric.net
without checking for spam, just put concentric.net
in your NOBOUNCE file, with no username@
section. This will cause the SpamBouncer to skip all email from anyone at Concentric. (I do not recommend doing this except for small domains which you =KNOW= will not be sources of spam, though.)
The SpamBouncer itself must run on a Unix server which has the Procmail mail filtering program installed, so only users who have access to a Unix shell account with Procmail installed can use it. This means that AOL users, Earthlink users, Mindspring users, Netcom Netcruiser/Netcomplete users, Compuserve users, Prodigy users, and others who do not have a Unix shell account as part of their service will have to find some other means of filtering spam. Sorry!
It is possible, however, for people who use Eudora, Pegasus Mail, and other POP clients to use the SpamBouncer on their Unix shell accounts to filter their email, and then use their favorite POP mail client to retrieve their filtered mail from the server. If their POP client programs can filter mail by headers, they can filter and delete known spam and probable spam directly into appropriate folders via the SpamBouncer's headers.
This means that anyone running any kind of computer, operating system, and software can use the SpamBouncer, provided they have and use a Unix shell account, and (if they want to use a POP mail program) have software capable of filtering their mail based on user-configurable headers.
If you are totally confused by now, PLEASE find a friend who understands what this means before you try to install the SpamBouncer. While I have made this as user-friendly as I could, using the SpamBouncer requires a certain level of knowledge about computers and the internet. It is not for computer or internet novices.
Because someone who evidently likes the SpamBouncer listed it for me in Yahoo and other search engines <wry grin>, I need to include the following disclaimers and warnings.
First, this is free software. No warranty is provided or implied -- users use the SpamBouncer at their own risk.
I wrote the SpamBouncer originally to filter my own mail, when spam started drowning out the real mail. I originally posted these filters to my web site so that users at my old ISP, Best Internet (long since bought out by Verio), and a few other experienced users could help me test them. I recommend that Procmail neophytes get help from an experienced Procmail user on their system to install the SpamBouncer, and run it in default "Silent Mode" until they are more confident of their skills.
The SpamBouncer is being developed on a Pentium-based server running OpenBSD, and running Procmail 3.14.
In addition to the Pentium-based system where I am developing the SpamBouncer currently, I have developed and tested the earlier versions of it on Linux, FreeBDS, SGI systems running Irix 5.3 and 6.2, SunOS 4.1.3, and Solaris 5.2. I know of no problems running on these systems. A number of users have also run the progrem under various flavors of SunOS, Solaris, HPUX, and other versions of Unix with no trouble.
So please be careful, and keep a close eye on your account for a few days after installing to be sure it works properly.
To use these filters, you will need to have procmail installed on your system, and have set it up for your account. This does not mean you must read mail on your unix account -- if you have a shell account, these filters can be configured to filter mail and then deliver it to your POP mail box. If you don't know what kind of account you have, you probably shouldn't be using these filters until you learn something about Unix and shell accounts.
Since the way Procmail should be installed is different on different systems, if you do not already have Procmail installed, you will need to ask your system administrator or people on your local internet service provider for help. Those who have never used Procmail and want to get started with a simple Procmail setup can jump to Getting Started With Procmail, a tutorial with clear instructions about what information you will need to get from your system administrator to set up Procmail properly on your account, and a basic .procmailrc
configuration file which should work well on most systems.
If you are an experienced Procmail user, please make sure that your .procmailrc
file is configured to filter out your mailing lists before filtering for spam. The SpamBouncer tries to identify list mail and skip it, but some mailing lists do not use standard list "Precedence:" headers or headers recognisable by Procmail as coming from a daemon or list program. So please be sure you filter out your lists first, especially if you are running with SPAMREPLY set to BOUNCE or COMPLAIN!
In any event, you should always run in SILENT mode for a few days, until you are sure you have your mailing lists filtered out properly and that the filter is working properly on your account.
If you did not use procmail.rc
from Getting Started With Procmail, here's a recipe to filter out list mail and other mail from automatic mailer programs, or mailer daemons, as they are usually called on Unix machines. Put it in your .procmailrc file before the INCLUDERC statement that calls the SpamBouncer.
# Filter out Mailing List Mail :0: * ^TO(listmom-talk@skylist.com|\ orthodoxy@lists.best.com|\ procmail@Informatik.RWTH-Aachen.DE) $BULKFOLDER
You should substitute all mailing list addresses for mailing lists you receive for the list I gave -- you and I don't read mail from the same lists, at least as far as I know! :)
After you have installed Procmail for your system, you can install the SpamBouncer. You will need to download the SpamBouncer program files to your Unix account first. You can do this one of two ways -- by downloading them from the links below to your personal computer, or by ftp'ing them. The advantage to ftp is that it ensures that the file format will be right. Often, when you retrieve a text file using a WWW browser and then save it to your hard disk, the browser reformats the file. This type of reformatting can break Procmail configuration files like the SpamBouncer.
Lynx users should note that lynx reformats text files when downloading them via a normal link access command, which will break the SpamBouncer and most other Procmail scripts. If you're a lynx user, please remember to use the "D" command to download the SpamBouncer files instead of just accessing the link, or (even better) ftp the files from the links in the FTP column instead of trying to retrieve them from the http:// links in the WWW/HTTP column.
Via FTP | Via WWW/HTTP | |
---|---|---|
To ftp the SpamBouncer, you must do this:
|
|
To download the SpamBouncer via your WWW browser, choose one of the links below and, when your web browser prompts you, save the file to your hard disk. The ZIP archives contain files intended for your PC, and the tar.Z archives contain files intended for your Unix server.
Here are FTP download URLs for the convenience of Lynx users or users of other browsers who are having trouble with file corruption when downloading the SpamBouncer from the standard HTTP urls above. Please use the links below only if the other links don't work for you.
|
Now, if you saved the SpamBouncer files on your local PC, you will need to ftp or upload them to your unix shell account. They should be put in their own directory.
To unarchive the ZIP format archive, type "unzip spambnc.zip
" and press <Enter>. (Your Unix machine may respond with an "unzip: command not found" error message. If it does, you may not have the Unix program unzip,
and should retrieve the tar.Z
archive.) To unarchive the tar.Z
file, type "uncompress spambnc.tar.Z
", press <Enter>, and then type "tar -xvf spambnc.tar
" and press <Enter>
to extract the individual files.
The index file of the SpamBouncer, which may be named sb.rc
, sb-old.rc
or sb-new.rc
depending on which version you downloaded, contains the basic script that calls all other files and scripts that comprise the SpamBouncer. The current production version of the SpamBouncer is the one containing sb.rc
. The version containing sb-old.rc
is the previous production release of the SpamBouncer. The version containing sb-new.rc
is the current somewhat stable beta version.
Inexperienced users or users who don't want problems should not use the beta version, and all beta version users need to follow any warnings/instructions listed among the comments at the top of sb-new.rc
and in the What's New section.
All other files ending in .rc
are subsidiary parts of the SpamBouncer that are called by sb.rc
or sb-new.rc
.
