You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@spamassassin.apache.org by Jeff Chan <je...@surbl.org> on 2004/11/13 08:46:06 UTC

Re: [SURBL-Discuss] RFC: consensus list?

On Friday, November 12, 2004, 7:07:29 AM, Frank Ellermann wrote:
> See Ryan's answer, it's easy to do interesting stuff
> with the multi bits, multi was a good idea.  If you
> want to simplify it set bit 1 if 3 or more other bits
> are set, examples:

127.0.0.6   =>> 127.0.0.6   (2 or less bits unchanged)
127.0.0.100 =>> 127.0.0.101 (64+32+4 => 64+32+4+1)
127.0.0.14  =>> 127.0.0.15  (8+4+2 => 8+4+2+1)

LOL!  I didn't think of that!  If you take multi and feed it into
urirhsbl or the non-bitmasked version of SpamCopURI and use
numerical values like: 

  127.0.0.100

Then you can find URIs that appear on JP, AB and WS, etc.

  http://www.surbl.org/lists.html#multi

2 = comes from sc.surbl.org
4 = comes from ws.surbl.org
8 = comes from phishing data source (labelled as [ph] in multi)
16 = comes from ob.surbl.org
32 = comes from ab.surbl.org
64 = comes from jp data source (labelled as [jp] in multi)

So simple "and" combinations like this can already be done and
tested without explicitly creating new, combined lists.

SC + AB + WS + OB + JP would be 127.0.0.118
SC + WS + OB + JP      would be 127.0.0.86
SC + OB + JP           would be 127.0.0.82

etc.  Would someone care to run some of these combinations
through their corpus tests?

Jeff C.
--
"If it appears in hams, then don't list it."