Path: senator-bedfellow.mit.edu!dreaderd!not-for-mail
Message-ID: <mail/[email protected]>
Supersedes: <mail/[email protected]>
Expires: 23 Sep 2000 10:22:02 GMT
X-Last-Updated: 1999/04/28
Organization: none
From: <[email protected]> (Jari Aalto+mail.procmail)
Subject: anti-UBE resources pointer
Summary: This post contains exepts from Procmail Tips page at
 where many of Spam/UBE fighting tools and urls pointers are listed.
 Authors homepage at http://poboxes.com/jari.aalto/
Newsgroups: comp.mail.misc,comp.answers,news.answers
Approved: [email protected]
Followup-To: poster
Precedence: bulk
Originator: [email protected]
Date: 25 Aug 2000 10:23:20 GMT
Lines: 769
NNTP-Posting-Host: penguin-lust.mit.edu
X-Trace: dreaderd 967199000 9441 18.181.0.29
Xref: senator-bedfellow.mit.edu comp.mail.misc:56691 comp.answers:42068 news.answers:190496

Archive-name: mail/anti-ube-pointer
Posting-Frequency: 2 times a month
Maintainer: Jari Aalto <[email protected]>

Announcement: "Anti-UBE pointers"

       Last updated: 1999-04-21 v1.72 pm-tips.txt

       Faq archive is at

               http://www.faqs.org/faqs/

       This message is an except of bigger procmail document at:

               http://www.procmail.org/jari/pm-tips.txt

       There are two highly recommended software that you should check if
       you're serious about taking actions agains UBE:

       o   `rblcheck' which has proven to be very efficient, fast and system
           load friendly for ISPs that filter mail at MTA level.
       o   `Ricochet' which is a Perl program that examines
           the headers to find out right complaint destinations. You no longer
           need to be a Email header expert to understand how the headers have
           been forged.

3.0 Anti-UBE pointers

   3.1 NoCEM, CAUCE and others

      "NoCEM"
       http://www.cm.org/

      "Dougal's NoCeM-E"
       http://advicom.net/~dougal/antispam/
       ... Dougal is sysadm for an ISP. His page has wealth of information
       about Anti-SPAM Tools. You also find his mailing list for NoCeM-E.

      "The Coalition Against Unsolicited Commercial Email (CAUCE)"
       http://www.cauce.org/faq.html
       ...The Problem: Unsolicited commercial email, more commonly known as
       "spam", is a growing problem on the Internet. If you've used the
       Internet for any length of time, you've probably received
       solicitations via email to purchase products or services.

       A Solution: A group of Internet users who are fed up with spam have
       formed a coalition whose purpose is to amend 47 USC 227, the
       section of U.S. law that bans "junk faxing", so that it will cover
       electronic mail as well.

      "Teergrubing against Spam"
       http://www.iks-jena.de/mitarb/lutz/usenet/teergrube.en.html
       ...`Teergrubing' It's German and means Tar-Pit. Once you have been
       stuck you can't get out. ...slow down internet connections in order
       to stop UBE abuse. Several hundred teergrubes are able to block
       spamming worldwide without blocking any e-mail. How do I start: If
       you are the admin of a MX host, install a teergrube.

      "Obtuse smtpd for SCO MMDF and useful anti-SPAM links"
       Main (configurable) features:

       o   deny unauthorized relay (no more relay rape!)
       o   permit selective relay exceptions (eg. UUCP downstream)
       o   regex() filtering [block those spamming dialins!]
       o   deny access for no MX, no PTR, etc.
       o   defeat % hack
       o   support MAPS, ORBS, DUL, IMRSS, etc RBLs plus your local RBL
       o   support exception list for domains for which you will accept mail
       o   support selective tarpit'ing on refused connections
       o   individually configurable rejection messages
       o   precedence and override ordering
       o   informative log summary scripts

      "Lot of good articles about spam"
       http://www.sun.com/sunworldonline/swol-12-1997/swol-12-spam.html