The freemail
file contains a sample text file which you may install and then set your FREEMAIL variable to point to. You do not need to install this file unless you want to customize the list of free email sites -- the SpamBouncer will use its own internal list if it can't find the text file.
The "legitlists" file contains a text file with the names of legitimate email lists (the opt-in variety), which you may getting trapped by the SpamBouncer. Just put each mailing list address on a separate line, just as you would with the NOBOUNCE file.
The other three files contain standardized autoresponder messages for the program. You may customize these to your taste. I do recommend that you leave the references to the SpamBouncer bypass email address in any edited version of
the file spam
, though, so that people know how to contact me if their mail is getting bounced because of a problem with the filter itself, or how it is installed. That way, I can contact you (hopefully), and prevent further damage.
If you customize the autoresponder messages, you probably will want to keep them reasonably polite. There's no point flaming some poor innocent system administrator at a large ISP just because you're p*ssed at a spamming slimeball. :)
Where you should store the SpamBouncer program files depends on how you are installing the SpamBouncer.
sb
off of your HOME directory, and putting the SpamBouncer program files there.sb
or spambouncer
off of /usr/local/bin
or another directory where you store local programs. If you do this, users on your system can then create symbolic links to the shared SpamBouncer directory in their home directories. This allows you to keep the SpamBouncer up to date.If a particular user wants to modify the filter, he can simply create a private directory, copy the necessary files to it, and make whatever changes he wants. If he does the last, of course, he is responsible for updating his copy of the filter manually.
In either case, as you proceed through these instructions and configure the SpamBouncer, you should put the configuration files that you create and will modify somewhere outside of the SpamBouncer program directory. In particular, your .procmailrc
file, LEGITLISTS file, LOCALHOSTFILE file, MYEMAIL file, and NOBOUNCE file should all be located outside of the SpamBouncer program directory. That way, when you update the SpamBouncer, you won't overwrite your configuration.
The SpamBouncer is a highly configurable program with an often-bewildering number of options. If you are an individual user installing the SpamBouncer, however, you can safely accept the default configuration for many of those options when first installing the program. The default configuration is designed with safety first in mind; even if it catches legitimate email, it will not delete it or autocomplain about it.
Some configuration is required before you start, though, or the SpamBouncer will simply do nothing and pass your email to you unfiltered. In addition, to get the best use out of the SpamBouncer, you will need to understand more about configuring it so that you can enable options that will catch a lot more spam.
In particular, if you are a system administrator who will install and configure the SpamBouncer for unsophisticated users, or users who will have only POP access, you must make sure you understand how the SpamBouncer works before you implement it. The SpamBouncer was designed originally by a Unix geek for Unix geeks to use on Unix shell accounts. :) I have added a number of featurs to make it possible to use the SpamBouncer on a system-wide basis and have users that successfully do this, but I am not a system administrator of a mail server myself. I cannot test various configurations of this type myself as a professional software company would. So please be careful, and give me lots of feedback!
There are a few variables that every user must set when first installing the program, and a few more that you will want to set to make the SpamBouncer work in the most efficient manner. All users must first set the following variables in their .procmailrc
files:
/var/spool/mail/yourlogin
or /var/mail/yourlogin
. For example, if your incoming email is stored in /var/mail/yourlogin
, put the statement DEFAULT=/var/mail/yourlogin
in your .procmailrc
file. (Substitute your login for yourlogin
.)formail
program is stored on your system, and set the FORMAIL variable to point to it. On many Unix systems, formail
will be located in /usr/bin/formail
or /usr/local/bin/formail
. For example, if your system stores formail
in /usr/bin/formail
, put the statement FORMAIL=/usr/bin/formail
in your .procmailrc
file.${HOME}/sb
, but you can install them wherever you wish. For example, if you install the SpamBouncer program in ${HOME}/sb
, put the statement SBDIR=${HOME}/sb
in your .procmailrc
file.After you have set the variables above, you should next create four text files: .legitlists
, .localhostfile
, .myemail
, and .nobounce
. You can put them in your home directory, where the SpamBouncer looks for them by default, or in any other directory. If you put them in a directory other than your HOME directory, you must set the LEGITLISTS, LOCALHOSTFILE, MYEMAIL, and NOBOUNCE variables to point to the proper location and filename. For example, if you name your NOBOUNCE file my-friends
and put it in ${HOME}/configfiles
, put the statement NOBOUNCE=${HOME}/configfiles/my-friends
in your .procmailrc
file.
Each of these text files must be in Unix text format. That means that you must use a text editor to edit them; DO NOT USE a word processing program like Microsoft Word or Microsoft Wordpad. (Windows users should use Windows Notepad, if they do not have another text editor they prefer.) If you edit these files on a Windows- or Macintosh-based computer, you must upload them using ftp in ASCII mode or some other means that will create Unix, not DOS, text files.
In each file, you must include email addresses or domain names, one on each line of the file. Ensure that there are no blank lines in each of these files, and that the last email address or domain name is followed by a carriage return. (That may create what looks like a blank line in some text editors, but it isn't actually a blank line.)
.legitlists
file is shown below:junkfax-l@trashbusters.org
html-wizards-l@earlham.edu
outback@yahoogroups.com
.localhostfile
file is shown below:hrweb.org
spambouncer.org
.myemail
file is shown below:abuse@hrweb.org
abuse@spambouncer.org
ariel@hrweb.org
ariel@spambouncer.org
postmaster@hrweb.org
postmaster@spambouncer.org
webmaster@hrweb.org
webmaster@spambouncer.org
.nobounce
file is shown below:friend@home.com
anotherfriend@home.com
boss@work.com
coworker@work.com
mom@juno.com
brother@yahoo.com
kid@highschool.kids.us
You can also add partial strings, such as entire domains or subdomains, or partial email addresses, to your NOBOUNCE file. For example, if you know that all email sent from the subdomain engineering.work.com
is from one of your coworkers and nobody else, you could add that string to your NOBOUNCE file just as you would add an email address. If you have a friend who habitually changes ISPs or uses email accounts at multiple sites, but whose email address always starts with skywalker@
, you could add that string to your NOBOUNCE file just as you would add an email address.
NOTE:Be careful about adding partial strings or entire domains to your NOBOUNCE file. If the string you add is a common string that might be found in email other than the email you are expecting, this can cause the SpamBouncer to think that a spam is okay and not filter it.
For example, if you have several friends who have email addresses at aol.com
, and you add aol.com
to your NOBOUNCE file, the SpamBouncer will pass anything that appears to be from anyone at aol.com
without filtering it. Lots of spammers forge email address at aol.com
in the From: lines of their spam, so this means you would get a lot of spam in your inbox that the SpamBouncer would otherwise have caught.
It is safest to add only complete email addresses to your NOBOUNCE file unless you are an experienced user and understand the implications of a partial match.
After you have created these files, you should choose one of the following three sections and do what is indicated in that section. The sections are Risk Averse or New Users, Ready to Fight Back, and I HATE SPAM AND WANT IT GONE NOW!. I've tried to make it easy to tell which section you want. :)
You can also check out the Tracking Spam or SpamCop web sites to learn how to complain about spam manually. Manual complaints take time, but are always the best way to get a spammer shut down if you do it right.
