You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@spamassassin.apache.org by hg user <me...@gmail.com> on 2023/02/21 18:51:09 UTC

May I get to 0 phishing?

I was wondering if it is possible to reach the goal of 0 phishing.

With 2 layers of paid protection, and a third layer realized with
spamassassin with a lot of hand made rules, I'm able to catch a lot of spam
and if some reaches the mailboxes, no problem.

But when phishing is able to reach the mailboxes, it is more dangerous, and
I'd like to bring it to a minimum.

I'd like to know if you, despite all the barriers, still, although rarely,
have phishing go through, and how do you handle the situation.

Thank you

Re: May I get to 0 phishing?

Posted by Benny Pedersen <me...@junc.eu>.
Rob McEwen skrev den 2023-02-21 23:17:
> I dug a little deeper on this. I'm pretty sure that FROM_PAYPAL_SPOOF
> is triggered at least in part by __NOT_SPOOFED being set to "false" -
> and DKIM failing does (or can) cause __NOT_SPOOFED to be false - and
> so in this case a failed DKIM validation, that most likely worked when
> the message was originally sent - is what's now causing this chain
> reaction. It's highly doubtful that this rule would have hit at the
> time the message was received.

grep -r FROM_PAYPAL_SPOOF /path-to-spamassassin-rules-dir/

why not report it to dnswl.org ?, or other low hanging fruts ?

i am not impressive on people that makes spamassassin rules cant use 
grep

back to my own problem on not getting any paypal emails :)

Re: May I get to 0 phishing?

Posted by Rob McEwen <ro...@invaluement.com>.
I dug a little deeper on this. I'm pretty sure that FROM_PAYPAL_SPOOF is 
triggered at least in part by __NOT_SPOOFED being set to "false" - and 
DKIM failing does (or can) cause __NOT_SPOOFED to be false - and so in 
this case a failed DKIM validation, that most likely worked when the 
message was originally sent - is what's now causing this chain reaction. 
It's highly doubtful that this rule would have hit at the time the 
message was received.
--Rob McEwen, invaluement



------ Original Message ------
From "Rob McEwen" <ro...@invaluement.com>
To users@spamassassin.apache.org
Date 2/21/2023 4:53:27 PM
Subject Re: May I get to 0 phishing?