       "(anti-spam Law) US Representative Chris Smith's statement on junk
       e-mail"
       http://www.sun.com/sunworldonline/swol-08-1997/swol-08-junkemail.html
       ...considerable variation in the approaches at the federal level,
       and state legislation varies widely as well. Professor David Sorkin
       of John Marshall Law School, who summarized and provided links to
       the major spam-related lawsuits noted above, also provides status
       summaries and links to state and federal legislation

       ...State of Washington just passed an anti-spambill
       <URL:http://www.leg.wa.gov/cgi-bin/print_hit_bold.pl/pub/billinfo/
       house/2750-2774/2752-s_pl_030798?unsolicited>

      "Select email court cases -- Lots of them"
       http://www.jmls.edu/cyber/cases/spam.html
       America Online, Inc. v. Cyber Promotions, Inc.,
       Compuserve Inc. v. Cyber Promotions, Inc., etc.

      "Anti-Spam Directory of Information and Resources"
       http://www.ao.net/waytosuccess/nospam.html
      "Forum for Responsible and Ethical E-mail (FREE)"
       http://www.ybecker.net/

      "Ethical Marketing Using FREE Resources"
       http://www.ao.net/waytosuccess/index.html

   3.2 General Filtering pages (more than procmail)

      "Nancy McGough - Mail Filtering FAQ"
       http://ssil.uoregon.edu/~trenton/autopage/page7547.html
       http://www.ii.com/internet/faqs/launchers/mail/filtering-faq/

      "Information Filtering Resources"
       http://www.ee.umd.edu/medlab/filter/ Doug Oard <[email protected]>
       ...This page lists all known internet-accessible information
       filtering resources.

   3.3 Junk email and spam

      "Spam FAQ"
       ftp://rtfm.mit.edu/pub/usenet/alt.spam/
       http://www.cs.ruu.nl/wais/html/na-dir/net-abuse-faq/spam-faq.html

      "Spam FAQ for beginners -- Regular posting at news.admin.net-abuse.misc"
       http://www.tezcat.com/~gbyshenk/ive.been.spammed.html

      "The email abuse FAQ"
       http://members.aol.com/emailfaq/emailfaq.html
       What is UBE, UCE, EMP, MMF, MLM, Spam, it is all explained here.

      "Get that spammer"
       http://kryten.eng.monash.edu.au/gspam.html
       ...All about Spam; traceroute, netabuse etc. Full of links and docs"

      "Advertising on Usenet: How To Do It, How Not To Do It"
       ftp://rtfm.mit.edu/pub/usenet/advertising/

      "Dealing with Junk Email"
       http://www.mcs.com/~jcr/junkemaildeal.html
       ...What you should do (and not do) when you have been victimized by
       a junk emailer. This document teaches you how to read headers in
       order to trace the origin of junk email, and includes detailed
       examples to show you how it is done. Headers are designed for
       computers to read, not people, so they can be a little hard to
       follow. Therefore, I hereby grant permission to print or
       electronically save a copy of this page on your local machine for
       your personal use while tracing junk email. Please check back for
       updates and corrections, though.

       o   What Not To Do: Stuff that doesn't work
       o   What to do: effective techniques, including how to trace junk
           email back to its source
       o   Stay Calm (take a deep breath...)
       o   Stay Mad (don't get discouraged)
       o   How to identify the sender and who gives them Internet access
       o   Who to complain to, abuse addresses, online services
       o   What to say and how to say it, effective complaining

      "How to fight back."
       http://www.oeonline.com/~edog/spamstop.html

       .   Look at the header of the advertising message. Find the
           "Message-ID" line. (You might have to tell your e-mail program to
           display this.)
       .   The words after the @ sign are the sender's real--not
           faked--Internet Service Provider, or ISP. (Spammers often try to
           disguise their address, but the Message-ID is a good clue.)
       .   Write a complaint to the postmaster of that ISP, similar to the
           one below. (If the ISP is junkmail.com, then let
           [email protected] hear from you.)

