decode-spam-headers icon indicating copy to clipboard operation
decode-spam-headers copied to clipboard

Cloudmark Authority X-CNFS-Analysis / X-CMAE-Envelope header

Open HenkPoley opened this issue 3 years ago • 4 comments

In the not accepted by Gmail mail mentioned in #4, I also notice a X-CNFS-Analysis header. Which is apparently something spam filter related by Cloudmark Authority for at least the past 15 years ref.

Syntax are something like:

X-CNFS-Analysis: v=2.4 cv=<hash> c=1 sm=1 tr=0 ts=622096d8 cx=a_exe
 a= <base64>:117 a=<base64>:17
 a=<hash>:10 a=<hash>:9 a=<hash>:10 a=<hash>:10
X-CMAE-Envelope: <base64>

CMAE = CloudMark Authority Engine

HenkPoley avatar Mar 04 '22 08:03 HenkPoley

Parser for this one too will land when only I find a minute, Again, Thanks Henk!

mgeeky avatar Mar 04 '22 18:03 mgeeky

So, unfortunately there is hardly any information related to specific header's fields. Best I could do is:

-----------------------------------------
(1) Test: Cloudmark Analysis

HEADER:
    X-CNFS-Analysis

VALUE:
    v=2.4 cv=X9mXlEfe c=1 sm=1 tr=0 ts=5fc7c1fb a=W6fcibsR95OiD+X+thQpDQ==:117
    a=W6fcibsR95OiD+X+thQpDQ==:17 a=xqWC_Br6kY4A:10 a=HpEJnUlJZJkA:10 a=uU2Hr5VP7ueSOeE0IWgA:9
    a=QEXdDO2ut3YA:10 a=yMhMjlubAAAA:8 a=SSmOFEACAAAA:8 a=pGLkceISAAAA:8 a=67BIL_jfAAAA:8
    a=VviWYApGstzf7Dq6:21 a=gKO2Hq4RSVkA:10 a=UiCQ7L4-1S4A:10 a=hTZeC7Yk6K0A:10 a=frz4AuCg-hUA:10
    a=pHzHmUro8NiASowvMSCR:22 a=6VlIyEUom7LUIeUMNQJH:22

ANALYSIS:

- Cloudmark Authority Engine (CMAE) analysis results:

        - Version:              2.4
        - cv:                   X9mXlEfe
        - c:                    1
        - sm:                   1
        - tr:                   0
        - Timestamp:            2020-12-02 16:34:03
        - a (17 entries):
                - 117   - W6fcibsR95OiD+X+thQpDQ==
                - 17    - W6fcibsR95OiD+X+thQpDQ==
                - 10    - xqWC_Br6kY4A
                - 10    - HpEJnUlJZJkA
                - 9     - uU2Hr5VP7ueSOeE0IWgA
                - 10    - QEXdDO2ut3YA
                - 8     - yMhMjlubAAAA
                - 8     - SSmOFEACAAAA
                - 8     - pGLkceISAAAA
                - 8     - 67BIL_jfAAAA
                - 21    - VviWYApGstzf7Dq6
                - 10    - gKO2Hq4RSVkA
                - 10    - UiCQ7L4-1S4A
                - 10    - hTZeC7Yk6K0A
                - 10    - frz4AuCg-hUA
                - 22    - pHzHmUro8NiASowvMSCR
                - 22    - 6VlIyEUom7LUIeUMNQJH


-----------------------------------------

or when used with --debug-all flag:

-----------------------------------------
(1) Test: Cloudmark Analysis

HEADER:
    X-CNFS-Analysis

VALUE:
    v=2.4 cv=X9mXlEfe c=1 sm=1 tr=0 ts=5fc7c1fb a=W6fcibsR95OiD+X+thQpDQ==:117
    a=W6fcibsR95OiD+X+thQpDQ==:17 a=xqWC_Br6kY4A:10 a=HpEJnUlJZJkA:10 a=uU2Hr5VP7ueSOeE0IWgA:9
    a=QEXdDO2ut3YA:10 a=yMhMjlubAAAA:8 a=SSmOFEACAAAA:8 a=pGLkceISAAAA:8 a=67BIL_jfAAAA:8
    a=VviWYApGstzf7Dq6:21 a=gKO2Hq4RSVkA:10 a=UiCQ7L4-1S4A:10 a=hTZeC7Yk6K0A:10 a=frz4AuCg-hUA:10
    a=pHzHmUro8NiASowvMSCR:22 a=6VlIyEUom7LUIeUMNQJH:22