Users who do not want to risk false positives should use this configuration. This is also the configuration you should start with, regardless of what you do after you become comfortable with Unix and the SpamBouncer.
/dev/null
to delete all viruses. You don't want to take chances with a virus, and the false positive rate on the virus filters is near zero.Users who are willing to accept a low false positive rate, and who want to use the SpamBouncer's autocomplaining features, should set the following variables:
sendmail
program. On many systems, this is located in /usr/bin/sendmail
, /usr/sbin/sendmail
, or even /bin/sendmail
. If you do not set this variable correctly, the SpamBouncer will not be able to send bounces, complaints, or notify messages./dev/null
to delete all viruses. You don't want to take chances with a virus, and the false positive rate on the virus filters is near zero.In addition, look through the list of blocklists the SpamBouncer supports and enable those that look interesting. :)
If you feel this way, then you and I obviously have some common ancestors or early environmental influences in common. <grin> Set the following variables if you want to autocomplain aggressively, bounce spam back, and notify users whose mail is blocked by the SpamBouncer, and are willing to check the BLOCKFOLDER frequently for false positives:
sendmail
program. On many systems, this is located in /usr/bin/sendmail
, /usr/sbin/sendmail
, or even /bin/sendmail
. If you do not set this variable correctly, the SpamBouncer will not be able to send bounces, complaints, or notify messages./dev/null
if you don't want to be bothered with it further./dev/null
to delete all viruses, or to a folder if you want to look at the virus emails on your Unix system (which is probably immune to them) and determine who might be infected so that you can notify them or their ISP and get the problem fixed.In addition, look through the list of blacklists the SpamBouncer supports and enable those that look interesting. Many of them are somewhat redundant, but I find that one often catches what the other does not. For example, the Five-Ten-SG blocklists are much better at catching spam from Asian spammers (such as Chinese spammers) than the other blocklists are, but the OsiruSoft lists are better at catching European spam.
I prefer to use a lot of blacklists, and when one catches legitimate email, add the sender to my NOBOUNCE file.
Users who get their mail using Eudora, Microsoft Outlook, Netscape Communicator, Outlook Express, Pegasus Mail, or another POP mail client which can filter mail by headers will need to set up their filters to look for the following headings:
After setting the variables in your .procmailrc
, add this line to your .procmailrc
file at the point where you want to filter your mail for spam:
INCLUDERC=${SBDIR}/sb.rc
This line should appear after recipes for mail you don't want to filter for spam and before recipes for mail you do want to filter for spam. Users of the sample procmail.rc
that comes with the SpamBouncer will have the correct lines in the correct location already, and will just need to uncomment whichever one they want to use.
This section contains a reference to the blacklists supported by the SpamBouncer, and all the SpamBouncer variables. If you need to know what a particular feature does, or want to look "under the hood" of the SpamBouncer, this section will provide it.
Anti-spam whitelists contain the IP addresses (and, in some cases, the domain names) of the following types of servers:
Accepting email sent from whitelisted servers without further filtering can be a highly effective way to reduce false positives resulting from aggressive blacklists and pattern matching filters. This also reduces load on your mail server and speeds delivery of email.
In addition to the SpamBouncer's internal whitelists, the SpamBouncer supports the Habeas User's List (HUL), a DNS-based whitelist of the IPs of SMTP servers that are bound by the Habeas Sender Warranted Email (SWE) program and associated contract.
To enable support for the HUL, you must first obtain a free license from Habeas. This license requires you to agree to certain terms of use, the most important that you will not use the HUL to blacklist. The SpamBouncer's code does not allow that use of the HUL -- your use of the SpamBouncer will not violate the Habeas license. When you have set this up and Habeas has confirmed that you have access to the HUL server, set the HABEASVERIFIED
variable to yes
in your .procmailrc
. (Habeas and I are working together, so let me know if you run into any problems getting the license.) After you do this, the SpamBouncer will check the HUL and will whitelist email from any server on HUL.
NOTE: If you get spam from a server on the HUL or that bears the Habeas SWE warrant mark in the headers, you should report that spam to Habeas by sending email to reports@habeas.com or via their web site. Please send a copy to spamtrap@spambouncer.org as well.
HABEASINFRINGERS
variable to yes
in your .procmailrc
. After you do this, the SpamBouncer will check the HIL and will block email from any server on the HIL. (You do not need to sign a license with Habeas to use the HIL.)Anti-spam blacklists contain the IP addresses (and, in some cases, the domain names) of the following types of servers:
Blocking email sent from blacklisted servers can be a highly effective way to stop spam from reaching your mailbox. In the last year, as the volume of spam on the Internet has surged, the number of blacklists has multiplied, allowing users to choose blacklists whose policies closely match their needs. Blacklists are frequently updated, so a filter that uses them is effectively updated as often as the blacklist is, considerably more frequently than the filter itself is usually updated.
The following is a list of blacklists supported by the SpamBouncer, sorted by category. I explain what type of spam problem each blacklist category addresses, and then list the available blacklists in that category. The name of each blacklist is hyperlinked to the blacklist maintainer's web site, which you can consult for more information about blacklist policies.
Spam Sources. IPs and sites listed as spam sources are persistent sources of spam that have continued to spam for a considerable length of time and despite many efforts to stop them. Many have gone through multiple ISPs, being repeatedly disconnected for breaking their provider's terms of service by spamming. Included in these lists are the SMTP servers used to send spam and the web servers that host web sites advertised by spam. Most of these lists are maintained manually.
Two of these blacklists are enabled by default in the SpamBouncer because they block a considerable amount of spam and have low rates of false positives. Because the most carefully maintained blacklist will make occasional errors, though, the SpamBouncer treats email from these servers as suspicious rather than as outright spam, unless that email also meets the SpamBouncer's internal criteria for spam.
SPAMHAUSORGCHECK
variable to no
, but I recommend leaving it enabled.spamhaus.org
blacklist. Enable this blacklist if your site is having trouble contacting the main spamhaus.org blacklist by setting the OSHAVENCHECK
variable to yes
.OSSPAMCHECK
variable to no
, but I recommend leaving it enabled.WIREHUBSPAMSOURCE
variable to yes
in your .procmailrc.SPAMCOPCHECK
variable to yes
.RBLCHECK
variable to yes
.(NOTE: If you enable this blacklist without first subscribing to it, all queries against it will result in a negative response. No spam will be detected.)FTSGSRCCHECK
variable to yes
.Open Relays. Open relays are SMTP servers that accept email from any user on the Internet and deliver it to any other user on the Internet. Properly configured SMTP servers require that either the sender of the email or the recipient be a local user. Spammers LOVE open relays because open relays allow them to avoid spam blocks and deliver more spam, and because some open relays also hide the actual origin of the spam. (The latter are called anonymizing open relays.)