      "Practical Tools to Boycott Spam"
       http://spam.abuse.net/spam/
       ...We have been actively engaged in fighting spam for years. Recent
       events, including pending court battles, prompt us to present this
       page to the public. Fight spam to keep the Internet useful for
       everyone.

       o   Filtering mail to your personal account
       o   Blocking spam email for an entire site
       o   Blocking Usenet spam for an entire site
       o   Blocking IP connectivity from spam sites
       o   Other tools and techniques for limiting spam
       o   Sample Acceptable Use Policy statements for ISPs

      "Spam -- stop that!"
       http://com.primenet.com/spamking/buyerbeware.html

      "The Campaign to stop junk email web site"
       http://www.mcs.com/~jcr/junkmail.html
       ...we will attempt to teach victims and potential victims (that's
       everyone with an email address) the most effective methods of
       prevention and retribution.

      "news.admin.net-abuse.* Homepage"
       http://www.math.uiuc.edu/~tskirvin/home/nana/

      "The automated spamhandler beta information heap."
       http://www.halcyon.com/natew/

      "Preventing relaying in Sendmail"
       ...This package adds two independent features to sendmail,
       access control and relay control. They will be described here
       simultaneously, but you can elect to include support for only one
       of them (either one) on your mail server. Access control lets you
       deny access to the server based on the senders envelope address or
       his IP address. Relay control lets you decide who gets to relay
       email through your server.
       ftp://ftp.xyzzy.no/sendmail/access.tar.Z

      "Anti-Spam Provisions in Sendmail 8.8"
       http://www.sendmail.org/antispam.html
       http://maps.vix.com/tsi/
       http://www.informatik.uni-kiel.de/%7Eca/email/check.html#check_rcpt

       o   Preventing relaying through your SMTP port
       o   Refuse mail from selected hosts
       o   Restrict mail acceptance from certain users to avoid mailbombing

       [1998-06-15 PM-L walter] Somebody's starting to exploit a hole in
       sendmail 8.8, where giving a HELO longer than 1024 bytes causes
       buffer overflow, and all following "Received:" headers are lost. If
       it's done off a relay, we have no clue who sent it. There may be a
       more elegant solution, but here's a quick-n-dirty procmail filter
       for this stunt...

      "Blocking Email"
       http://www.nepean.uws.edu.au/users/david/pe/blockmail.html

       o   Do you or your users, receive "junk email" (aka., "spam")
       o   Do you have Sendmail R8.8.5 running at your site?
       o   Would you like to block known "junk email" senders' addresses?

       Now you can - and there's no need to patch any source code, either.
       Take advantage of Sendmail's check_mail rule, to see if the
       sender's address is a member of a nominated "class" - drawn from
       the contents of the named file. Additional information and links:

       o   Prospective Addresses/Domains to Block
       o   Limiting Unsolicited Commercial Email
       o   EFF "Net Abuse and Spamming" Archive
       o   [U.S.] Court Lets AOL Block Email
       o   Anti-Spam HOWTO
       o   Net Abuse FAQ
       o   Figuring out Fake Email & Posts
       o   Fight Unwanted Email
       o   Unsolicited Junk Email - Bad for Business
       o   Fight Unsolicited Email and Mailing
       o   Yahoo's Junk Email Resources
       o   jmfilter
       o   Complaints Addresses at U.S. ISPs
       o   news.admin.net-abuse.* Homepage
       o   Processing Mail With ProcMail
       o   Panix's rc.shared ProcMail Configuration
       o   ProcMail Workshop
       o   Email Self Defence
       o   The SPAM-L mailing list

      "US Federal Trade Commission"
       http://www.ftc.gov/
       ...staff publicized the Commission's UCE mailbox, "[email protected],"
       and invited consumers to forward their UCE to it. spam complaints
       <[email protected]>

      "Spam Spade Web based tracking tool"
       http://www.blighty.com/
       ...Figuring out forged headers and verifying IP addresses and
       whois information.

      "Misc"
       http://www.junkbusters.com/
       http://www.well.com/~jbremson/spam
       http://www.wolfenet.com/~jhardin/procmail-security.html

   3.4 Comprehensive list of spammers

      "Against Spam -- The garbage collecting."
       http://www.spam-archive.org/
       To support this archive please forward email spam to
       <[email protected]>. Everybody is invited to bounce Mail-Spam
       he/she has got to this list. This is a mailing list to distribute
       actual spam-eMail. All incoming mail will be checked by subject and
       from/sender-address wether it has already been distributed or not.
       No discussions in this list. To discuss about this list please
       subscribe to <[email protected]>.

