On 04/21/2011 03:55 PM, Kevin Miller wrote:
> Thanks (also to Martin who replied).  I posted one of the spams here:
> http://pastebin.com/9aBAxR7m
> 
> You can see the long series of break codes in it.

Yes I can.  I can also see several other diagnostic bits in it, such as
the domain:  http://www.siteadvisor.com/sites/regionstargpsupdates.com

How about this rule instead:

blacklist_from  *@regionstargpsupdates.com

It's much faster and, given the report of the domain being that of a
spammer, much much safer.

> Sorry for the confusion on the 10.10.10.10 - that isn't part of the
> spam, it was just a handy file for testing since it had a repeating
> string in it.

It was a faulty test since '[10.]{3}' will match '10.10.10.10' but not
in the way that you think; it matches the first three characters and
will therefore also match the string '110.64.323.6'

> I did get it to work from the CLI, and wrote the following rule:
> 
> body      CBJ_GiveMeABreak  /\["<br>"]{5,}/
> describe  CBJ_GiveMeABreak  Messages with multiple consecutave break 
> characters
> score     CBJ_GiveMeABreak  0.01

That will not match your sample.  Please re-read my message.  The regex
is wrong and the rule type (body) is wrong.

> I know it may trigger on some ham which is why I set the initial
> score to 0.01.  Better ideas are most welcome though!


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to