Blocking open relays is inherently aggressive and will block legitimate email along with spam. It is also an extremely effective way to get spam out of your mailbox, however. While no open relay blacklist is enabled by default in the SpamBouncer, I recommend strongly that you enable one or more of them.
visi.com
. The RSL is the most conservative open relay blacklist supported by the SpamBouncer; it removes all entries after 90 days and will remove any entry on request. This list will block relatively less non-spam email than other blacklists of open relays, but may also not block some spam that others would have. Enable this blacklist by setting the RSLCHECK
variable to yes
.RSSCHECK
variable to yes
.(NOTE: If you enable this blacklist without first subscribing to it, all queries against it will result in a negative response. No spam will be detected.)ORDBCHECK
variable to yes
.OSORCHECK
variable to yes
.FTSGRSSCHECK
variable to yes
.formmail.pl
scripts. Entries to this list are from trusted users only. The DSBL is a "Son of ORBZ" blacklist, and as such is somewhat aggressive. Enable this blacklist by setting the DSBLCHECK
variable to yes
.DORKSLCHECK
variable to yes
.Multi-Stage Open Relays/"Smart Hosts". Multi-stage open relays are SMTP servers that are themselves secure; they accept email only from their own users or for their own users. Among their users, however, are SMTP servers that are open relays. This allows a spammer to use a customer site of a multi-stage open relay to send email via that site's SMTP server, increasing the amount of spam he can deliver and further obscuring the origin of his spam.
Blocking email from a multi-stage open relay is inherently risky. Most multi-stage open relays are SMTP servers for large ISPs or companies, and most email they send is legitimate. They have been abused to send large spam runs, however. Blocking email from these relays should reduce the amount of spam you get considerably.
OSSHRCHECK
variable to yes
.FTSGMULTICHECK
variable to yes
.DSBLMULTICHECK
variable to yes
.Dynamic IP Ranges. Blacklists of dynamic IP ranges include IP addresses assigned dynamically to dial-up users, and sometimes IP addresses assigned to DSL users and cable modem users. Most of these users are not spammers. Users with this type of connection, however, will rarely (if ever) send email directly from their computer to a recipient's SMTP server. Instead, they send outgoing email via their ISPs SMTP servers.
Spammers, on the other hand, frequently use software that sends email directly from their computer to the recipient's SMTP server, bypassing their own ISP's SMTP server. This allows them to evade security and anti-spamming measures the ISP might have taken. By rejecting email sent directly from a dial-up IP address, you are unlikely to reject legitimate email, but will catch a lot of spam.
The OsiruSoft Dial-Up Spam Sources List is enabled by default. I highly recommend that you use it or another list below; these lists catch a lot of spam.
no
, but I recommend that you leave it enabled.DULCHECK
variable to yes
.(NOTE: If you enable this blacklist without first subscribing to it, all queries against it will result in a negative response. No spam will be detected.)VARIABLE
variable to yes
.WIREHUBDIALUP
variable to yes
in your .procmailrc.Insecure Web Forms. These blacklists list the IP addresses of web servers that have insecure web forms or scripts that allow any user to send email to any other user, such as old versions of formmail.pl
. Email from such web servers is likely to be spam. While none of these blacklists is enabled by default, I recommend enabling one or more of them.
formmail.pl
, that are abused by spammers to send spam. Enable this blacklist by setting the FTSGWEBFORMCHECK
variable to yes
.MONKEYFORMMAILCHECK
variable to yes
.Open Proxies. An open proxy is a proxy server that accepts anonymous connections from anyone on the Internet. Open proxys are abused by spammers to hide the origin of outgoing spam. None of the open proxy blacklists below is enabled by default, but I recommend that you enable one or more of them.
OSOPSCHECK
variable to yes
.MONKEYPROXYCHECK
variable to yes
.Other Spam Support. The blacklists below contain the IP addresses of sites that host bulk email servers that don't properly confirm subscriptions, and that have other spam-related problems.
OSOOLCHECK
variable to yes
.FTSGOPTOUTCHECK
variable to yes
.FTSGIGNORECHECK
variable to yes
.FTSGOTHERCHECK
variable to yes
.RFC-Ignorant.org. The rfc-ignorant.org
blacklists are unique -- they target computer systems and services that do not properly implement the RFCs (the "building blocks" of the Internet), rather than those that send spam. Systems that do not implement the RFCs properly often are misconfigured in other ways and therefore easily abused by spammers. In addition, many of these systems lack any publicly available, valid email addresses that you can use to contact the system administrator when there's a problem.
There are five blacklists on rfc-ignorant.org
.
RFCABUSECHECK
variable to yes
.RFCDSNCHECK
variable to yes
.RFCIPWHOISCHECK
variable to yes
.RFCPOSTMASTERCHECK
variable to yes
.RFCWHOISCHECK
variable to yes
.All-In-One Blacklists. The following list is the Swiss Army knives of blacklists -- it contain multiple types of listings. SPEWS is not enabled by default in the SpamBouncer; it is extremely aggressive and, unless you configure your system carefully, you are likely to block legitimate email by using it. I feel that most users will do better using a judicious selection of the other, more narrowly focused blacklists. I personally use SPEWS, however, in addition to other Spam Sources lists, because it often lists a spammer who moved to a new ISP before the other lists do.
SPEWSCHECK
variable to yes
.This section contains a quick list of all variables supported by the SpamBouncer, with each with its default setting. A complete list of each variable, a description of what it does, and all available settings, can be found in the following section.
DEFAULT={NO DEFAULT} FORMAIL={NO DEFAULT} SBDIR={NO DEFAULT} ADMINFOLDER=${DEFAULT} ALTFROM=${LOGNAME}@${HOST} ALWAYSBLOCK=NONE ARABIC=no BASE64BLOCK=no BLOCKFOLDER=${DEFAULT} BLOCKREPLY=SILENT BULKFOLDER=${DEFAULT} BYPASSWD=syzygy CHINESE=no CYRILLIC=no DATE=date DEBUG=no DOMAIN=`domainname` DORKSLCHECK=no DSBLCHECK=no DSBLMULTICHECK=no DULCHECK=no ECHO=echo EXECHECKING=yes EXEDOCCHECKING=yes FILTER=no FREEMAIL=INTERNAL FREEWEB=no FTSGDIALCHECK=no FTSGIGNORECHECK=no FTSGMULTICHECK=no FTSGOPTOUTCHECK=no FTSGOTHERCHECK=no FTSGRSSCHECK=no FTSGSRCCHECK=no FTSGWEBFORMCHECK=no GARBLEDCHARSET=yes GLOBALNOBOUNCE=NONE GREEK=no GREP=fgrep HABEASINFRINGERS=no HABEASVERIFIED=no HEBREW=no HTMLBLOCK=no JAPANESE=no KOREAN=no LANGFILTER=yes LEAN=yes LEGITLISTS=NONE LOCALHOSTFILE=${HOME}/.localhostfile MONKEYFORMMAILCHECK=no MONKEYPROXYCHECK=no MYEMAIL=${HOME}/.myemail NOBOUNCE=${HOME}/.nobounce NOLOOP=${ALTFROM} NSLOOKUP=nslookup NUKEBOUNCES=no ORBLCHECK=no ORDBCHECK=no OSDIALCHECK=no OSHAVENCHECK=no OSOOLCHECK=no OSOPSCHECK=no OSORCHECK=no OSSHRCHECK=no OSSPAMCHECK=no PATTERNMATCHING=SILENT RBLCHECK=yes RFCABUSECHECK=yes RFCDSNCHECK=yes RFCIPWHOISCHECK=yes RFCPOSTMASTERCHECK=yes RFCWHOISCHECK=yes RM=rm RSLCHECK=no RSSCHECK=no RUSSIAN=no SBDEBUG=no SBTEMP=/tmp SBTRAP=NONE SED=sed SENDMAIL=/usr/sbin/sendmail SPAMCOPCHECK=no SPAMFOLDER=${DEFAULT} SPAMHAUSORGCHECK=yes SPAMREPLY=SILENT SPEWSCHECK=no TEST=test THISISP=${HOST} TURKISH=no VIRUSCHECKING=yes VIRUSFOLDER=${SPAMFOLDER} WIREHUBDIALUP=no WIREHUBSPAMSOURCE=no
The variables are shown with the default values which the SpamBouncer will assign if they are not already set in your .procmailrc
file. These defaults will prevent problems, but also will cause the SpamBouncer not to do very much. So you want to set the correct variables for your system and account.