       To subscribe to _blacklist-update_  mailing list
       TO:   <[email protected]>
       BODY: subscribe blacklist-update [email protected]
       Mail <[email protected]> to discuss about blacklist if
       your name is on it. (maintained by Axel Zinser <[email protected]>)
       Get the updated blacklist from
       ftp://ftp.spam-archive.org/spam/blacklist/

   3.5 Misc pointers

         Is there a way to block local users from spamming other sites?
         Maybe somehow force sentmail to read a rc file that would maybe
         then grab the from field and see if the user exists on the system
         or not. Or run it through some sort of filters.

       [philip] You can and should do this purely in sendmail. I ended up
       crafting a check_from ruleset that verifies that the envelope
       sender address is either a) not local; b) a local user; or c) a
       local alias. At the time I did this mainly to force people to
       configure their Eudora clients so they didn't say "Return Address:
       [email protected]" but it also covers the outgoing bogus source
       address spam case. For those interested in this kinda thing I've
       (just) put it up for FTP:

           ftp://ftp.gac.edu/pub/guenther/

      "IBM's Secure Mailer -- open source"
       http://www.postfix.org/

         [1998-12-15 PM-L Matthew McGehrin <[email protected]>] The
         official project is known as 'IBM's Secure Mailer'. The
         unofficial codename was Vmailer, but they had to rename that, to
         Postfix to agree with the lawyers. I should know, I have been
         alpha testing this mailer for the past year, and it so blazing
         fast, its amazing. It's faster and simplier to use than sendmail,
         and also faster and more secure than qmail. It works fine with
         procmail. (look in my headers). set
         "mailbox_command=/usr/bin/procmail" in /etc/postfix/main.cf

         [1998-12-15 PM-L Liviu Daia <[email protected]>] it has
         explicit hooks for both procmail and RBL. In fact it's incredibly
         easy to setup, I got it compiled and configured (with an actually
         usable configuration) in about 15 minutes after downloading it.
         Adding masquerading and a virtual domain took another 2 minutes.
         :-) You should really give it a try, it's faster than QMail and
         _much_ faster than sendmail. So far, I'm quite impressed.

      "Qmail"
       http://pobox.com/~djb/qmail.html
       http://www.qmail.org/

      "Sendmail"
       http://www.sendmail.org/

      "Fetchmail -- old pop3 replacement"
       ftp://ftp.ccil.org/pub/esr/
       http://www.ccil.org/~esr/
       http://www.tuxedo.org/~esr/fetchmail/

      "Maildrop filter utility"
       http://www.geocities.com/SiliconValley/Peaks/5799/maildrop.README.html
       ...Alternative to procmail

      "Lua"
       http://www.tecgraf.puc-rio.br/lua/ <[email protected]>
       [possible replacement for procmail language] ... *Lua* is a
       programming language originally designed for extending
       applications, but also frequently used as a general-purpose,
       stand-alone language. Lua combines simple procedural syntax
       (similar to Pascal) with powerful data description constructs based
       on associative arrays and extensible semantics. Lua is dynamically
       typed, interpreted from bytecodes, and has automatic memory
       management with garbage collection, making it ideal for
       configuration, scripting, and rapid prototyping.

   3.6 Questionable UBE stop services

      "IEMMC: Internet E-Mail Marketing Council Formed 1997-03"

       The IEMMC was formed to provide an industry wide trade association
       for the purpose of promoting responsible e-mail marketing, and to
       establish an industry standard code of procedures and ethics which
       will internally regulate and govern the commercial e-mail marketing
       industry....Under this system, all e-mail of a commercial,
       unsolicited nature must pass through a universal filtration system
       which will block the sending of any and all commercial e-mail to the
       address on the list. Bulk e-mailers will be required to join the
       organization

       Others have commented that:

         ...IEMMC is a joke. you are probably not doing yourself any favors

         ...Don't take that IEMMC seriously! Many people registered with
         them and got as many or even more spam as before. After all,
         Cyberpromo (the operator of IEMMC) knows that the registered
         addresses will be valid for some time, so they can use and sell
         this valuable list to other junk mailers.

