On Mon, 25 Mar 2019, Axb wrote:

On 3/25/19 7:01 PM, Henrik K wrote:
On Mon, Mar 25, 2019 at 06:49:49PM +0100, Tobi <jahli...@gmx.ch> wrote:

Am 25.03.19 um 15:18 schrieb Henrik K:
On Mon, Mar 25, 2019 at 03:00:30PM +0100, Tobi <jahli...@gmx.ch> wrote:
[snip..]

uri __HAS_URI /./
tflags __HAS_URI multiple
meta __REALLY_HAS_URI (DKIM_SIGNED && __HAS_URI > 1) || (!DKIM_SIGNED && __HAS_URI)


seems to me everybody is making an effort in disregarding the fact that the URI rule was hitting on a header and imo, that should not happen.
This makes the whole uri behaviour even more unpredictable.

However sometimes headers contain valuable URI targets.

For example, I've seen increasing amounts of spam which contain cloud based URLs in the body of the message (worthless for URIBL filtering) which may also contain URLs in the headers that are specific to the spammer source (thus viable targets for URIBL filters).

A blanket prohibition against header URI mining would miss out on that data.

--
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to