>Benny,
>
>There are a few holes in your theory/assertions:
>
>(1) I know for a fact that this came from PayPal's official transactional servers, in PayPal's IP space. And while the sender (PayPal's customer) was a "bad actor", this wasn't PayPal's actual email server getting hacked. Instead, it was PayPal's deliberate notification they sent on purpose, with all the proper authentication that normally is sent in ALL legit PayPal emails.
>
>(2) I'm about 99.9% certain that all the validations that fail now - passed when it was originally sent/received. It's actually common for such large senders to expire DKIM record validation either quickly (to make spoofing harder!) and/or to manually expire it when they find fraud in recently-sent spams. One or the other, or both, likely happened here. I'm very confident that some (probably all!) of the validation failures that caused some portion of your bad scoring - weren't there if SA had been run against this soon after it was sent.
>
>(3) I'm using SA 4.x, and a few minutes ago, I ran this against SA, and I ran a legit PayPal notification from this SAME IP address, that was sent today - both against SA. "FROM_PAYPAL_SPOOF" never had a hit on either one - but I also have RBLs and URI-lists set to not run in my SA, since I'm doing all that elsewhere - so maybe that disabled FROM_PAYPAL_SPOOF in my system? Or maybe FROM_PAYPAL_SPOOF isn't in SA4? Nevertheless, if this rule is so great and definitive, why is it only scoring 1.2 points? 1.2 points suggests that it might not be 100% immune to false positives! And if your argument is so great, why was your overall SA score ONLY 1.2 points? Do you really think that everyone using SA should "know" to magically block all messages that ONLY score 1.3 points, but have a hit on this rule? Should other SA users have this magical insight about other such SA rules?
>
>I think you destroyed your own argument, with your own evidence. And you seem to be overlooking the fact that these are sent from PayPal servers that also send a MASSIVE amount of legit and transactional emails, including from this actual same IP. For example, in the past 24 hours, my small-ish mail hosting system has 6 legit not-spam PayPal notifications sent from this SAME ip address - all 6 of those were legit.
>
>Rob McEwen, invaluement
>
>
>
>------ Original Message ------
>From "Benny Pedersen" <me...@junc.eu>
>To users@spamassassin.apache.org
>Date 2/21/2023 4:03:31 PM
>Subject Re: May I get to 0 phishing?
>
>>Rob McEwen skrev den 2023-02-21 20:37:
>>
>>>https://pastebin.com/v80qMF99
>>
>>Content preview:  Invoice from Apple. com (0005) XXXXXX@EXAMPLE.COM, here are
>>    your invoice details Hello, XXXXXX@EXAMPLE.COM Here's your invoice
>>
>>Content analysis details:   (1.2 points, 5.0 required)
>>
>>  pts rule name              description
>>---- ---------------------- --------------------------------------------------
>>-0.0 RCVD_IN_MSPIKE_H2      RBL: Average reputation (+2)
>>                             [173.0.84.227 listed in wl.mailspike.net]
>>  1.8 DKIM_ADSP_DISCARD      No valid author signature, domain signs all mail
>>                             and suggests discarding the rest
>>  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily valid
>>  0.1 DKIM_INVALID           DKIM or DK signature exists, but is not valid
>>-2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,
>>                             medium trust
>>                             [173.0.84.227 listed in list.dnswl.org]
>>-2.0 RCVD_IN_HOSTKARMA_W    RBL: Sender listed in HOSTKARMA-WHITE
>>                         [173.0.84.227 listed in hostkarma.junkemailfiltercom]
>>  0.0 HTML_MESSAGE           BODY: HTML included in message
>>  0.1 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
>>  0.4 KAM_REALLYHUGEIMGSRC   RAW: Spam with image tags with ridiculously huge
>>                              http urls
>>  0.0 MIME_QP_LONG_LINE      RAW: Quoted-printable line longer than 76 chars
>>  0.0 LONG_IMG_URI           Image URI with very long path component - web bug?
>>  1.0 MSGID_NOFQDN2          Message-ID without a fully-qualified domain name
>>  0.5 LONGLINE               Line length exceeds 998 character limit, RFC 5322
>>  1.2 FROM_PAYPAL_SPOOF      From PayPal domain but matches SPOOFED
>>  0.2 KAM_HUGEIMGSRC         Message contains many image tags with huge http urls
>>  0.1 DMARC_REJECT           DMARC reject policy
>>  0.0 LOTS_OF_MONEY          Huge... sums of money
>>  0.0 T_REMOTE_IMAGE         Message contains an external image
>>
>>dont know more, but dnswl ? ;)
>>
>>DMARC_REJECT && FROM_PAYPAL_SPOOF why accept it ?
>>

Re: May I get to 0 phishing?

Posted by Rob McEwen <ro...@invaluement.com>.
Benny,

There are a few holes in your theory/assertions:

(1) I know for a fact that this came from PayPal's official 
transactional servers, in PayPal's IP space. And while the sender 
(PayPal's customer) was a "bad actor", this wasn't PayPal's actual email 
server getting hacked. Instead, it was PayPal's deliberate notification 
they sent on purpose, with all the proper authentication that normally 
is sent in ALL legit PayPal emails.

(2) I'm about 99.9% certain that all the validations that fail now - 
passed when it was originally sent/received. It's actually common for 
such large senders to expire DKIM record validation either quickly (to 
make spoofing harder!) and/or to manually expire it when they find fraud 
in recently-sent spams. One or the other, or both, likely happened here. 
I'm very confident that some (probably all!) of the validation failures 
that caused some portion of your bad scoring - weren't there if SA had 
been run against this soon after it was sent.

