# <@LICENSE> # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to you under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at: # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # package Mail::SpamAssassin::Plugin::HeaderEval; use Mail::SpamAssassin::Plugin; use Mail::SpamAssassin::Locales; use Mail::SpamAssassin::Logger; use Mail::SpamAssassin::Constants qw(:sa :ip); use strict; use warnings; use bytes; use vars qw(@ISA); @ISA = qw(Mail::SpamAssassin::Plugin); # constructor: register the eval rule sub new { my $class = shift; my $mailsaobject = shift; # some boilerplate... $class = ref($class) || $class; my $self = $class->SUPER::new($mailsaobject); bless ($self, $class); # the important bit! $self->register_eval_rule("check_for_fake_aol_relay_in_rcvd"); $self->register_eval_rule("check_for_faraway_charset_in_headers"); $self->register_eval_rule("check_for_unique_subject_id"); $self->register_eval_rule("check_illegal_chars"); $self->register_eval_rule("check_for_forged_hotmail_received_headers"); $self->register_eval_rule("check_for_no_hotmail_received_headers"); $self->register_eval_rule("check_for_msn_groups_headers"); $self->register_eval_rule("check_for_forged_eudoramail_received_headers"); $self->register_eval_rule("check_for_forged_yahoo_received_headers"); $self->register_eval_rule("check_for_forged_juno_received_headers"); $self->register_eval_rule("check_for_matching_env_and_hdr_from"); $self->register_eval_rule("sorted_recipients"); $self->register_eval_rule("similar_recipients"); $self->register_eval_rule("check_for_missing_to_header"); $self->register_eval_rule("check_for_forged_gw05_received_headers"); $self->register_eval_rule("check_for_round_the_world_received_helo"); $self->register_eval_rule("check_for_round_the_world_received_revdns"); $self->register_eval_rule("check_for_shifted_date"); $self->register_eval_rule("subject_is_all_caps"); $self->register_eval_rule("check_for_to_in_subject"); $self->register_eval_rule("check_outlook_message_id"); $self->register_eval_rule("check_messageid_not_usable"); $self->register_eval_rule("check_header_count_range"); $self->register_eval_rule("check_unresolved_template"); $self->register_eval_rule("check_ratware_name_id"); $self->register_eval_rule("check_ratware_envelope_from"); return $self; } # load triplets.txt into memory sub compile_now_start { my ($self) = @_; $self->word_is_in_dictionary("aba"); } # sad but true. sort it out, sysadmins! my $CCTLDS_WITH_LOTS_OF_OPEN_RELAYS = qr{(?:kr|cn|cl|ar|hk|il|th|tw|sg|za|tr|ma|ua|in|pe|br)}; my $ROUND_THE_WORLD_RELAYERS = qr{(?:net|com|ca)}; sub check_for_fake_aol_relay_in_rcvd { my ($self, $pms) = @_; local ($_); $_ = $pms->get('Received'); s/\s/ /gs; # this is the hostname format used by AOL for their relays. Spammers love # forging it. Don't make it more specific to match aol.com only, though -- # there's another set of spammers who generate fake hostnames to go with # it! if (/ rly-[a-z][a-z]\d\d\./i) { return 0 if /\/AOL-\d+\.\d+\.\d+\)/; # via AOL mail relay return 0 if /ESMTP id (?:RELAY|MAILRELAY|MAILIN)/; # AOLish return 1; } # spam: Received: from unknown (HELO mta05bw.bigpond.com) (80.71.176.130) by # rly-xw01.mx.aol.com with QMQP; Sat, 15 Jun 2002 23:37:16 -0000 # non: Received: from rly-xj02.mx.aol.com (rly-xj02.mail.aol.com [172.20.116.39]) by # omr-r05.mx.aol.com (v83.35) with ESMTP id RELAYIN7-0501132011; Wed, 01 # May 2002 13:20:11 -0400 # non: Received: from logs-tr.proxy.aol.com (logs-tr.proxy.aol.com [152.163.201.132]) # by rly-ip01.mx.aol.com (8.8.8/8.8.8/AOL-5.0.0) # with ESMTP id NAA08955 for ; # Thu, 4 Apr 2002 13:11:20 -0500 (EST) return 0; } sub check_for_faraway_charset_in_headers { my ($self, $pms) = @_; my $hdr; my @locales = Mail::SpamAssassin::Util::get_my_locales($self->{main}->{conf}->{ok_locales}); return 0 if grep { $_ eq "all" } @locales; for my $h (qw(From Subject)) { my @hdrs = $pms->get("$h:raw"); if ($#hdrs >= 0) { $hdr = join(" ", @hdrs); } else { $hdr = ''; } while ($hdr =~ /=\?