This section contains a description of each configuration variable in the SpamBouncer, what it does, and what the valid values for it are. Many of these variables have default settings that will work for the vast majority of users; you should not need to set most of them in your .procmailrc
file. If a SpamBouncer feature is not working properly, though, setting the correct variable may fix the problem.
Please note that those variables in red have no defaults and MUST BE SET or the SpamBouncer will simply pass all your mail on to you unfiltered!
ALWAYSBLOCK
file, a text file of email addresses and domains whose email you want to place in your BLOCKFOLDER without further filtering and without notifying the sender that his email was blocked./dev/null
. (I highly recommend against doing that.) Use ALWAYSBLOCK at your own risk -- and be careful!.alwaysblock
and keeping it in your home directory. If you do this, put the statement ALWAYSBLOCK=${HOME}/.alwaysblock
in your .procmailrc
file.spammer@spamsite.com jerk@roguesite.net
ARABIC=yes
if you receive email in Arabic. Otherwise, the SpamBouncer will assume that any email in Arabic is probably spam and put it in the BLOCKFOLDER.no
by default.BASE64BLOCK=yes
only if you do not receive any legitimate email whatsoever that users Base64 encoding.no
by default.block.incoming
, or leave it set to ${DEFAULT} if you read email via a POP3 client. Users of POP3 clients can set up their local filters to put BLOCKFOLDER email into an appropriate folder in their email program so that it doesn't clutter up their inbox..procmailrc
file.${DEFAULT}
by default.SILENT
, which simply files the mail in the BLOCKFOLDER, and NOTIFY
, which sends a notice and copy of the email back to the sender with instructions on
how to bypass the SpamBouncer if the email is not spam. Very few spammers will resend their email after receiving such a notice. (Most don't even look at bounces or email sent back to them.)SILENT
by default.${DEFAULT}
by default.zeugma
by default.CHINESE=yes
if you receive email in Chinese. Otherwise, the SpamBouncer will assume that any email in Chinese is probably spam and put it in the BLOCKFOLDER.no
by default.CYRILLIC=yes
if you receive email in a language that uses a Cyrillic alphabet. Otherwise, the SpamBouncer will assume that any email in a Cyrillic character set is probably spam and put it in the BLOCKFOLDER.no
by default.date
program. The date
program is usually in a directory that is on your PATH. (The PATH variable contains a list of directories that your Unix shell searches when you tell it to run an executable program and do not provide a full path with the program name.)date
program, and that should fix the problem. If the SpamBouncer is working properly, there is no need to set this variable.date
by default.SBDEBUG
variable instead to run the SpamBouncer in debugging mode..procmailrc
file, the SpamBouncer attempts to set it automatically by calling the domainname
program that exists on many, but not all, Unix systems. Since the canonical domain for a server may or may not match the domain for which you are processing email, however, you should set this manually. Those who are filtering email for accounts at multiple domains should refer to the LOCALHOSTFILE
variable description, as well.yes
, tells the SpamBouncer to check the Dorkslayers blacklist, which lists IP addresses of open mail relays, and block email sent to your system via one of these IP addresses. See the DorkSlayers entry for more information about this blacklist and how to use it.no
by default.yes
, tells the SpamBouncer to check the DSBL Main blacklist at <http://dsbl.org>, to see if an IP address or domain name is on the main dsbl.org blacklist. See the DSBL entry for more information about this blacklist and how to use it.no
by default.yes
, tells the SpamBouncer to check the DSBL Multihop Relays blacklist at <http://dsbl.org>, to see if an IP address or domain name is on the multi-hop relays dsbl.org blacklist. See the DSBL Multi-Stage entry for more information about this blacklist and how to use it.no
by default.yes
, tells the SpamBouncer to check the Mail Abuse Prevention System (MAPS) Dial-Up List (DUL), which lists IP addresses that are part of ISP dial-up pools, and block email sent directly to your system from these IP addresses. See the DUL entry for more information about this blacklist and how to use it.no
by default.echo
program. The echo
program is usually in a directory that is on your PATH. (The PATH variable contains a list of directories that your Unix shell searches when you tell it to run an executable program and do not provide a full path with the program name.)echo
program, and that should fix the problem. If the SpamBouncer is working properly, there is no need to set this variable.echo
by default.EXECHECKING=no
in your .procmailrc
file.yes
by default.EXEDOCCHECKING=no
in your .procmailrc
file.yes
by default.yes
, tells the SpamBouncer not to file blocked email, spam, suspected virus-laden email, admin email or legitimate bulk email in the appropriate location, but to pass it on to the user along with the other email. The user must then use his/her own filters to file this email in the proper location.no
by default.freemail
file, a text file of domains offering free email accounts commonly used or forged by spammers. The domains should be listed singly, with one appearing on each text line, and with no blank lines in the file.INTERNAL
by default, causing the SpamBouncer to use an internal list of free email sites. no
, the default, and yes
, which enables this filter.blackholes.five-ten-sg.com
, a blacklist hosted by Five-Ten-SG.com, to see if an IP address belongs to a pool of addresses assigned to dial-up users of an ISP. See the FTSG Dial-Up entry for more information about this blacklist and how to use it.no
by default.blackholes.five-ten-sg.com
, a blacklist hosted by Five-Ten-SG.com, to see if an IP address belongs to a company or ISP that ignores spam complaints. See the FTSG Ignores Spam Complaints entry for more information about this blacklist and how to use it.no
by default.blackholes.five-ten-sg.com
, a blacklist hosted by Five-Ten-SG.com, to see if an IP address belongs to an SMTP server that is itself secure, but that relays for one or more insecure SMTP servers. See the FTSG Multi-Stage Open Relays entry for more information about this blacklist and how to use it.no
by default.blackholes.five-ten-sg.com
, a blacklist hosted by Five-Ten-SG.com, to see if an IP address belongs to an email list server that adds email addresses to its lists without first properly confirming that the user wants to be on that list. See the FTSG Opt-Out Lists entry for more information about this blacklist and how to use it.no
by default.blackholes.five-ten-sg.com
, a blacklist hosted by Five-Ten-SG.com, to see if an IP address belongs to a server with which there are other, undefined spam-related problems that the maintainers of the Five-Ten-SG blacklist feel warrant blacklisting. See the FTSG Other Issues entry for more information about this blacklist and how to use it.no
by default.blackholes.five-ten-sg.com
, a blacklist hosted by Five-Ten-SG.com, to see if an IP address belongs to an SMTP server that is an open relay, that is, that allows any user on the Internet to use it to send email to any other user on the Internet. See the FTSG Single-Stage Open Relays entry for more information about this blacklist and how to use it.no