(3) I'm using SA 4.x, and a few minutes ago, I ran this against SA, and 
I ran a legit PayPal notification from this SAME IP address, that was 
sent today - both against SA. "FROM_PAYPAL_SPOOF" never had a hit on 
either one - but I also have RBLs and URI-lists set to not run in my SA, 
since I'm doing all that elsewhere - so maybe that disabled 
FROM_PAYPAL_SPOOF in my system? Or maybe FROM_PAYPAL_SPOOF isn't in SA4? 
Nevertheless, if this rule is so great and definitive, why is it only 
scoring 1.2 points? 1.2 points suggests that it might not be 100% immune 
to false positives! And if your argument is so great, why was your 
overall SA score ONLY 1.2 points? Do you really think that everyone 
using SA should "know" to magically block all messages that ONLY score 
1.3 points, but have a hit on this rule? Should other SA users have this 
magical insight about other such SA rules?

I think you destroyed your own argument, with your own evidence. And you 
seem to be overlooking the fact that these are sent from PayPal servers 
that also send a MASSIVE amount of legit and transactional emails, 
including from this actual same IP. For example, in the past 24 hours, 
my small-ish mail hosting system has 6 legit not-spam PayPal 
notifications sent from this SAME ip address - all 6 of those were 
legit.

Rob McEwen, invaluement



------ Original Message ------
From "Benny Pedersen" <me...@junc.eu>
To users@spamassassin.apache.org
Date 2/21/2023 4:03:31 PM
Subject Re: May I get to 0 phishing?

>Rob McEwen skrev den 2023-02-21 20:37:
>
>>https://pastebin.com/v80qMF99
>
>Content preview:  Invoice from Apple. com (0005) XXXXXX@EXAMPLE.COM, here are
>    your invoice details Hello, XXXXXX@EXAMPLE.COM Here's your invoice
>
>Content analysis details:   (1.2 points, 5.0 required)
>
>  pts rule name              description
>---- ---------------------- --------------------------------------------------
>-0.0 RCVD_IN_MSPIKE_H2      RBL: Average reputation (+2)
>                             [173.0.84.227 listed in wl.mailspike.net]
>  1.8 DKIM_ADSP_DISCARD      No valid author signature, domain signs all mail
>                             and suggests discarding the rest
>  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily valid
>  0.1 DKIM_INVALID           DKIM or DK signature exists, but is not valid
>-2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,
>                             medium trust
>                             [173.0.84.227 listed in list.dnswl.org]
>-2.0 RCVD_IN_HOSTKARMA_W    RBL: Sender listed in HOSTKARMA-WHITE
>                         [173.0.84.227 listed in hostkarma.junkemailfilter.com]
>  0.0 HTML_MESSAGE           BODY: HTML included in message
>  0.1 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
>  0.4 KAM_REALLYHUGEIMGSRC   RAW: Spam with image tags with ridiculously huge
>                              http urls
>  0.0 MIME_QP_LONG_LINE      RAW: Quoted-printable line longer than 76 chars
>  0.0 LONG_IMG_URI           Image URI with very long path component - web bug?
>  1.0 MSGID_NOFQDN2          Message-ID without a fully-qualified domain name
>  0.5 LONGLINE               Line length exceeds 998 character limit, RFC 5322
>  1.2 FROM_PAYPAL_SPOOF      From PayPal domain but matches SPOOFED
>  0.2 KAM_HUGEIMGSRC         Message contains many image tags with huge http urls
>  0.1 DMARC_REJECT           DMARC reject policy
>  0.0 LOTS_OF_MONEY          Huge... sums of money
>  0.0 T_REMOTE_IMAGE         Message contains an external image
>
>dont know more, but dnswl ? ;)
>
>DMARC_REJECT && FROM_PAYPAL_SPOOF why accept it ?
>

Re: May I get to 0 phishing?

Posted by Benny Pedersen <me...@junc.eu>.
Rob McEwen skrev den 2023-02-21 20:37:

> https://pastebin.com/v80qMF99

Content preview:  Invoice from Apple. com (0005) XXXXXX@EXAMPLE.COM, 
here are
    your invoice details Hello, XXXXXX@EXAMPLE.COM Here's your invoice