(.+?)\?.\?.*?\?=/g) { Mail::SpamAssassin::Locales::is_charset_ok_for_locales($1, @locales) or return 1; } } 0; } sub check_for_unique_subject_id { my ($self, $pms) = @_; local ($_); $_ = lc $pms->get('Subject'); study; my $id = 0; if (/[-_\.\s]{7,}([-a-z0-9]{4,})$/ || /\s{10,}(?:\S\s)?(\S+)$/ || /\s{3,}[-:\#\(\[]+([-a-z0-9]{4,})[\]\)]+$/ || /\s{3,}[:\#\(\[]*([a-f0-9]{4,})[\]\)]*$/ || /\s{3,}[-:\#]([a-z0-9]{5,})$/ || /[\s._]{3,}([^0\s._]\d{3,})$/ || /[\s._]{3,}\[(\S+)\]$/ # (7217vPhZ0-478TLdy5829qicU9-0@26) and similar || /\(([-\w]{7,}\@\d+)\)$/ # Seven or more digits at the end of a subject is almost certainly a id || /\b(\d{7,})\s*$/ # stuff at end of line after "!" or "?" is usually an id || /[!\?]\s*(\d{4,}|\w+(-\w+)+)\s*$/ # 9095IPZK7-095wsvp8715rJgY8-286-28 and similar # excluding 'Re:', etc and the first word || /(?:\w{2,3}:\s)?\w+\s+(\w{7,}-\w{7,}(-\w+)*)\s*$/ # #30D7 and similar || /\s#\s*([a-f0-9]{4,})\s*$/ ) { $id = $1; # exempt online purchases if ($id =~ /\d{5,}/ && /(?:item|invoice|order|number|confirmation).{1,6}\Q$id\E\s*$/) { $id = 0; } # for the "foo-bar-baz" case, otherwise it won't # be found in the dict: $id =~ s/-//; } return ($id && !$self->word_is_in_dictionary($id)); } # word_is_in_dictionary() # # See if the word looks like an English word, by checking if each triplet # of letters it contains is one that can be found in the English language. # Does not include triplets only found in proper names, or in the Latin # and Greek terms that might be found in a larger dictionary my %triplets = (); my $triplets_loaded = 0; sub word_is_in_dictionary { my ($self, $word) = @_; local ($_); local $/ = "\n"; # Ensure $/ is set appropriately # $word =~ tr/A-Z/a-z/; # already done by this stage $word =~ s/^\s+//; $word =~ s/\s+$//; # If it contains a digit, dash, etc, it's not a valid word. # Don't reject words like "can't" and "I'll" return 0 if ($word =~ /[^a-z\']/); # handle a few common "blah blah blah (comment)" styles return 1 if ($word eq "ot"); # off-topic return 1 if ($word =~ /(?:linux|nix|bsd)/); # not in most dicts return 1 if ($word =~ /(?:whew|phew|attn|tha?nx)/); # not in most dicts my $word_len = length($word); # Unique IDs probably aren't going to be only one or two letters long return 1 if ($word_len < 3); if (!$triplets_loaded) { # take a copy to avoid modifying the real one my @default_triplets_path = @Mail::SpamAssassin::default_rules_path; @default_triplets_path = map { s,$,/triplets.txt,; $_; } @default_triplets_path; my $filename = $self->{main}->first_existing_path (@default_triplets_path); if (!defined $filename) { dbg("eval: failed to locate the triplets.txt file"); return 1; } if (!open (TRIPLETS, "<$filename")) { dbg("eval: failed to open '$filename', cannot check dictionary"); return 1; } while() { chomp; $triplets{$_} = 1; } close(TRIPLETS); $triplets_loaded = 1; } # if (!$triplets_loaded) my $i; for ($i = 0; $i < ($word_len - 2); $i++) { my $triplet = substr($word, $i, 3); if (!$triplets{$triplet}) { dbg("eval: unique ID: letter triplet '$triplet' from word '$word' not valid"); return 0; } } # for ($i = 0; $i < ($word_len - 2); $i++) # All letter triplets in word were found to be valid return 1; } # look for 8-bit and other illegal characters that should be MIME # encoded, these might want to exempt languages that do not use # Latin-based alphabets, but only if the user wants it that way sub check_illegal_chars { my ($self, $pms, $header, $ratio, $count) = @_; $header .= ":raw" unless ($header eq "ALL" || $header =~ /:raw$/); my $str = $pms->get($header); return 0 unless $str; # avoid overlap between tests if ($header eq "ALL") { # fix continuation lines, then remove Subject and From $str =~ s/\n[ \t]+/ /gs; $str =~ s/^(?:Subject|From):.