by default.blackholes.five-ten-sg.com
, a blacklist hosted by Five-Ten-SG.com, to see if an IP address belongs to a server that is a direct spam source. See the FTSG Spam Sources entry for more information about this blacklist and how to use it.no
by default.blackholes.five-ten-sg.com
, a blacklist hosted by Five-Ten-SG.com, to see if an IP address belongs to a web server that has one or more insecure web forms, such as web forms using insecure versions of formmail.pl
, that are abused by spammers to send spam. See the FTSG Insecure Web Form entry for more information about this blacklist and how to use it.no
by default.grep
, a set of programs which searches files on Unix systems for specified strings of characters. This is set by default to "fgrep", a fast version of grep which is usually found in a normal system programs directory on Unix machines. Most versions of fgrep work properly with the SpamBouncer.grep
programs other than fgrep
. Usually egrep
will work, or agrep
if that does not.hil.habeas.com
, a blacklist hosted by Habeas, Inc., to see if an IP address found in the headers of an email has been used to send spam in violation of the Habeas SWE program. See the Habeas entry for more information about this blacklist and how to use it.no
by default.hul.habeas.com
, a whitelist hosted by Habeas, Inc., to see if an IP address found in the headers of an email is registered with Habeas as a guaranteed source of only non-spam email. See the Habeas entry for more information about this whitelist and how to use it.no
by default.HTMLBLOCK
variable to yes
in your .procmailrc
file.no
by default.yes
by default.chitchat@borg.besties.com dylan-fanatics@lists.musicman.net
${HOME}/.legitlists
. If the file does not exist, the SpamBouncer just skips this recipe.hrweb.org spambouncer.org
${HOME}/.localhostfile
. If the file exists, the SpamBouncer uses it. If it does not exist, the SpamBouncer uses the contents of the DOMAIN
variable.NOBOUNCE
file, a text file of email addresses and domains whose email you want the SpamBouncer to skip filtering and deliver directly to you. Set this to point to the directory and filename where you keep that file. I name mine ".nobounce" and keep it in my home directory, and this is where the SpamBouncer looks if you don't set this variable.goodguy@spamsite.com niceguy@roguesite.net
X-Loop:
header. I recommend leaving the default setting, which uses your ALTFROM address.nslookup
program. You need to set this only if nslookup is not in your path (the list of directories which your system will search for a program), if you have an alias set up for nslookup on your account, or if you are running Debian Linux or another Linux system that fills up your logs with error messages indicating that nslookup is deprecated. (If you aren't having trouble getting blacklists to work on your system, you can leave this alone.)nslookup
by default.yes
, tells the SpamBouncer to check the Open Relay Database, at <http://www.ordb.org>, to see if an IP address is an open relay. This list closely corresponds to the old ORBS inputs list. An email server listed in the ORBL has not necessarily been used to send spam; it merely can be used to do so. Using this or any open relay blacklist can result in blocking a considerable amount of legitimate email as well as spam, if you correspond with people at sites that host open relays.no
by default.yes
, tells the SpamBouncer to check the Osirusoft Dial-Up blacklist at <http://relays.osirusoft.com>, to see if an IP address belongs to a dial-up pool. This list is designed to closely correspond to the MAPS DUL, except that you do not have to subscribe to use it. no
by default.yes
, tells the SpamBouncer to check the Osirusoft SpamHaus.org blacklist at <http://relays.osirusoft.com>, to see if an IP address or domain name is on Steve Linford's spamhaus.org blacklist. This list contains the IP addresses and domain names of sites advertised via spam (that is, haven spam sites) and of spam support service providers. Spamhaus.org also hosts its own dns-based lookup site, and that blacklist is enabled by default in the SpamBouncer, so enable this only if the SpamBouncer is having trouble reaching sbl.spamhaus.org
.no
by default.yes
, tells the SpamBouncer to check the Osirusoft Opt-Out email list server blacklist at <http://relays.osirusoft.com>, to see if an IP address hosts opt-out mailing lists. This list contains the IP addresses of email list providers that add email addresses to their mailing lists without first properly confirming that user at that email address wants to be on the list. no
by default.yes
, tells the SpamBouncer to check the Osirusoft Open Proxy Server blacklist at <http://relays.osirusoft.com>, to see if an IP address belongs to an open proxy server. This list contains the IP addresses of open proxy servers, servers that allow spammers to mask the origins of their spam and prevent effective complaints. no
by default.yes
, tells the SpamBouncer to check the Osirusoft Verified Open Relay blacklist at <http://relays.osirusoft.com>, to see if an IP address belongs to an open SMTP relay. This list contains the IP addresses of SMTP servers that allow outside users to send email to anyone on the Internet via that SMTP server. Spammers use open relays to deliver their spam to sites that block email sent directly from their servers.no
by default.yes
, tells the SpamBouncer to check the Osirusoft Smart Host Relay blacklist at <http://relays.osirusoft.com>, to see if an IP address belongs to a smart host relay. This list contains the IP addresses of SMTP servers that are themselves secure, but that relay email for insecure SMTP servers. no
by default.yes
, tells the SpamBouncer to check the Osirusoft Confirmed Spam Sources blacklist at <http://relays.osirusoft.com>, to see if an IP address belongs to a site with a confirmed history of spamming or supporting spammers. This list is designed to closely correspond to the MAPS RBL, except that you do not have to subscribe to use it. no
by default. NONE
, which skips pattern matching entirely; SILENT
, which simply files the mail in the BLOCKFOLDER; and NOTIFY
, which sends a notice to the sender that his email was blocked, and explains how
to bypass spam filtering if his email was legitimate.yes
, tells the SpamBouncer to check the Mail Abuse Prevention System (MAPS) Realtime Blackhole List (RBL), which lists IP addresses associated with domains which have spammed repeatedly, and which have failed to clean up their acts despite the RBL team's efforts and assistance. As of August 1, 2001 you must subscribe to MAPS to use the MAPS RBL (Realtime Blackhole List). If you want to use the RBL, contact MAPS <http://www.mail-abuse.org> and become a subscriber. Sites
listed on the RBL are highly likely to be the sources of spam, and will rarely be sources of email you want to receive.no
by default. To enable RBL-based filtering, set RBLCHECK=yes in your .procmailrc
file.yes
, tells the SpamBouncer to check the rfc-ignorant.org
list for domains with no valid abuse@ address. Lack of an abuse@ address makes it difficult to report spamming or other abuse from a domain, and is often a sign of a badly-managed domain or a domain owned by a spammer.no
by default. To enable the rfc-ignorant.org
abuse blacklist, set RFCABUSECHECK=yes in your .procmailrc
file.yes
, tells the SpamBouncer to check the rfc-ignorant.org