      "Spammer blacklist"
       http://www.netchem.com
       ...<[email protected]> Dear Sir/Madam, Your email address may be on
       many spammers' lists. We are compiling a *remove* list. Forward the
       original junk to <[email protected]>

      "No Junk E-Mail database"
       http://pages.ripco.com:8080/~glr/nojunk.html
       ...We will help stop unwanted email to you..the list is submitted to
       us, and those addresses that appear in the "do not mail" list are
       removed and the "cleaned" list is returned

   3.7 UBE related newsgroups or mailing lists

       alt.kill.spammers
       alt.hackers.malicous
       alt.2600

       [1997-08-13 alt.privacy.anon-server by anonymous poster] Proper
       etiquette demands you contact their ISP. However, if the ISP are
       not interested in helping you, you should consider a posting in
       alt.kill.spammers (or even alt.hackers.malicous or alt.2600) - give
       as many details as you can about the spammer.

       A certain spam-provider targeted the alt.hackers.malicious
       newsgroup. Not the most sensible thing to do. The ISPs IPs were
       found, their MX host was hacked. All their DNS entries was
       published on alt.2600 (so that everyone could add filters to ignore
       all mail from this company). Oh yeah, their password file also made
       it to the group! The ISP then posted a complaint to alt.2600, much
       to the enjoyment of everyone who took part. That host basically
       died a horrible death. I'm pretty sure that not many people are
       going to lose any sleep over this! I might as well mention that the
       ISPs complaint mentioned that their "freedom" was being
       abused. hehehe. I wouldn't have thought that most of these postings
       have expired, so I'd recommend a fleeting visit to alt.2600.

      "SPAM-L mailing list and Doug Muth's Page"
       http://www.claws-and-paws.com/spam-l/
       ... "The SPAM-L FAQ" - A FAQ for SPAM-L, an anti-spam mailing list.
       This FAQ discusses how to join the list and what to post there, AND
       it also delves into the technical aspects of spam. For instance,
       the various kinds of forgeries seen in spams are discussed here,
       along with information on how to recognise them. If you hate spam,
       this is something worth checking out... "TheGoodsites List" - I
       maintain this list, which is part of the Spam Boycott, to show
       which Internet providers out there act responsibly when dealing
       with spam. If you're looking for an ISP and want to know where they
       stand on spam, this is the list for you.

       Send an email message to <[email protected]>
       with the words "subscribe SPAM-L <First name> <Last name>" in the
       body of the message (no quotes). f you would like to contact the
       owner, the convention is the same as with all listserv lists. Just
       send e-mail to <[email protected]>

   3.8 Software: Ricochet -- Perl Automatic agent for reporting junk email

       http://www.vipul.net/ricochet/
       <[email protected]> Vipul Ved Prakash

       A lot of unsolicited email goes unreported because tracing the
       origins of a possibly forged mail and finding the right people to
       report to, is complicated and time-consuming. Ricochet, a smart net
       agent, automates this process. It traces the names and add resses
       of the systems where the spam originated from along with the
       servers that provide domain name resolution services to these
       systems (in most cases their ISPs). Then it collects/generates a
       list of email addresses of tech/billing/admin/abuse contacts of
       these system and mails them a complaint and a copy of the spam.
       Detailed description of its workings can be found in the README
       file that comes with the package.

   3.9 Software: yell -- perl

       ftp://ftp.netcom.com/pub/bo/bobmacd/yell  (57k)
       Bob MacDowell <[email protected]>

       yell - auto-responds to "spam" e-mail. Scans for site names, e-mail
       addresses and Web site names and sends appropriate messages to
       users, postmasters and Webmasters.