*$//gm; } # count illegal substrings (RFC 2045) my $illegal = () = ($str =~ /[\x00-\x08\x0b\x0c\x0e-\x1f\x7f-\xff]/g); # minor exemptions for Subject if ($header eq "Subject:raw") { # only exempt a single cent sign, pound sign, or registered sign my $exempt = () = ($str =~ /[\xa2\xa3\xae]/g); $illegal-- if $exempt == 1; } return 0 if (length($str) == 0); return (($illegal / length($str)) >= $ratio && $illegal >= $count); } # ezmlm has a very bad habit of removing Received: headers! bad ezmlm. # sub gated_through_received_hdr_remover { my ($self, $pms) = @_; my $txt = $pms->get("Mailing-List"); if (defined $txt && $txt =~ /^contact \S+\@\S+\; run by ezmlm$/) { my $dlto = $pms->get("Delivered-To"); my $rcvd = $pms->get("Received"); # ensure we have other indicative headers too if ($dlto =~ /^mailing list \S+\@\S+/ && $rcvd =~ /qmail \d+ invoked (?:from network|by .{3,20})\); \d+ ... \d+/) { return 1; } } if ($pms->get("Received") !~ /\S/) { # we have no Received headers! These tests cannot run in that case return 1; } # MSN groups removes Received lines. thanks MSN if ($pms->get("Received") =~ /from groups\.msn\.com \(\S+\.msn\.com /) { return 1; } return 0; } # FORGED_HOTMAIL_RCVD sub _check_for_forged_hotmail_received_headers { my ($self, $pms) = @_; if (defined $pms->{hotmail_addr_but_no_hotmail_received}) { return; } $pms->{hotmail_addr_with_forged_hotmail_received} = 0; $pms->{hotmail_addr_but_no_hotmail_received} = 0; my $rcvd = $pms->get('Received'); $rcvd =~ s/\s+/ /gs; # just spaces, simplify the regexp return if ($rcvd =~ /from mail pickup service by hotmail\.com with Microsoft SMTPSVC;/); # Microsoft passes Hotmail mail directly to MSN Group servers. return if $self->check_for_msn_groups_headers($pms); my $ip = $pms->get('X-Originating-Ip'); my $IP_ADDRESS = IP_ADDRESS; if ($ip =~ /$IP_ADDRESS/) { $ip = 1; } else { $ip = 0; } # Hotmail formats its received headers like this: # Received: from hotmail.com (f135.law8.hotmail.com [216.33.241.135]) # spammers do not ;) if ($self->gated_through_received_hdr_remover($pms)) { return; } if ($rcvd =~ /from (?:\S*\.)?hotmail.com \(\S+\.hotmail(?:\.msn)?\.com[ \)]/ && $ip) { return; } if ($rcvd =~ /from \S*\.hotmail.com \(\[$IP_ADDRESS\][ \):]/ && $ip) { return; } if ($rcvd =~ /from \S+ by \S+\.hotmail(?:\.msn)?\.com with HTTP\;/ && $ip) { return; } if ($rcvd =~ /from \[66\.218.\S+\] by \S+\.yahoo\.com/ && $ip) { return; } if ($rcvd =~ /(?:from |HELO |helo=)\S*hotmail\.com\b/) { # HELO'd as hotmail.com, despite not being hotmail $pms->{hotmail_addr_with_forged_hotmail_received} = 1; } else { # check to see if From claimed to be @hotmail.com my $from = $pms->get('From:addr'); if ($from !~ /hotmail.com/) { return; } $pms->{hotmail_addr_but_no_hotmail_received} = 1; } } # FORGED_HOTMAIL_RCVD sub check_for_forged_hotmail_received_headers { my ($self, $pms) = @_; $self->_check_for_forged_hotmail_received_headers($pms); return $pms->{hotmail_addr_with_forged_hotmail_received}; } # SEMIFORGED_HOTMAIL_RCVD sub check_for_no_hotmail_received_headers { my ($self, $pms) = @_; $self->_check_for_forged_hotmail_received_headers($pms); return $pms->{hotmail_addr_but_no_hotmail_received}; } # MSN_GROUPS sub check_for_msn_groups_headers { my ($self, $pms) = @_; return 0 unless ($pms->get('To') =~ /<(\S+)\@groups\.msn\.com>/i); my $listname = $1; # from Theo Van Dinter, see # http://www.hughes-family.org/bugzilla/show_bug.cgi?id=591 # Updated by DOS, based on messages from Bob Menschel, bug 4301 return 0 unless $pms->get('Received') =~ /from mail pickup service by ((?:p\d\d\.)groups\.msn\.com)\b/; my $server = $1; if ($listname =~ /^notifications$/) { return 0 unless $pms->get('Message-Id') =~ /^<\S+\@$server>/; } else { return 0 unless $pms->get('Message-Id') =~ /^<$listname-\S+\@groups\.msn\.com>/; return 0 unless $pms->get('EnvelopeFrom:addr') =~ /$listname-bounce\@groups\.msn\.com/; } return 1; # MSN Groups # Return-path: # Received: from groups.msn.com (tk2dcpuba02.msn.com [65.54.195.210]) by # dogma.slashnull.org (8.11.6/8.11.6) with ESMTP id g72K35v10457 for # ; Fri, 2 Aug 2002 21:03:05 +0100 # Received: from mail pickup service by groups.msn.com with Microsoft # SMTPSVC; Fri, 2 Aug 2002 13:01:30 -0700 # Message-id: # X-loop: notifications@groups.msn.com # Reply-to: "List Full Name" # To: "List Full Name" # Return-path: # Received: from p04.groups.msn.com ([65.54.195.216]) etc... # Received: from mail pickup service by p04.groups.msn.com with Microsoft SMTPSVC; # Thu, 5 May 2005 20:30:37 -0700 # X-Originating-Ip: 207.68.170.30 # From: =?iso-8859-1?B?IqSj4/D9pEbzeN9s9vLw6qQiIA==?= # To: "Managers of List Name" # Subject: =?iso-8859-1?Q?APPROVAL_NEEDED:_=A4=A3=E3=F0=FD=A4F=F3x=DFl?= # =?iso-8859-1?Q?=F6=F2=F0=EA=A4_applied_to_join_List_Name=2C?= # =?iso-8859-1?Q?_an_MSN_Group?= # Date: Thu, 5 May 2005 20:30:37 -0700 # MIME-Version: 1.0 # Content-Type: multipart/alternative; # boundary="----=_NextPart_000_333944_01C551B1.4BBA02B0" # X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4927.1200 # Message-ID: # Return-path: # Received: from [65.54.208.83] (helo=p05.groups.msn.com) etc... # Received: from mail pickup service by p05.groups.msn.com with Microsoft SMTPSVC; # Fri, 6 May 2005 14:59:25 -0700 # X-Originating-Ip: 207.68.170.30 # Message-Id: # Reply-To: "List Name" # From: "whoever" # To: "List Name" # Subject: whatever # Date: Fri, 6 May 2005 14:59:25 -0700 } ########################################################################### sub check_for_forged_eudoramail_received_headers { my ($self, $pms) = @_; my $from = $pms->get('From:addr'); if ($from !~ /eudoramail.com/) { return 0; } my $rcvd = $pms->get('Received'); $rcvd =~ s/\s+/ /gs; # just spaces, simplify the regexp my $ip = $pms->get('X-Sender-Ip'); my $IP_ADDRESS = IP_ADDRESS; if ($ip =~ /$IP_ADDRESS/) { $ip = 1; } else { $ip = 0; } # Eudoramail formats its received headers like this: # Received: from Unknown/Local ([?.?.?.?]) by shared1-mail.whowhere.com; # Thu Nov 29 13:44:25 2001 # Message-Id: # Organization: QUALCOMM Eudora Web-Mail (http://www.eudoramail.com:80) # X-Sender-Ip: 192.175.21.146 # X-Mailer: MailCity Service if ($self->gated_through_received_hdr_remover($pms)) { return 0; } if ($rcvd =~ /by \S*whowhere.com\;/ && $ip) { return 0; } return 1; } ########################################################################### sub check_for_forged_yahoo_received_headers { my ($self, $pms) = @_; my $from = $pms->get('From:addr'); if ($from !~ /yahoo\.com$/) { return 0; } my $rcvd = $pms->get('Received'); if ($pms->get("Resent-From") && $pms->get("Resent-To")) { my $xrcvd = $pms->get("X-Received"); $rcvd = $xrcvd if $xrcvd; } $rcvd =~ s/\s+/ /gs; # just spaces, simplify the regexp # not sure about this #if ($rcvd !~ /from \S*yahoo\.com/) { return 0; } if ($self->gated_through_received_hdr_remover($pms)) { return 0; } # bug 3740: ignore bounces from Yahoo!. only honoured if the # correct rDNS shows up in the trusted relay list, or first untrusted relay # # bug 4528: [ ip=68.142.202.54 rdns=mta122.mail.mud.yahoo.com # helo=mta122.mail.mud.yahoo.com by=eclectic.kluge.net ident= # envfrom= intl=0 id=49F2EAF13B auth= ] # if ($pms->{relays_trusted_str} =~ / rdns=\S+\.yahoo\.com / || $pms->{relays_untrusted_str} =~ /^[^\]]+ rdns=\S+\.yahoo\.com /) { return 0; } if ($rcvd =~ /by web\S+\.mail\S*\.yahoo\.com via HTTP/) { return 0; } if ($rcvd =~ /by smtp\S+\.yahoo\.com with SMTP/) { return 0; } my $IP_ADDRESS = IP_ADDRESS; if ($rcvd =~ /from \[$IP_ADDRESS\] by \S+\.