September 16, 2009 SpamAssassin Way more than the Mac OS X Server GUI shows Presented by: Kevin A. McGrail Project Management Committee Member of the Apache.

Slides:



Advertisements
Similar presentations
IP Warming Overview and Implementation Using Eloqua.
Advertisements

© 2012 Eloqua, Inc. Confidential 1 Deliverability and IP Warming Overview and Implementation Using Eloqua.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Used by many 100,000s of customers Used by many 10,000,000s of users Processing Billions of s a day Using Thousands of servers Across dozens of.
Gold Country Computer Learning Center March 2007 Spam Roger Thornburn.
Dealing With Spam The kind, not the Food product.
Are You Spamming Your Clients? June 17, Introductions  Doug Ladendorf Manager of Marketing Databases & CRM Mayer Brown LLP  1,600 Attorneys 
Methods for Stopping Spam James Lick
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
UC Irvine’s New Anti-Spam Measures Keith Chong Network & Support Programming Network & Academic Computing Services UC Irvine August 9, 2005 Keith Chong.
SPAM WeeSan Lee
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
August 8, 2006 for NYExUG Presented by Ben Serebin Welcome to the 1.5 years anniversary meeting. Tue, August 8, Every 2 nd.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Fighting Spam Enterprise Spam Filtering Using Open Source Tools.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Filtering with Open Source Software OLUG – June 7, 2005.
Antispam GARR Michele Michelotto Hepix Karlsruhe, 11 May 2005.
What’s New in WatchGuard XCS v9.1 Update 2. WatchGuard XCS v9.1 Update 2  Introduce New Features WatchGuard XCS Outlook Add-in Secur Encryption.
Review of Last Session Search Engine Optimisation (SEO) Search Engine Optimisation (SEO) You can fine-tune your site so that the search engines notice.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
 2:00 pm - 2:15 p.m. ◦ Intro, Welcome and Overview of Agenda  2:15 p.m. - 3:00 p.m. – Admin Training ◦ Introduction to Live at EDU and roadmap.
© 2007 Convio, Inc. HOW TO: Best Practices for Sending to Organizations Confidential for use by American Cancer Society and Convio – Copyright ©
Anti Phishing & Spam -- by lynn. Spam Anti Spam and How White-lists Black-lists Heuristics –Bayes –Neural Networks Static technique –keyword checking.
How to Get Permission and Avoid Being Spam Jill Bastian Training and Education Manager.
© Toronto Area Security Klatch 2007 A drop-in anti-spam solution A 15 minute speed talk by Paul Wouters.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Tired of Spam? The solution is MailWasher
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
CAN SPAM and Your Marketing Best Practices for Senders By Lars Helgeson Cooler .
ISC Anti-Spam Activities and Progress Li Hong Internet Society of China.
E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
SpamAssassin An Introduction PacNOG I Workshop June 20, 2005 Nadi, Fiji Hervey Allen.
Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.
Technology Update TSAG Meeting 7/8/04. Announcements New Interim Director of User Support Services: Bill Hardy Outage on July 17 Udrive status Anyone.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
X-ASVP Executive Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 25, 2007.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
System Software Chapter 5 The Director Computer Components & Networks, 2002.
Family Connection Collaborative Webs A Tool for Creating and Managing Web sites.
TOPIC 7.0 LINUX SERVICES AND CONFIGURATION. ROOT USER Root user is called “super user” because it has power far beyond those of mortal user. As root,
X-ASVP Technical Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 22, 2007.
There are 5 pull-down menus. Provide your affiliation : select E-1000 in the 1 st pull-down which asks for your experiment – it is there. Provide your.
There are 5 pull-down menus. Provide your affiliation : select E-1000 in the 1 st pull-down which asks for your experiment – it is there. Provide your.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
Sender Reputation in a Large Webmail Service by Bradley Taylor (2006) Presented by : Manoj Kumar & Harsha Vardhana.
28th March 2003 SPAM Presenter: Matthew Sullivan.
Anti-Spam Managing Spam with Kerio Connect
How to get 90% in boxing through s is the foundation of the social web. It is the essential — and frequently the main — channel for speaking.
Birdville ISD SPAM Filter – Self management portal
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Presentation transcript:

September 16, 2009 SpamAssassin Way more than the Mac OS X Server GUI shows Presented by: Kevin A. McGrail Project Management Committee Member of the Apache Software Foundation SpamAssassin Project & President, PCCC

September 16, 2009 What is Spam? Spam is NOT about content, its about CONSENT. –Consent: to give assent or approval : agree Merriam-Webster Dictionary What is SPAM vs. spam?