   3.10 Software: RBL lookup tool -- C

       [1997-12-04 PM-L Edward S. Marshall <[email protected]>]

         ...rblcheck is a lightweight C program for doing checks against
         Paul Vixie's Blackhole List. It works well in conjunction with
         Procmail for filtering unwanted bulk email (under QMail, for
         example, you can invoke it with the value of the environment
         variable TCPREMOTEIP). rblcheck is extremely simple:

           % rblcheck 1.2.3.4

         where 1.2.3.4 is the IP address you want to check.

       This is a quick note to announce the availability of a new tool for
       using Paul Vixie's RBL blacklist (see http://maps.vix.com/rbl/ for
       more information about the blacklist itself, if you don't already
       know). Most tools which use the blacklist block email on a
       site-wide basis. For many networks, this treads on both the ideals
       of the administration, and on the perceived freedoms of the end
       user.

       Personally, I don't care either way. :-)

       This tool was to fill the need I had to reject mail personally,
       since one of the systems I receive mail through cannot, for various
       political reasons, implement the available RBL filters on a
       site-wide basis.

       rblcheck is a simple tool meant to be used from procmail and
       other personal filtering systems under UNIX in the absence of a
       site-wide filter, as an alternative to imposing site-wide
       restrictions, or as a means of imposing restrictions on systems
       that cannot support the existing RBL filter patches.

       Simply put: you hand it an IP address, and it determines if the IP
       is in the RBL filter, providing the caller with a positive or
       negative response. With the package, a sample procmail recipe is
       provided, and examples of using it under QMail and Sendmail are
       given.

       .http://maps.vix.com/rbl/
       .http://www.isc.org/bind.html            The official home page
       .http://www.xnet.com/~emarshal/rblcheck/

       It is only tested under Linux 2.x and Solaris 2.5.1. Success
       stories, patches, questions, suggestions, and flames can be
       directed to me at <[email protected]>.

       [PM-L Aaron Schrab <[email protected]>] Here is my rbl
       setup, but, this depends both upon the format of the Received:
       lines, and the way that mail passes through your mail system.

       I currently grab the IP address from the first Received: header
       inserted by my ISP (I'm a sysadmin at the ISP, so I have a good
       knowledge of how mail gets passed around internally). Here's the
       recipe that I use.

           # if there's a Received: header from one of these servers, it's
           # (probably) the right one

           BACKUPSERVER    = "([yz]\.mx\.execpc\.com)"
           VIRTSERVER      = "(vm[0-9]+\.mx\.execpc\.com)"
           LOCALSERVER     = "([abc]\.mx\.execpc\.com)"

           # Match a header containing:
           #   Received: <anything> [<ip address>]) by <local server>

           :0
           * $ $SUPREME^0 ^Received:.*\[\/[0-9.]+\]\)$s+by$s+${BACKUPSERVER}
           * $ $SUPREME^0 ^Received:.*\[\/[0-9.]+\]\)$s+by$s+${VIRTSERVER}
           * $ $SUPREME^0 ^Received:.*\[\/[0-9.]+\]\)$s+by$s+${LOCALSERVER}
           {
               IP = $MATCH

               # trim it down to just the IP address

               :0
               * IP ?? ^^\/[0-9.]+
               {
                   IP = $MATCH

                   :0 W
                   * ! ? /home/aarons/bin/rblcheck -q $IP
                   {
                       SPAM = "$SPAM $IP is rbl'd$NL"
                   }
               }
           }

         It seems to be a procmail issue with letting the IP info
         from sendmail pass through to the rblcheck program. I have not
         been able to find anyone using rblcheck successfully with
         procmail as a delivery agent...

       [1998-03-26 PM-L Edward S. Marshall <[email protected]> ] This is a
       standard problem; you should be able to change the invocation of
       procmail the same way as the example (run env, which in turn runs
       procmail). Make sure that there is a '-p' argument passed to
       procmail; this preserves the environment you're constructing with
       env (newer sendmail revisions sanitize the environment for you, so
       that's not really an issue).

       If you're still having troubles, make sure you're using the latest
       incarnation of rblcheck, with the latest supplied procmail recipe;
       earlier revisions had rather insidious bugs.