list for domains that do not accept bounced messages. Domains that fail to accept bounced messages can engage in dictionary attacks and other kinds of extremely abusive spamming practices without consequences, since they do not have to accept notifications when they send to an address that does not exist. Failing to accept bounces is often a sign of a badly-managed domain or a domain owned by a spammer.no
by default. To enable the rfc-ignorant.org
DSN blacklist, set RFCDSNCHECK=yes in your .procmailrc
file.yes
, tells the SpamBouncer to check the rfc-ignorant.org
list for IP blocks with no valid whois information. Lack of such information makes it difficult or impossible to contact the person responsible for a netblock to report abuse. no
by default. To enable the rfc-ignorant.org
IP whois blacklist, set RFCIPWHOISCHECK=yes in your .procmailrc
file.yes
, tells the SpamBouncer to check the rfc-ignorant.org
list for domains with no valid postmaster@ address. Lack of an postmaster@ address means that it is not possible to contact the person responsible for a domain's mail system. Domains that lack a postmaster address are often badly-managed or owned by a spammer.no
by default. To enable the rfc-ignorant.org
postmaster blacklist, set RFCPOSTMASTERCHECK=yes in your .procmailrc
file.yes
, tells the SpamBouncer to check the rfc-ignorant.org
list for domains with invalid whois information. Invalid whois information is often a sign of a badly-managed domain or a domain owned by a spammer.no
by default. To enable the rfc-ignorant.org
whois blacklist, set RFCWHOISCHECK=yes in your .procmailrc
file.rm
program -- the program which deletes files. You need to set this only if rm is not in your path (the list of directories which your system will search for a program) or if you have an alias set up for rm on your account. If you aren't having trouble with the SpamBouncer leaving temporary files on your system, you can leave this alone.yes
, tells the SpamBouncer to check the Relay Stop List (RSL) at <http://relays.visi.com>, to see if an IP address belongs to an open relay. This list contains the IP addresses of open relays, insecure SMTP servers that allow any user on the Internet to send email to any other user via this SMTP server. This list expires entries after 90 days, or automatically on request by anyone, so it is a very conservative list. That means it is unlikely to block much legitimate email, but that it is also likely to fail to block spam that other lists would block.no
by default.yes
, tells the SpamBouncer to check the MAPS Relay Spam Source (RSS)
blacklist, which lists IP addresses associated with mail servers which are open relays, and through which spam has been sent at least once. As of August 1, 2001 you must subscribe to MAPS to use the RSS. If you want to use the RSS, contact MAPS <http://www.mail-abuse.org> and become a subscriber.no
by default. To enable RSS-based filtering, set RSSCHECK=yes in your .procmailrc
file.yes
if you receive email in Russian. Otherwise leave it set to no (the default), and the SpamBouncer will send any email in Russian to the BLOCKFOLDER./tmp
directory. (You do not normally need to set this.)/usr/sbin/sendmail
, which will work on some systems, but not all. On almost all systems which use sendmail, however, this variable is set correctly as a global default by the system administrators. It does not hurt to check and be sure, though. If SENDMAIL is not set correctly, the SpamBouncer will be unable to send any autoreplies.yes
, tells the SpamBouncer to check the SpamCop blacklist, described at at <http://www.spamcop.net>, to see if an IP address or domain name is on the main spamcop.org blacklist. This list contains the IP addresses of all sorts of sites that have spammed, host sites that are advertised by spamming, or that the maintainers believe are involved in spamming in some other way. no
by default.yes
, tells the SpamBouncer to check Steve Linford's <http://www.spamhaus.org> blacklist to see if an IP is listed. These sites are mostly unrepentant and aggressive spammers. You are very unlikely to get legitimate email from any of them.yes
by default. To disable spamhaus.org filtering, set SPAMHAUSORGCHECK=no in your .procmailrc
file, but I recommend leaving it enabled.SILENT
, which simply files the mail in the SPAMFOLDER; BOUNCE
, which sends a simulated MAILER-DAEMON bounce message to the spammer in hopes that
he will think your address is no good and remove it from his list; COMPLAIN
, which sends a
complaint and copy of the spam to the spammer's postmaster for spammers which the SpamBouncer knows about and has this information, and in most cases also the upstream ISPs; and BOTH
, which (not surprisingly) both sends a bounce and complains.yes
, tells the SpamBouncer to check the SPEWS blacklist, described at at <http://www.spews.org>, to see if an IP address or domain name is on the main spews.org blacklist. The SPEWS blacklist used by the SpamBouncer is maintained by Osirusoft, at spews.relays.osirusoft.com
. This list contains the IP addresses of all sorts of sites that the SPEWS maintainers believe are likely to be sources of spam, whether they have actually spammed or not as of the time of listing. Most of the entries appear to be of long-time spammers and providers of spam support services, in addition to sites that are actively spamming or hosting spammers and refusing to shut them down. Entries to this list are from trusted users only; SPEWS does not accept submissions for listing from the public.no
by default.test
program, a small program which looks for a file or directory and reports whether it exists or not. This is set to "test" by default, since this program is normally found on the system path.test
program.${HOST}.${DOMAIN}
by default.yes
by default, enabling the internal virus checking filters. To disable them, set VIRUSCHECKING=no
in your .procmailrc
file.VIRUSCHECKING=no
will NOT disable the SpamBouncer's filters for dangerous file types and code. The SpamBouncer will always look for and block email with embedded hidden executable attachments, iframes, and scripts. It will also look for and block email with any embedded executable attachments unless you set EXECHECKING=no
, and email with any embedded documents of a type that can contain executable code unless you set EXEDOCCHECKING=no
.yes
, tells the SpamBouncer to check the dynablock.wirehub.net blacklist to see if an IP is listed. This blacklist lists dial-up IP ranges and other dynamic IP pools. Email sent from these pools should be sent via the ISP's SMTP server, not directly to you -- email that is sent directly from a dynamic IP is usually spam.no
by default. To enable dynablock.wirehub.net filtering, set WIREHUBDIALUP=yes in your .procmailrc
file.yes
, tells the SpamBouncer to check the blackholes.wirehub.net blacklist to see if an IP is listed. This blacklist lists persistent spam sources.no
by default. To enable blackholes.wirehub.net filtering, set WIREHUBSPAMSOURCE=yes in your .procmailrc
file.Upgrading is easy. You just check the "What's New" notice to see if there are any new variables you should set or features you should be aware of, and then ftp the new version (or grab it with your WWW browser) and copy it over the old version. If you prefer, you can subscribe to the SpamBouncer Updates mailing list to get automatic notifications of updates via email. The mailing list is described in the next section.