Disagreements on Spam Hormel – SPAM Brand and the Internet CAN-SPAM! URIBLSucks September 16, 2009

What is Ham? In the anti-Spam community, Spam and Ham are opposites. –Spam = Junk s –Ham = Good s.

September 16, 2009 What is an FP? False-Positives (FPs) – s incorrectly tagged as Junk False-Negatives (FNs) – s incorrectly NOT tagged as Junk

September 16, 2009 Blacklist / Whitelist Blacklist = Bad Items Whitelist = Good Items Greylist = Undecided Items

September 16, 2009 What is SpamAssassin? SpamAssassin is a mail filter & API used to identify junk . SpamAssassin powers the Junk Mail Filtering tool in OS X. SpamAssassin is also the basis of several other commercial products.

September 16, 2009 SpamAssassin: Future-proof? SpamAssassin is a well-refined scoring framework Uses Rules-Based Heuristics Engine: Each Rule is given a Score –Lower, or Negative overall score = Ham –Higher overall score & equal to/above a threshold = Spam Utilizes a Genetic Algorithm on Ham & Spam collections to generate the weight for each rule Upcoming release separates Rules from Framework

September 16, 2009 Enabling the Junk Mail Filter

GUI Tweaks for the Junk Mail Filter September 16, 2009

SpamAssassin with Snow Leopard Snow Leopard (10.6.1) uses SA version was released June 11 th, 2007! was released June 12 th, 2008! is beyond 2 nd alpha with optimization for the score weighting in progress for imminent full release. September 16, 2009

Improve Your Mail Setup Improving your overall mail setup will assist other mail servers to identify legitimate senders: –rPTRs –Smart Host? MSA/MUA/MTA –SPF –Reduction of DSNs

Behind the OS X Server GUI Terminal Vi – the greatest editor ever invented. –Learn It, Love It, Buy the Coffee Cup. Xcode September 16, 2009

Tweaking your Installation Network Tests –Blacklists (BRBL, PSBL, SURBL, URIBL, ZEN) –Checksum Filters (DCC, Pyzor, Razor/Cloudmark) –Use a Caching Nameserver! Extra Rule Sets –KAM.cf

September 16, 2009 More Tweaking Consider your threshold for tagging Bayesian Classifier SpamTrainer.pre and.cf files

Future Tweaks? Domain Keys Identified Mail (DKIM) Author Domain Signing Practices (ADSP) sa-update September 16, 2009

More Spam Reduction Techniques? Using Blacklists to Outright Blocking –RBL to Greylisting

Common Problems Don’t whitelist your own domain! FPs with Mailing Lists / Newsletters / Digests September 16, 2009

Why is an Tagged / Not Tagged as Spam? Review the Headers –Content vs. Pathway Analysis Checking Blacklists September 16, 2009

Who is Sending the Spam? Who is sending the Spam? How did they get my address? Why do they send it? Creative Spam (to a Spam Junkie)

September 16, 2009 Making your Own Heuristic Rules 1 st Resource for Writing Rules (+ RegExes) Running “Lint” SpamAssassin Rules Emporium (SARE) Running tests manually Restart Mail Service to Implement Changes

September 16, 2009 Excuses, Excuses! Best Spam RBL Delisting Request –"Please delist us. We promote cosmic peace as in the poem below. This world badly needs it. Why do some hate peace and have us blacklisted?” Best Unsubscribe Tag –If you do not have Internet access, please send an to

September 16, 2009 Resources from this Speech –SpamAssassin – –SpamAssassin – Writing Rules - –Monty Python SPAM Skit – –Hormel SPAM and the Internet – –Xcode – –Sender Policy Framework – –The SpamHaus Project – –URIBL – –SURBL – –PCCC – Peregrine Computer Consultants Corporation – –KAM.cf – –SpamTrainer – –Genetic Algorithm – –Template thanks to

and Anti-Spam Dictionary Wikipedia, Google & the Web are invaluable tools for any administrator. In the notes for this slide are more definitions and their sources which may assist you in learning more to battle Spammers. I am also happy to answer questions via at September 16, 2009

Thank You! Presentation (+Q&A!) will be published –MacSysadmin.se website –SpamAssassin website Questions & Answers September 16, 2009