https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7156
Reindl Harald <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |[email protected] --- Comment #32 from Reindl Harald <[email protected]> --- > OK, what about if I write make sure you download > those files...microsoft.com. > > Do I mean an ellipses (...)? Something to watch for i think that's not the point - the question is does a DNS request happen with "files...microsoft.com." and when yes normalize it before send the DNS query itself OR skip it entirely i would prefer normalize it an look for "files...microsoft.com" because of the simple reason that MUA's randomly make things clickable and when then a error in the browser appears the user might realize the multiple, dots, fix it and press enter which probably is the expected behavior of the spammer to work around URIBL with no cost what bad should happen with the DNS request for "files.microsoft.com." - it's either a NXDOMAIN or when it is listed then well, caught for some reason -- You are receiving this mail because: You are the assignee for the bug.