ANALYSIS:

- Cloudmark Authority Engine (CMAE) analysis results:

        - Version:              2.4
        - cv:                   X9mXlEfe
        - c:                    1
        - sm:                   1
        - tr:                   0
        - Timestamp:            2020-12-02 16:34:03
        - a (17 entries):
                - 117   - W6fcibsR95OiD+X+thQpDQ==
                        0000 | 5b dc 89 11 0f 14 29 0d                          | [.....). ...

                - 17    - W6fcibsR95OiD+X+thQpDQ==
                        0000 | 5b dc 89 11 0f 14 29 0d                          | [.....). ...

                - 10    - xqWC_Br6kY4A
                        0000 | 78 71 57 43 5f 42 72 36 6b 59 34 41              | xqWC_Br6kY4A ...

                - 10    - HpEJnUlJZJkA
                        0000 | 1e 09 49 49 64 00                                | ..IId. ...

                - 9     - uU2Hr5VP7ueSOeE0IWgA
                        0000 | 4d 4f 39 34 21 68 00                             | MO94!h. ...

                - 10    - QEXdDO2ut3YA
                        0000 | 40 45 0c 76 00                                   | @E.v. ...

                - 8     - yMhMjlubAAAA
                        0000 | 4c 5b 00 00 00                                   | L[... ...

                - 8     - SSmOFEACAAAA
                        0000 | 49 29 14 40 02 00 00 00                          | I).@.... ...

                - 8     - pGLkceISAAAA
                        0000 | 62 71 12 00 00 00                                | bq.... ...

                - 8     - 67BIL_jfAAAA
                        0000 | 36 37 42 49 4c 5f 6a 66 41 41 41 41              | 67BIL_jfAAAA ...

                - 21    - VviWYApGstzf7Dq6
                        0000 | 56 60 0a 46 3a                                   | V`.F: ...

                - 10    - gKO2Hq4RSVkA
                        0000 | 1e 11 49 59 00                                   | ..IY. ...

                - 10    - UiCQ7L4-1S4A
                        0000 | 55 69 43 51 37 4c 34 2d 31 53 34 41              | UiCQ7L4-1S4A ...

                - 10    - hTZeC7Yk6K0A
                        0000 | 36 5e 0b 24 00                                   | 6^.$. ...

                - 10    - frz4AuCg-hUA
                        0000 | 66 72 7a 34 41 75 43 67 2d 68 55 41              | frz4AuCg-hUA ...

                - 22    - pHzHmUro8NiASowvMSCR
                        0000 | 7c c7 99 4a d8 80 4a 2f 31 20                    | |..J..J/1  ...

                - 22    - 6VlIyEUom7LUIeUMNQJH
                        0000 | 59 48 45 28 21 0c 35 02 47                       | YHE(!.5.G ...


-----------------------------------------

Hope that helps!

If you know anything more with regards to that header, let me know!

Regards, Mariusz.

mgeeky avatar Mar 05 '22 19:03 mgeeky

I have no clue either. We probably need to ask the company.

I saw that X-CMAE-Envelope base64-decoded started with 1.1|..binary data..

I suspect all those a= are encrypted names of the rules that are triggered. With some luck they are global across all Cloudmark Authority, or they are crypted per server.

HenkPoley avatar Mar 07 '22 08:03 HenkPoley

That's exactly what I'd expect these a= to be. However, similarly to Microsoft's EOP/MDO detection rules, we're limited to blind reverse-engineering efforts. Since I have no Cloudmark-enabled mail server to test, I'm not able to dive deep into those.

mgeeky avatar Mar 07 '22 14:03 mgeeky

Closing this now as I'm unable to resolve it without docs. That's the nature of blackboxed headers analysis :)

Feel free to open it up if there's anything that comes to you in regard to these headers.

Regards, Mariusz

mgeeky avatar Sep 22 '22 14:09 mgeeky