Content analysis details:   (1.2 points, 5.0 required)

  pts rule name              description
---- ---------------------- 
--------------------------------------------------
-0.0 RCVD_IN_MSPIKE_H2      RBL: Average reputation (+2)
                             [173.0.84.227 listed in wl.mailspike.net]
  1.8 DKIM_ADSP_DISCARD      No valid author signature, domain signs all 
mail
                             and suggests discarding the rest
  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not 
necessarily valid
  0.1 DKIM_INVALID           DKIM or DK signature exists, but is not 
valid
-2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at 
https://www.dnswl.org/,
                             medium trust
                             [173.0.84.227 listed in list.dnswl.org]
-2.0 RCVD_IN_HOSTKARMA_W    RBL: Sender listed in HOSTKARMA-WHITE
                         [173.0.84.227 listed in 
hostkarma.junkemailfilter.com]
  0.0 HTML_MESSAGE           BODY: HTML included in message
  0.1 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
  0.4 KAM_REALLYHUGEIMGSRC   RAW: Spam with image tags with ridiculously 
huge
                              http urls
  0.0 MIME_QP_LONG_LINE      RAW: Quoted-printable line longer than 76 
chars
  0.0 LONG_IMG_URI           Image URI with very long path component - 
web bug?
  1.0 MSGID_NOFQDN2          Message-ID without a fully-qualified domain 
name
  0.5 LONGLINE               Line length exceeds 998 character limit, RFC 
5322
  1.2 FROM_PAYPAL_SPOOF      From PayPal domain but matches SPOOFED
  0.2 KAM_HUGEIMGSRC         Message contains many image tags with huge 
http urls
  0.1 DMARC_REJECT           DMARC reject policy
  0.0 LOTS_OF_MONEY          Huge... sums of money
  0.0 T_REMOTE_IMAGE         Message contains an external image

dont know more, but dnswl ? ;)

DMARC_REJECT && FROM_PAYPAL_SPOOF why accept it ?



Re: May I get to 0 phishing?

Posted by Rob McEwen <ro...@invaluement.com>.
Nope. That was a phishing spam, just maybe not the TYPE of phishing spam 
you're used to seeing? Calling it a fraud doesn't make it not a phish. 
When is a phishing spam ever NOT fraud? So what's the deciding factor? 
The fact that this claimed to be Apple sending an invoice via PayPal - 
and tried to trick the end user into thinking that they were the real 
Apple - except it wasn't really Apple - it was a criminal masquerading 
as Apple, trying to trick the recipient into paying this via thinking 
that this was the real Apple. THAT is the deciding factor that makes 
this a phish as well as a fraud.

(PayPal should have done better customer vetting on the front end!)

Rob McEwen, invaluement


------ Original Message ------
From "hg user" <me...@gmail.com>
To "Rob McEwen" <ro...@invaluement.com>
Cc users@spamassassin.apache.org
Date 2/21/2023 3:10:35 PM
Subject Re: May I get to 0 phishing?