That's all there is to it.
The SpamBouncer should be upgraded regularly -- weekly if you are using it with SPAMREPLY set to COMPLAIN and monthly otherwise. Spammers move around a lot. Prolific spammers tend to get disconnected quite a bit, even by spam-friendly providers, because they cause their providers so much trouble. This means that the complaint addresses in the Spam Bouncer's complaint lists must be updated constantly or complaints will go to the wrong place.
Providers get annoyed when they get complaints about a problem they've already fixed, or at least done everything they can to fix. Once they've kicked a spammer off their system, there is very little else they can do, and sending complaints to them just wastes their time and resources.
I do my part by updating the addresses, but that helps only if you do yours by keeping your copy of the SpamBouncer up to date.
So, if you can't upgrade frequently or don't want to bother updating all the time, please set SPAMREPLY and BLOCKREPLY to SILENT. That way you'll still get the benefits of the filter, but you won't risk causing trouble for an ISP that has already kicked its spammers off.
In addition, today's rogue ISP may be tomorrow's good guys. An example of that is erols.com, which a few years ago was the source of a huge amount of spam and which today is one of the leaders in the fight against it. (Erols also has one of the most entertaining "abuse@" people in the business -- Afterburner.) I regularly review the sites on the blocked list and retire those who have adopted and enforced solid no-spamming policies. That reduces the size of the filter and the resources it takes while keeping it as efficient as possible.
So, please keep up to date! :)
If you are having trouble with the SpamBouncer, first please make sure you:
The SpamBouncer is set up to avoid replying to bounced messages and autoreplies to its own bounces, but some spammers set their adminstrative accounts to autoreply to spam complaints and misconfigure their autoresponders to remove the "X-Loop" header, which should NEVER be removed by any autoreply script. In general, it is not a good idea to autoreply to mail from administrative accounts at all, so the SpamBouncer is set up to filter it out first.
I commonly hear from new users who examine the log that Procmail keeps, and are concerned when they see lines like the following:
*** host.domain.tld can't find 000.000.000.000.list.dsbl.org: Non-existent host/domain *** host.domain.tld can't find 000.000.000.000.blackholes.five-ten-sg.com: Non-existent host/domain *** host.domain.tld can't find 000.000.000.000.relays.ordb.org: Non-existent host/domain *** host.domain.tld can't find 000.000.000.000.ipwhois.rfc-ignorant.org: Non-existent host/domain *** host.domain.tld can't find 000.000.000.000.sbl.spamhaus.org: Non-existent host/domain
Please note that these are normal and simply indicate that your system did not find the IP address in question on that blacklist. All is well; do not worry. :)
Please report spam which the SpamBouncer does not catch to <spamtrap@spambouncer.org> so that I can modify the SpamBouncer to catch it. Many spammers have gotten wise to me -- I'm on their remove lists even if they won't put you or others there. <wry grin> So I depend on my users to keep me up-to-date on what kind of spam is out there.
Report any problems to me at ariel@spambouncer.org, and I'll get to work on fixing them ASAP.
Unfortunately this list is down at present. I'll announce it here when it returns from the dead.
Updates to the SpamBouncer are announced via the SpamBouncer Updates mailing list, in addition to this Web page. The list is a low-volume announcements-only list that gets less than one email per week. I keep it this way so that people who hate getting spammed :) can subscribe without being overwhelmed with email. (If you want to discuss spam and how to fight it, I recommend the SPAM-L mailing list, described in the following section.)
The SpamBouncer Updates list runs on a Majordomo list server, a widely used mailing list management program. If you are unfamiliar with Majordomo, the instructions below should explain how to subscribe to and unsubscribe from the SpamBouncer Updates list. For more information on Majordomo and how to use it, refer to Majordomo Mailing List User Commands at the University of Rochester. For more information on Majordomo itself and how it works, refer to the Majordomo FAQ.
I must approve all subscriptions to the mailing list, so I suggest you send me email letting me know who you are and why you are subscribing before you subscribe to the list. :) (Where possible, I would prefer to keep spammers off of it.)
subscribe <your email address>
end
This will tell the Majordomo list server that you want to subscribe to the SpamBouncer Updates mailing list.
The list server will then send you two messages: a notice to the email address from which your subscription was sent and a confirmation message to the email address that you asked to have subscribed to the list. The notice explains that the subscription must be confirmed from the address that was subscribed to the list. The confirmation message asks you to copy a line of text from it, paste that line of text in a new email, and send the email back to the list server. The message will read like this:
Someone (possibly you) has requested that your email address be added to or deleted from the mailing list "spambouncer-updates@aziz.devnull.net".
If you really want this action to be taken, please send the following commands (exactly as shown) back to "Majordomo@aziz.devnull.net":
auth 3de6896e subscribe spambouncer-updates someone@example.com
If you do not want this action to be taken, simply ignore this message and the request will be disregarded.
The text you need to copy is the line beginning withauth
. The jumble of letters and numbers afterauth
is called a token, and will be different for each person. Because it is different for each person, if you send back the exact token, the mailing list knows you really asked to subscribe. That prevents others from subscribing you to the mailing list without your permission.
auth
and
containing the token from the message the Majordomo list server sends to you into
a new email, and send the new email back to
updates-request@lists.spambouncer.org. ! CAUTION! |
|
---|
If you followed these instructions correctly, the Majordomo list server will send you two more messages. The first is a short, machine-generated message showing that your subscribe command worked. The second is a message welcoming you to the SpamBouncer Upgrades list.
Send email to updates-request@lists.spambouncer.org, with any subject line you like (the list server will ignore it), and the following text in the message body:
unsubscribe <your email address>
end
This will tell the Majordomo list server that you want to unsubscribe from the SpamBouncer Updates mailing list. Majordomo will send you a message confirming that you have unsubscribed from the list. If you no longer have access to your old address, send me email and I will unsubscribe your old address manually.
To switch your subscription to a new email address, you must unsubscribe your old address and subscribe the new one, following the instructions above.
First, I would like to thank Stephen van den Berg, the creator of procmail, for his wonderful tool. It is truly the friend of those who hate email spam and want it out of their lives. (It is also the friend of anyone who gets a lot of email.)
I would also like to thank the readers of the Procmail Mailing List for answering lots of often elementary questions, especially at the beginning, as I learned the program. I highly recommend the list for people who use the SpamBouncer. You can subscribe at procmail-request@Informatik.RWTH-Aachen.DE.
Finally, I'd like to thank one of the best sets of users anyone ever had -- you guys do a superb job keeping me up to date on what spammers are doing. I couldn't do it without you, seriously.
These filters are the result of several years of work and learning about Procmail. I hope the results will be as useful to others as they have been to me.
©1996-2003 by Catherine A. Hampton <ariel@spambouncer.org>. All rights reserved.