(?:groups|scd|dcn)\.yahoo\.com with NNFMP/) { return 0; } # used in "forward this news item to a friend" links. There's no better # received hdrs to match on, unfortunately. I'm not sure if the next test is # still useful, as a result. # # search for msgid <20020929140301.451A92940A9@xent.com>, subject "Yahoo! # News Story - Top Stories", date Sep 29 2002 on # for an example. # if ($rcvd =~ /\bmailer\d+\.bulk\.scd\.yahoo\.com\b/ && $from =~ /\@reply\.yahoo\.com$/) { return 0; } if ($rcvd =~ /by \w+\.\w+\.yahoo\.com \(\d+\.\d+\.\d+\/\d+\.\d+\.\d+\)(?: with ESMTP)? id \w+/) { # possibly sent from "mail this story to a friend" return 0; } return 1; } sub check_for_forged_juno_received_headers { my ($self, $pms) = @_; my $from = $pms->get('From:addr'); if($from !~ /\bjuno.com/) { return 0; } if($self->gated_through_received_hdr_remover($pms)) { return 0; } my $xmailer = $pms->get('X-Mailer'); my $xorig = $pms->get('X-Originating-IP'); my $rcvd = $pms->get('Received'); my $IP_ADDRESS = IP_ADDRESS; if (!$xorig) { # New style Juno has no X-Originating-IP header, and other changes if($rcvd !~ /from.*\b(?:juno|untd)\.com.*[\[\(]$IP_ADDRESS[\]\)].*by/ && $rcvd !~ / cookie\.(?:juno|untd)\.com /) { return 1; } if($xmailer !~ /Juno /) { return 1; } } else { if($rcvd =~ /from.*\bmail\.com.*\[$IP_ADDRESS\].*by/) { if($xmailer !~ /\bmail\.com/) { return 1; } } elsif($rcvd =~ /from (webmail\S+\.untd\.com) \(\1 \[$IP_ADDRESS\]\) by/) { if($xmailer !~ /^Webmail Version \d/) { return 1; } } else { return 1; } if($xorig !~ /$IP_ADDRESS/) { return 1; } } return 0; } sub check_for_matching_env_and_hdr_from { my ($self, $pms) =@_; # two blank headers match so don't bother checking return (lc $pms->get('EnvelopeFrom:addr') eq lc $pms->get('From:addr')); } sub sorted_recipients { my ($self, $pms) = @_; if (!exists $pms->{tocc_sorted}) { $self->_check_recipients($pms); } return $pms->{tocc_sorted}; } sub similar_recipients { my ($self, $pms, $min, $max) = @_; if (!exists $pms->{tocc_similar}) { $self->_check_recipients($pms); } return (($min eq 'undef' || $pms->{tocc_similar} >= $min) && ($max eq 'undef' || $pms->{tocc_similar} < $max)); } # best experimentally derived values use constant TOCC_SORTED_COUNT => 7; use constant TOCC_SIMILAR_COUNT => 5; use constant TOCC_SIMILAR_LENGTH => 2; sub _check_recipients { my ($self, $pms) = @_; my @inputs; # ToCc: pseudo-header works best, but sometimes Bcc: is better for ('ToCc', 'Bcc') { my $to = $pms->get($_); # get recipients $to =~ s/\(.*?\)//g; # strip out the (comments) push(@inputs, ($to =~ m/([\w.=-]+\@\w+(?:[\w.-]+\.)+\w+)/g)); last if scalar(@inputs) >= TOCC_SIMILAR_COUNT; } # remove duplicate addresses only when they appear next to each other my @address; my $previous = ''; while (my $current = shift @inputs) { push(@address, ($previous = $current)) if lc($current) ne lc($previous); last if @address == 256; } # ideas that had both poor S/O ratios and poor hit rates: # - testing for reverse sorted recipient lists # - testing To: and Cc: headers separately $pms->{tocc_sorted} = (scalar(@address) >= TOCC_SORTED_COUNT && join(',', @address) eq (join(',', sort @address))); # a good S/O ratio and hit rate is achieved by comparing 2-byte # substrings and requiring 5 or more addresses $pms->{tocc_similar} = 0; if (scalar (@address) >= TOCC_SIMILAR_COUNT) { my @user = map { substr($_,0,TOCC_SIMILAR_LENGTH) } @address; my @fqhn = map { m/\@(.*)/ } @address; my @host = map { substr($_,0,TOCC_SIMILAR_LENGTH) } @fqhn; my $hits = 0; my $combinations = 0; for (my $i = 0; $i <= $#address; $i++) { for (my $j = $i+1; $j <= $#address; $j++) { $hits++ if $user[$i] eq $user[$j]; $hits++ if $host[$i] eq $host[$j] && $fqhn[$i] ne $fqhn[$j]; $combinations++; } } $pms->{tocc_similar} = $hits / $combinations; } } sub check_for_missing_to_header { my ($self, $pms) = @_; my $hdr = $pms->get('To'); $hdr ||= $pms->get('Apparently-To'); return 1 if ($hdr eq ''); return 0; } sub check_for_forged_gw05_received_headers { my ($self, $pms) = @_; local ($_); my $rcv = $pms->get('Received'); # e.g. # Received: from mail3.icytundra.com by gw05 with ESMTP; Thu, 21 Jun 2001 02:28:32 -0400 my ($h1, $h2) = ($rcv =~ m/\nfrom\s(\S+)\sby\s(\S+)\swith\sESMTP\;\s+\S\S\S,\s+\d+\s+\S\S\S\s+ \d{4}\s+\d\d:\d\d:\d\d\s+[-+]*\d{4}\n$/xs); if (defined ($h1) && defined ($h2) && $h2 !