>I think this is not a phishing, more a fraud: it seems a real invoice 
>for something you didn't buy.
>
>I'm glad to hear from experts that it's impossible to have 0 phishing, 
>that I'm not missing the "silver bullet" or the magic token.
>
>I may perhaps implement ESP plugin, and subscribe to DQS, or add a OCR 
>plugin for those very annoying "pay the fine" scams. Really dubious 
>about enabling razor and pyzor for italian language.
>
>Unfortunately my spamassassin, version 3.4.5, is embedded into Zimbra, 
>and it makes me really afraid of adding plugins...
>
>Suggestions are always welcome
>
>On Tue, Feb 21, 2023 at 8:37 PM Rob McEwen <ro...@invaluement.com> wrote:
>>What Bill Cole said! Agreed. For example, here's an almost impossible
>>phish to block (at least, without blocking legitimate PayPal
>>transactional emails!). This is a PayPal phishing spam, sent from
>>PayPal's own server! It was sent by PayPal. I only changed the 
>>intended
>>recipient address (to protect the innocent), and changed the "=" at 
>>the
>>end of lines MIME-formatting to regular lines, for better readability
>>when looking through the email body for links. Otherwise, not altered.
>>
>>https://pastebin.com/v80qMF99
>>
>>However - there are always very helpful improvements that can be made
>>for minimizing the number of phish that get into the inbox. It's a
>>constant battle!
>>
>>Rob McEwen, invaluement
>>
>>------ Original Message ------
>>From "Bill Cole" <sa...@billmail.scconsult.com>
>>To users@spamassassin.apache.org
>>Date 2/21/2023 2:11:02 PM
>>Subject Re: May I get to 0 phishing?
>>
>> >On 2023-02-21 at 13:51:09 UTC-0500 (Tue, 21 Feb 2023 19:51:09 +0100)
>> >hg user <me...@gmail.com>
>> >is rumored to have said:
>> >
>> >>I was wondering if it is possible to reach the goal of 0 phishing.
>> >
>> >Nope. There are people who find it profitable and they will continue 
>>to find ways to trick all the usable programmatic mechanisms deployed 
>>to stop it.
>> >
>> >>With 2 layers of paid protection, and a third layer realized with
>> >>spamassassin with a lot of hand made rules, I'm able to catch a lot 
>>of spam
>> >>and if some reaches the mailboxes, no problem.
>> >>
>> >>But when phishing is able to reach the mailboxes, it is more 
>>dangerous, and
>> >>I'd like to bring it to a minimum.
>> >>
>> >>I'd like to know if you, despite all the barriers, still, although 
>>rarely,
>> >>have phishing go through, and how do you handle the situation.
>> >
>> >Eternal vigilance and user education.
>> >
>> >The world is an imperfect place.
>> >
>> >
>> >-- Bill Cole
>> >bill@scconsult.com or billcole@apache.org
>> >(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
>> >Not Currently Available For Hire

Re: May I get to 0 phishing?

Posted by hg user <me...@gmail.com>.
I think this is not a phishing, more a fraud: it seems a real invoice for
something you didn't buy.

I'm glad to hear from experts that it's impossible to have 0 phishing, that
I'm not missing the "silver bullet" or the magic token.

I may perhaps implement ESP plugin, and subscribe to DQS, or add a OCR
plugin for those very annoying "pay the fine" scams. Really dubious about
enabling razor and pyzor for italian language.

Unfortunately my spamassassin, version 3.4.5, is embedded into Zimbra, and
it makes me really afraid of adding plugins...

Suggestions are always welcome

On Tue, Feb 21, 2023 at 8:37 PM Rob McEwen <ro...@invaluement.com> wrote:

> What Bill Cole said! Agreed. For example, here's an almost impossible
> phish to block (at least, without blocking legitimate PayPal
> transactional emails!). This is a PayPal phishing spam, sent from
> PayPal's own server! It was sent by PayPal. I only changed the intended
> recipient address (to protect the innocent), and changed the "=" at the
> end of lines MIME-formatting to regular lines, for better readability
> when looking through the email body for links. Otherwise, not altered.
>
> https://pastebin.com/v80qMF99
>
> However - there are always very helpful improvements that can be made
> for minimizing the number of phish that get into the inbox. It's a
> constant battle!
>
> Rob McEwen, invaluement
>
> ------ Original Message ------
> From "Bill Cole" <sa...@billmail.scconsult.com>
> To users@spamassassin.apache.org
> Date 2/21/2023 2:11:02 PM
> Subject Re: May I get to 0 phishing?
>
> >On 2023-02-21 at 13:51:09 UTC-0500 (Tue, 21 Feb 2023 19:51:09 +0100)
> >hg user <me...@gmail.com>
> >is rumored to have said:
> >
> >>I was wondering if it is possible to reach the goal of 0 phishing.
> >
> >Nope. There are people who find it profitable and they will continue to
> find ways to trick all the usable programmatic mechanisms deployed to stop
> it.
> >
> >>With 2 layers of paid protection, and a third layer realized with
> >>spamassassin with a lot of hand made rules, I'm able to catch a lot of
> spam
> >>and if some reaches the mailboxes, no problem.
> >>
> >>But when phishing is able to reach the mailboxes, it is more dangerous,
> and
> >>I'd like to bring it to a minimum.
> >>
> >>I'd like to know if you, despite all the barriers, still, although
> rarely,
> >>have phishing go through, and how do you handle the situation.
> >
> >Eternal vigilance and user education.
> >
> >The world is an imperfect place.
> >
> >
> >-- Bill Cole
> >bill@scconsult.com or billcole@apache.org
> >(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
> >Not Currently Available For Hire
>

Re: May I get to 0 phishing?

