Return-Path: X-Original-To: apmail-spamassassin-users-archive@www.apache.org Delivered-To: apmail-spamassassin-users-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 39FD74533 for ; Wed, 29 Jun 2011 19:04:25 +0000 (UTC) Received: (qmail 77466 invoked by uid 500); 29 Jun 2011 19:04:22 -0000 Delivered-To: apmail-spamassassin-users-archive@spamassassin.apache.org Received: (qmail 77406 invoked by uid 500); 29 Jun 2011 19:04:21 -0000 Mailing-List: contact users-help@spamassassin.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@spamassassin.apache.org Received: (qmail 77399 invoked by uid 99); 29 Jun 2011 19:04:21 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 29 Jun 2011 19:04:21 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: local policy) Received: from [178.63.102.138] (HELO dotforward.de) (178.63.102.138) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 29 Jun 2011 19:04:15 +0000 Received: from dsl01.83.171.188.0.ip-pool.nefkom.net ([83.171.188.0] helo=[127.0.0.1]) by dotforward.de with esmtpsa (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1Qc03E-0000lL-R5; Wed, 29 Jun 2011 21:03:52 +0200 Message-ID: <4E0B7718.60601@unclassified.de> Date: Wed, 29 Jun 2011 21:03:52 +0200 From: Yves Goergen User-Agent: Thunderbird 2.0.0.24 (Windows/20100228) MIME-Version: 1.0 To: Matthew Newton CC: Jari Fredriksson , users@spamassassin.apache.org Subject: Re: BOTNET IPv6 patch References: <20110610214124.GB30343@rootmail.cc.le.ac.uk> <4DF2AC53.7080201@iki.fi> <20110613115124.GB8068@rootmail.cc.le.ac.uk> In-Reply-To: <20110613115124.GB8068@rootmail.cc.le.ac.uk> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org On 13.06.2011 13:51 CE(S)T, Matthew Newton wrote: >> Can you post the patched Botnet.pm and Botnet.cf, that would be cool. > > I've put the patched Botnet.pm here: > > http://www.le.ac.uk/users/mcn4/botnet/ Hi, I was looking for an IPv6 fix for Botnet before but nobody (including me) was able to do it. I have now looked at your solution and to my Perl-unexperienced eyes, it looks promising. I have installed it on my server and am now waiting for E-Mails from IPv6 hosts. Could somebody please just send me a message from an IPv6 mail server to my address? (Preferably from a host that should not be caught by Botnet...) Is this fix supposed to avoid IPv6 false positives only, or also to do its job in detecting IPv6 bots correctly? -- Yves Goergen "LonelyPixel" Visit my web laboratory at http://beta.unclassified.de