       [1998-03-26 PM-L Xavier Beaudouin (kiwi) <[email protected]>] Also it
       seems that sendmail 8.9.0Beta3 have builtins rules for
       rbl.maps.vix.com. This is somewhat really efficient. I use it with
       sendmail 8.8.8 and tcpwrapper every days and there is about 80%
       spam rejected. Sounds very good. In your /etc/hosts.allow just add
       the following lines :

           sendmail: ALL: spawn /usr/local/bin/rblcheck -q %a && \
                       exec /usr/sbin/sendmail -bs || /bin/echo \\
             "469 Connection refused. You are in my Black List !!!\r\b\r\n"
             && \
             (safe_finger -l @%h 2>&1 | /bin/mail -s "%d-%h %u" root)

       In your /etc/inetd.conf just add this line :

           smtp stream tcp nowait root  /usr/sbin/tcpd  \
                /usr/sbin/sendmail  -bs

       And check that your sendmail is _not_ working as a daemon. That's
       all Also if you have huge queue you can add a /usr/sbin/sendmail -q
       in the root crontab... This should help to send some waiting
       messages. It think we can use this to wait for official 8.9.0
       sendmail since there is some cf/feature/rbl.m4 there.

       [timothy] ...I think there's a much more efficient way to do
       this: you can compile sendmail -DTCPWRAPPERS and let it run as a
       daemon

   3.11 Software: mapSoN

         Note: You can do exactly the same as below with procmail with one
         of the listed procmail modules: pm-jacookie.rc. See the code.

      "mapSoN (NoSpam backwards) -- The no spam utility"
       http://mapson.gmd.de/
       ftp://ftp.gmd.de/gmd/mapson/

       Most spam filtering tools I've seen so far are based on procmail, or
       a similar tool, and use a list of keywords or addresses to drop
       unwanted junk mail. While this might be nice to filter mail from
       known spam domains like "cyberpromo.com", it won't catch faked
       headers.

       mapSoN must be installed as filter program for your incoming mail,
       usually by adding an appropriate entry to your $HOME/.forward file.
       This means that mapSoN will get all your incoming mail and it will
       decide whether or not to actually deliver it to your mailbox.

       .   First of all, an user defined ruleset is checked against the
           mail. If any keywords or patterns match, the mail will be dealt
           with according to your wishes. This is useful to drop some
           sender's mail completely, or to sort mail into different mail
           folders.
       o   If no rule matches the mail, mapSoN will check whether the mail
           is a reply to an e-mail you sent, or whether it is a reply to a
           USENET posting of yours. If it is, the mail will always be
           delivered.
       o   If no signs of a reply-mail can be found, mapSoN will check
           whether the sender stated in the From: header has sent you mail
           before. If he has, the mail will pass. If this is the first time
           you receive an e-mail from this address, though, mapSoN will
           delay the delivery of the mail and spool it in your home
           directory. Then it will send a short notice to the address the
           mail comes from, which may look like this:

           From: Peter Simons <[email protected]>
           To: [email protected]
           Subject: [mapSoN] Request for Confirmation

           mapSoN-Confirm-Cookie: <some_weird_cryptographic_cookie>

       The person who tried to contact you will then reply to this
       "request for confirmation", citing the cookie stated in the mail.
       When your mapSoN receives this confirmation mail, it will deliver
       the spooled mail into your folder. Furthermore, the address will be
       added to the database, so that mail from this person will pass
       directly in future.

       If no confirmation mail arrives within a certain time, mapSoN can
       either delete the spooled mails, or send them to a special folder,
       or whatever you prefer.

   3.12 Software: spamgard

       [similar to MapSon]
       ftp://ftp.netcom.com/pub/wj/wje/release/sg-howto

       ...sppamgard(tm) screens from your e-mail unsolicited bulk mail. It
       does this in a way that you only have to change things if you have
       a new person from whom you _do_ want to receive mail; you don't
       have to change things every time a spamster thinks of a new trick
       to pull, or a new spamster comes along. And spamgard(tm) is
       designed so that those who aren't in your "Good Guys" list can get
       mail to you anyway until you put them there. The instructions for
       them to get mail to you are simple and newbie-tested, but will
       still keep out bulk mail. If you're on a mailing list you _want_ to
       be on, there are provisions for accepting all mail from a set of
       mailing lists that you specify.