~ /\./) { return 1; } 0; } sub _check_for_round_the_world_received { my ($self, $pms) = @_; my ($relayer, $relayerip, $relay); $pms->{round_the_world_revdns} = 0; $pms->{round_the_world_helo} = 0; my $rcvd = $pms->get('Received'); my $IPV4_ADDRESS = IPV4_ADDRESS; # TODO: use new Received header parser # trad sendmail/postfix fmt: # Received: from hitower.parkgroup.ru (unknown [212.107.207.26]) by # mail.netnoteinc.com (Postfix) with ESMTP id B8CAC11410E for # ; Fri, 30 Nov 2001 02:42:05 +0000 (Eire) # Received: from fmx1.freemail.hu ([212.46.197.200]) by hitower.parkgroup.ru # (Lotus Domino Release 5.0.8) with ESMTP id 2001113008574773:260 ; # Fri, 30 Nov 2001 08:57:47 +1000 if ($rcvd =~ / \nfrom\b.{0,20}\s(\S+\.${CCTLDS_WITH_LOTS_OF_OPEN_RELAYS})\s\(.{0,200} \nfrom\b.{0,20}\s([-_A-Za-z0-9.]+)\s.{0,30}\[($IPV4_ADDRESS)\] /osix) { $relay = $1; $relayer = $2; $relayerip = $3; goto gotone; } return 0; gotone: my $revdns = $pms->lookup_ptr ($relayerip); if (!defined $revdns) { $revdns = '(unknown)'; } dbg("eval: round-the-world: mail relayed through $relay by ". "$relayerip (HELO $relayer, rev DNS says $revdns)"); if ($revdns =~ /\.${ROUND_THE_WORLD_RELAYERS}$/oi) { dbg("eval: round-the-world: yep, I think so (from rev dns)"); $pms->{round_the_world_revdns} = 1; return; } if ($relayer =~ /\.${ROUND_THE_WORLD_RELAYERS}$/oi) { dbg("eval: round-the-world: yep, I think so (from HELO)"); $pms->{round_the_world_helo} = 1; return; } dbg("eval: round-the-world: probably not"); return; } sub check_for_round_the_world_received_helo { my ($self, $pms) = @_; if (!defined $pms->{round_the_world_helo}) { $self->_check_for_round_the_world_received($pms); } if ($pms->{round_the_world_helo}) { return 1; } return 0; } sub check_for_round_the_world_received_revdns { my ($self, $pms) = @_; if (!defined $pms->{round_the_world_revdns}) { $self->_check_for_round_the_world_received($pms); } if ($pms->{round_the_world_revdns}) { return 1; } return 0; } ########################################################################### sub check_for_shifted_date { my ($self, $pms, $min, $max) = @_; if (!exists $pms->{date_diff}) { $self->_check_date_diff($pms); } return (($min eq 'undef' || $pms->{date_diff} >= (3600 * $min)) && ($max eq 'undef' || $pms->{date_diff} < (3600 * $max))); } # filters out some false positives in old corpus mail - Allen sub received_within_months { my ($self,$pms,$min,$max) = @_; if (!exists($pms->{date_received})) { $self->_check_date_received($pms); } my $diff = time() - $pms->{date_received}; # 365.2425 * 24 * 60 * 60 = 31556952 = seconds in year (including leap) if (((! defined($min)) || ($min eq 'undef') || ($diff >= (31556952 * ($min/12)))) && ((! defined($max)) || ($max eq 'undef') || ($diff < (31556952 * ($max/12))))) { return 1; } else { return 0; } } sub _get_date_header_time { my ($self, $pms) = @_; my $time; # a Resent-Date: header takes precedence over any Date: header DATE: for my $header ('Resent-Date', 'Date') { my @dates = $pms->{msg}->get_header($header); for my $date (@dates) { if (defined($date) && length($date)) { chomp($date); $time = Mail::SpamAssassin::Util::parse_rfc822_date($date); } last DATE if defined($time); } } if (defined($time)) { $pms->{date_header_time} = $time; } else { $pms->{date_header_time} = undef; } } sub _get_received_header_times { my ($self, $pms) = @_; $pms->{received_header_times} = [ () ]; $pms->{received_fetchmail_time} = undef; my (@received); my $received = $pms->get('Received'); if (defined($received) && length($received)) { @received = grep {$_ =~ m/\S/} (split(/\n/,$received)); } # if we have no Received: headers, chances are we're archived mail # with a limited set of headers if (!scalar(@received)) { return; } # handle fetchmail headers my (@local); if (($received[0] =~ m/\bfrom (?:localhost\s|(?:\S+ ){1,2}\S*\b127\.0\.0\.1\b)/) || ($received[0] =~ m/qmail \d+ invoked by uid \d+/)) { push @local, (shift @received); } if (scalar(@received) && ($received[0] =~ m/\bby localhost with \w+ \(fetchmail-[\d.]+/)) { push @local, (shift @received); } elsif (scalar(@local)) { unshift @received, (shift @local); } my $rcvd; if (scalar(@local)) { my (@fetchmail_times); foreach $rcvd (@local) { if ($rcvd =~ m/(\s.?\d+ \S\S\S \d+ \d+:\d+:\d+ \S+)/) { my $date = $1; dbg2("eval: trying Received fetchmail header date for real time: $date"); my $time = Mail::SpamAssassin::Util::parse_rfc822_date($date); if (defined($time) && (time() >= $time)) { dbg2("eval: time_t from date=$time, rcvd=$date"); push @fetchmail_times, $time; } } } if (scalar(@fetchmail_times) > 1) { $pms->{received_fetchmail_time} = (sort {$b <=> $a} (@fetchmail_times))[0]; } elsif (scalar(@fetchmail_times)) { $pms->{received_fetchmail_time} = $fetchmail_times[0]; } } my (@header_times); foreach $rcvd (@received) { if ($rcvd =~ m/(\s.?\d+ \S\S\S \d+ \d+:\d+:\d+ \S+)/) { my $date = $1; dbg2("eval: trying Received header date for real time: $date"); my $time = Mail::SpamAssassin::Util::parse_rfc822_date($date); if (defined($time)) { dbg2("eval: time_t from date=$time, rcvd=$date"); push @header_times, $time; } } } if (scalar(@header_times)) { $pms->{received_header_times} = [ @header_times ]; } else { dbg("eval: no dates found in Received headers"); } } sub _check_date_received { my ($self, $pms) = @_; my (@dates_poss); $pms->{date_received} = 0; if (!exists($pms->{date_header_time})) { $self->_get_date_header_time($pms); } if (defined($pms->{date_header_time})) { push @dates_poss, $pms->{date_header_time}; } if (!exists($pms->{received_header_times})) { $self->_get_received_header_times($pms); } my (@received_header_times) = @{ $pms->{received_header_times} }; if (scalar(@received_header_times)) { push @dates_poss, $received_header_times[0]; } if (defined($pms->{received_fetchmail_time})) { push @dates_poss, $pms->{received_fetchmail_time}; } if (defined($pms->{date_header_time}) && scalar(@received_header_times)) { if (!exists($pms->{date_diff})) { $self->_check_date_diff($pms); } push @dates_poss, $pms->{date_header_time} - $pms->{date_diff}; } if (scalar(@dates_poss)) { # use median $pms->{date_received} = (sort {$b <=> $a} (@dates_poss))[int($#dates_poss/2)]; dbg("eval: date chosen from message: " . scalar(localtime($pms->{date_received}))); } else { dbg("eval: no dates found in message"); } } sub _check_date_diff { my ($self, $pms) = @_; $pms->{date_diff} = 0; if (!exists($pms->{date_header_time})) { $self->_get_date_header_time($pms); } if (!defined($pms->{date_header_time})) { return; # already have tests for this } if (!exists($pms->{received_header_times})) { $self->_get_received_header_times($pms); } my (@header_times) = @{ $pms->{received_header_times} }; if (!scalar(@header_times)) { return; # archived mail? } my (@diffs) = map {$pms->{date_header_time} - $_} (@header_times); # if the last Received: header has no difference, then we choose to # exclude it if ($#diffs > 0 && $diffs[$#diffs] == 0) { pop(@diffs); } # use the date with the smallest absolute difference # (experimentally, this results in the fewest false positives) @diffs = sort { abs($a) <=> abs($b) } @diffs; $pms->{date_diff} = $diffs[0]; } sub subject_is_all_caps { my ($self, $pms) = @_; my $subject = $pms->get('Subject'); $subject =~ s/^\s+//; $subject =~ s/\s+$//; return 0 if $subject !