https://issues.apache.org/SpamAssassin/show_bug.cgi?id=5901
Summary: typo in regexp within 20_vbounce.cf
Product: Spamassassin
Version: 3.2.4
Platform: PC
OS/Version: Linux
Status: NEW
Severity: minor
Priority: P5
Component: Rules
AssignedTo: [email protected]
ReportedBy: [EMAIL PROTECTED]
I observed the vbounce rule not recognizing many bounces originated by UBE with
faked sender addresses.
After digging into this, it showed that the body-rule " __HAVE_BOUNCE_RELAYS"
is giving a "1", but often no header rule "__BOUNCE*" seems to give a hit. One
of the most likely rules to be IMHO true is the "__BOUNCE_FROM_DAEMON" one, but
this one nearly never gives a hit for me.
Within the rules file "20_vbounce.cf", the regexp in the "__BOUNCE_FROM_DAEMON"
line seems not to be correct from my point of view. Instead of the "+" after
the \S I would expect a "*", as it is in the similar regexp of
"__BOUNCE_RPATH_MD".
So for testing purposes I modified the line
old:
header __BOUNCE_FROM_DAEMON From =~
/(?:(?:daemon|deamon|majordomo|postmaster|virus|scanner|devnull|automated-response|SMTP.gateway|mailadmin|mailmaster|surfcontrol|You_Got_Spammed)\S+\@|<>)/i
to new:
header __BOUNCE_FROM_DAEMON From =~
/(?:(?:daemon|deamon|majordomo|postmaster|virus|scanner|devnull|automated-response|SMTP.gateway|mailadmin|mailmaster|surfcontrol|You_Got_Spammed)\S*\@|<>)/i
and then also the bounces formerly not recognized are correctly identified.
Justin Mason confirmed this in the users mailing list.
--
Configure bugmail:
https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.