Posted by Rob McEwen <ro...@invaluement.com>.
What Bill Cole said! Agreed. For example, here's an almost impossible 
phish to block (at least, without blocking legitimate PayPal 
transactional emails!). This is a PayPal phishing spam, sent from 
PayPal's own server! It was sent by PayPal. I only changed the intended 
recipient address (to protect the innocent), and changed the "=" at the 
end of lines MIME-formatting to regular lines, for better readability 
when looking through the email body for links. Otherwise, not altered.

https://pastebin.com/v80qMF99

However - there are always very helpful improvements that can be made 
for minimizing the number of phish that get into the inbox. It's a 
constant battle!

Rob McEwen, invaluement

------ Original Message ------
From "Bill Cole" <sa...@billmail.scconsult.com>
To users@spamassassin.apache.org
Date 2/21/2023 2:11:02 PM
Subject Re: May I get to 0 phishing?

>On 2023-02-21 at 13:51:09 UTC-0500 (Tue, 21 Feb 2023 19:51:09 +0100)
>hg user <me...@gmail.com>
>is rumored to have said:
>
>>I was wondering if it is possible to reach the goal of 0 phishing.
>
>Nope. There are people who find it profitable and they will continue to find ways to trick all the usable programmatic mechanisms deployed to stop it.
>
>>With 2 layers of paid protection, and a third layer realized with
>>spamassassin with a lot of hand made rules, I'm able to catch a lot of spam
>>and if some reaches the mailboxes, no problem.
>>
>>But when phishing is able to reach the mailboxes, it is more dangerous, and
>>I'd like to bring it to a minimum.
>>
>>I'd like to know if you, despite all the barriers, still, although rarely,
>>have phishing go through, and how do you handle the situation.
>
>Eternal vigilance and user education.
>
>The world is an imperfect place.
>
>
>-- Bill Cole
>bill@scconsult.com or billcole@apache.org
>(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
>Not Currently Available For Hire

Re: May I get to 0 phishing?

Posted by Bill Cole <sa...@billmail.scconsult.com>.
On 2023-02-21 at 13:51:09 UTC-0500 (Tue, 21 Feb 2023 19:51:09 +0100)
hg user <me...@gmail.com>
is rumored to have said:

> I was wondering if it is possible to reach the goal of 0 phishing.

Nope. There are people who find it profitable and they will continue to 
find ways to trick all the usable programmatic mechanisms deployed to 
stop it.

> With 2 layers of paid protection, and a third layer realized with
> spamassassin with a lot of hand made rules, I'm able to catch a lot of 
> spam
> and if some reaches the mailboxes, no problem.
>
> But when phishing is able to reach the mailboxes, it is more 
> dangerous, and
> I'd like to bring it to a minimum.
>
> I'd like to know if you, despite all the barriers, still, although 
> rarely,
> have phishing go through, and how do you handle the situation.

Eternal vigilance and user education.

The world is an imperfect place.


-- 
Bill Cole
bill@scconsult.com or billcole@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire

Re: May I get to 0 phishing?

Posted by Matus UHLAR - fantomas <uh...@fantomas.sk>.
On 21.02.23 19:51, hg user wrote:
>I was wondering if it is possible to reach the goal of 0 phishing.
>
>With 2 layers of paid protection, and a third layer realized with
>spamassassin with a lot of hand made rules, I'm able to catch a lot of spam
>and if some reaches the mailboxes, no problem.
>
>But when phishing is able to reach the mailboxes, it is more dangerous, and
>I'd like to bring it to a minimum.
>
>I'd like to know if you, despite all the barriers, still, although rarely,
>have phishing go through, and how do you handle the situation.

treat phishing like spam, but with higher priority.
If you notice phishing, take action immediately.

otherwise, just standard measures - report to razor, pyzor, DCC, train as 
spam.

And keep a copy for possible future training.

-- 
Matus UHLAR - fantomas, uhlar@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
I wonder how much deeper the ocean would be without sponges.