~ /\s/; # don't match one word subjects return 0 if (length $subject < 10); # don't match short subjects $subject =~ s/[^a-zA-Z]//g; # only look at letters # now, check to see if the subject is encoded using a non-ASCII charset. # If so, punt on this test to avoid FPs. We just list the known charsets # this test will FP on, here. my $subjraw = $pms->get('Subject:raw'); my $CLTFAC = Mail::SpamAssassin::Constants::CHARSETS_LIKELY_TO_FP_AS_CAPS; if ($subjraw =~ /=\?${CLTFAC}\?/i) { return 0; } return length($subject) && ($subject eq uc($subject)); } sub check_for_to_in_subject { my ($self, $pms, $test) = @_; my $full_to = $pms->get('To:addr'); return 0 unless $full_to; my $subject = $pms->get('Subject'); if ($test eq "address") { return $subject =~ /\b\Q$full_to\E\b/i; # "user@domain.com" } elsif ($test eq "user") { my $to = $full_to; $to =~ s/\@.*//; my $subj = $subject; $subj =~ s/^\s+//; $subj =~ s/\s+$//; return $subject =~ /^(?: (?:re|fw):\s*(?:\w+\s+)?\Q$to\E$ |(?-i:\Q$to\E)\s*[,:;!?-](?:$|\s) |\Q$to\E$ |,\s*\Q$to\E[,:;!?-]$ )/ix; } return 0; } sub check_outlook_message_id { my ($self, $pms) = @_; local ($_); my $id = $pms->get('MESSAGEID'); return 0 if $id !~ /^<[0-9a-f]{4}([0-9a-f]{8})\$[0-9a-f]{8}\$[0-9a-f]{8}\@/; my $timetoken = hex($1); my $x = 0.0023283064365387; my $y = 27111902.8329849; my $fudge = 250; $_ = $pms->get('Date'); $_ = Mail::SpamAssassin::Util::parse_rfc822_date($_) || 0; my $expected = int (($_ * $x) + $y); my $diff = $timetoken - $expected; return 0 if (abs($diff) < $fudge); $_ = $pms->get('Received'); /(\s.?\d+ \S\S\S \d+ \d+:\d+:\d+ \S+).*?$/; $_ = Mail::SpamAssassin::Util::parse_rfc822_date($_) || 0; $expected = int(($_ * $x) + $y); $diff = $timetoken - $expected; return (abs($diff) >= $fudge); } sub check_messageid_not_usable { my ($self, $pms) = @_; local ($_); # Lyris eats message-ids. also some ezmlm, I think :( $_ = $pms->get("List-Unsubscribe"); return 1 if (/$/); # ezmlm again if($self->gated_through_received_hdr_remover($pms)) { return 1; } # Allen notes this as 'Wacky sendmail version?' $_ = $pms->get("Received"); return 1 if /\/CWT\/DCE\)/; # Apr 2 2003 jm: iPlanet rewrites lots of stuff, including Message-IDs return 1 if /iPlanet Messaging Server/; return 0; } # Return true if the count of $hdr headers are within the given range sub check_header_count_range { my ($self, $pms, $hdr, $min, $max) = @_; my %uniq = (); my @hdrs = grep(!$uniq{$_}++, $pms->{msg}->get_header ($hdr)); return (scalar @hdrs >= $min && scalar @hdrs <= $max); } sub check_unresolved_template { my ($self, $pms) = @_; my $all = $pms->get('ALL'); # cached access $all =~ s/\n[ \t]+/ /gs; # fix continuation lines for my $header (split(/\n/, $all)) { # slightly faster to test in this order if ($header =~ /%[A-Z][A-Z_-]/ && $header !~ /^(?:X-UIDL|X-Face|To|Cc|From|Subject|References|In-Reply-To|(?:X-|Resent-|X-Original-)?Message-Id):/i) { return 1; } } return 0; } sub check_ratware_name_id { my ($self, $pms) = @_; my $mid = $pms->get('MESSAGEID'); my $from = $pms->get('From'); if ($mid =~ m/<[A-Z]{28}\.([^>]+?)>/) { if ($from =~ m/\"[^\"]+\"\s*<\Q$1\E>/) { return 1; } } return 0; } sub check_ratware_envelope_from { my ($self, $pms) = @_; my $to = $pms->get('To:addr'); my $from = $pms->get('EnvelopeFrom:addr'); return 0 unless ($to && $from); return 0 if ($from =~ /^SRS\d=/); if ($to =~ /^([^@]+)@(.+)$/) { my($user,$dom) = ($1,$2); $dom = Mail::SpamAssassin::Util::RegistrarBoundaries::trim_domain($dom); return unless (Mail::SpamAssassin::Util::RegistrarBoundaries::is_domain_valid($dom)); return 1 if ($from =~ /\b\Q$dom\E.\Q$user\E@/i); } return 0; } ########################################################################### # support eval-test verbose debugs using "-Deval" sub dbg2 { if (would_log('dbg', 'eval') == 2) { dbg(@_); } } 1;