   3.13 Software: Spam Be Gone

      "Spam Be Gone"
       http://www.internz.com/SpamBeGone/
       ...uses machine learning and artificial intelligence technologies
       to examine incoming mail messages and determine their
       priority... is more than just a Spam filter, it's a general purpose
       mail message prioritiser. You train the system, telling it which
       are good, and which are bad messages. As Spam Be Gone! learns it
       becomes customised for each individual user.

        PM-L W. Wesley Groleau <[email protected]> comments:

         .> They only distribute binaries, and I'm paranoid. Anyone able to
         .> convince me it's not really a Trojan Horse to collect addresses of
         .> spam-haters or something even worse?

         I did some sleuthing. I am 95% convinced that SpamBeGone is not
         a front or cover for any spammer(s). To protect the author's
         privacy, I won't say why I'm convinced or how I got the info.
         Sorry. If you're paranoid like me, you'll have to do your own
         sleuthing before you use it.

         I'm also convinced SpamBeGone's theory is sound. I won't judge
         the implementation until I've used it for a while.

        PM-L R Lindberg & E Winnie <[email protected]> comments:

         I have to agree with the recent comments about Spam Be Gone, I
         found it tends to be inaccurate. I first set it up about a week
         ago, followed the directions and trained it on several (15 to 20)
         messages. One from each list we get, and the remainder from my
         logs of SPAM messages.

         The first day it missed about half the SPAM, and nailed about 1/3
         of the real messages. So I tuned the key-words a bit, trained it
         on about 100 more SPAMs and trained it on all the good messages
         it nailed. Since then it has nailed every SPAM received, however
         the second day it nailed about 20% of the good messages, which I
         then trained it to like. Since then it has been nailing about
         10% of the good messages, despite continual training. I also
         added every list to the address book, and it still nails posts
         from this list, and my wife's lace list.

         I even went through my entire log of SPAM and trained it on every
         one that didn't come out a 5 (bad). Being the kind of person I
         am, I also checked after I trained it, and found four SPAMs, the
         despite my training it that they were bad (5) came out as not so
         bad (4). I don't dare kill 4's as far too much of my mail (like
         this list) ends up as 4's.

         For me, this program is not ready for prime time. If the comments
         are correct that it only learns on Subject and From headers, it's
         not even worth trying. Since lists use the TO and CC headers to
         be identified, and there are several excellent other headers
         (X-Advertisement comes to mind) that would be assests for killing
         SPAM.

   3.14 Software: ifile - Perl

       http://www.cs.cmu.edu/~jr6b/ifile/
       Jason Daniel Rennie <[email protected]>

       ...ifile is different from other mail filtering programs in
       three major ways: 1) ifile does not require you to generate a set
       of rules in order to successfully filter mail 2) ifile uses the
       entire content of messages for filtering purposes 3) ifile learns
       as you move incorrectly filtered messages to new mailboxes ifile is
       not dependent upon any specific mail system and should be adaptable
       to any mail system which allows an outside program to perform mail
       filtering. Currently, ifile has been adapted to the MH and EXMH
       mail systems.

   3.15 Software: ClearMail

       http://www.clearmail.com/ 1998-08-27
       Scott R Carter <[email protected]>

       ClearMail offers individuals some very strong control over spam
       through a quite unique concept. The software includes Procmail,
       Perl and C code. System Requirements include:

       ClearMail helps to control spam by allowing a user to classify
       e-mail as high or low priority based on an Address Book or "White
       List" of known senders. Unknown senders can also send high priority
       mail by including a special Mail Key (token) in their message
       (initial message from unknown sender without valid Key results in a
       bounceback message with instructions).

       What's makes ClearMail different from similar concepts is that
       spammers are not able to obtain the Mail Key to bypass the system
       because it is conveyed as an image.

       o   Unix operating system
       o   Shell accounts for users
       o   Individual .forward, .procmailrc files
       o   Sendmail
       o   Procmail
       o   Perl
       o   Public Web server