You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@spamassassin.apache.org by bi...@apache.org on 2022/06/13 18:10:09 UTC
svn commit: r1901885 - /spamassassin/trunk/rulesrc/sandbox/billcole/80_test.cf
Author: billcole
Date: Mon Jun 13 18:10:09 2022
New Revision: 1901885
URL: http://svn.apache.org/viewvc?rev=1901885&view=rev
Log:
New MID pattern rule, tests very well on private B2B system.
Modified:
spamassassin/trunk/rulesrc/sandbox/billcole/80_test.cf
Modified: spamassassin/trunk/rulesrc/sandbox/billcole/80_test.cf
URL: http://svn.apache.org/viewvc/spamassassin/trunk/rulesrc/sandbox/billcole/80_test.cf?rev=1901885&r1=1901884&r2=1901885&view=diff
==============================================================================
--- spamassassin/trunk/rulesrc/sandbox/billcole/80_test.cf (original)
+++ spamassassin/trunk/rulesrc/sandbox/billcole/80_test.cf Mon Jun 13 18:10:09 2022
@@ -79,6 +79,11 @@ body SCC_CANSPAM_1 /The advertiser doe
describe SCC_CANSPAM_2 Interesting compliance language
body SCC_CANSPAM_2 /you may unsubscribe by clicking here or by writing to/
+# 1-3 are antique and stale. This sha256@sha256.*.co pattern is fresh in 2022
+describe SCC_SPAMMERMID4 Distinctive Message-Id
+header SCC_SPAMMERMID4 Message-ID =~ /<[-_a-zA-Z0-9.]{43}\.[-_a-zA-Z0-9.]{43}\@[-a-z0-9]{4,30}\.co>/
+score SCC_SPAMMERMID4 1
+
# TESTING a few domains that are in our "suspicious" list but are known to have some good senders
describe T_SCC_TLD_ONLINE From domain in *.online
header T_SCC_TLD_ONLINE From =~ /<[^ @]+@[^ @>]+\.online>/