http://bugzilla.spamassassin.org/show_bug.cgi?id=4386





------- Additional Comments From [EMAIL PROTECTED]  2005-06-03 08:22 -------
Theo wrote:
> Jifl wrote:
> > So for example (based on a real one, but not verbatim):
> > <a href="http://12.98.176.54/billing.ebay.com";
> > onMouseOver="status='https://billing.ebay.com/'; return
> > true">http://billing.ebay.com/</a>
>
> 3.1 already has a rule to flag this specific type of href setup.

Cool! I'm "only" using the latest released version.

>> In this example SA could pick up on two things: SA could detect that the link
>> contents are themselves in the form of a URI ("http(s?)://" would do), and 
>> then
>> that the href in the link refers to a URL that differs from that URI. 
>> Secondly
> It's not that simple.  This has been discussed numerous times already
> on users@ and other tickets.  In short, testing shows that assuming
> the anchor text URI and the href URI match in ham but not in spam is
> completely not valid and FPs wildly.

I wasn't able to find any similar tickets in an earlier query before I submitted
this, and am not on the users list sorry. So sorry if I'm repeating something,
but checking just the protocol/host part of the URI would probably be
sufficient. The chance of FPs then would seem much smaller for legitimate ham.

Derek wrote:
> The onmouseover status is harder to catch. 

I don't think it would be required to match the whole extract with the use of
status etc. I think the presence of onmouseover anywhere is probably a
sufficient indicator that this mail is irregular.

And thanks for the forms suggestion and regexps. It's difficult to imagine ham
that wanted to legitimately use such a construct.





------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to