You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@spamassassin.apache.org by sp...@apache.org on 2023/05/27 08:30:13 UTC

svn commit: r1910082 - /spamassassin/trunk/rules/active.list

Author: spamassassin_role
Date: Sat May 27 08:30:12 2023
New Revision: 1910082

URL: http://svn.apache.org/viewvc?rev=1910082&view=rev
Log:
promotions validated

Modified:
    spamassassin/trunk/rules/active.list

Modified: spamassassin/trunk/rules/active.list
URL: http://svn.apache.org/viewvc/spamassassin/trunk/rules/active.list?rev=1910082&r1=1910081&r2=1910082&view=diff
==============================================================================
--- spamassassin/trunk/rules/active.list (original)
+++ spamassassin/trunk/rules/active.list Sat May 27 08:30:12 2023
@@ -191,7 +191,7 @@ BITCOIN_IMGUR
 # good enough
 BITCOIN_MALF_HTML
 
-# tflags publish
+# tflags net
 BITCOIN_MALWARE
 
 # tflags publish
@@ -257,7 +257,7 @@ BODY_SINGLE_URI
 # good enough
 BODY_SINGLE_WORD
 
-# tflags publish
+# tflags net
 BODY_URI_ONLY
 
 # tflags publish
@@ -482,7 +482,7 @@ FORGED_SPF_HELO
 # tflags net
 FORM_FRAUD
 
-# tflags publish
+# tflags net
 FORM_FRAUD_3
 
 # tflags publish
@@ -560,7 +560,7 @@ FROM_MISSP_FREEMAIL
 # good enough
 FROM_MISSP_MSFT
 
-# good enough
+# tflags net
 FROM_MISSP_REPLYTO
 
 # tflags net
@@ -770,7 +770,7 @@ HAS_X_NO_RELAY
 # tflags publish
 HAS_X_OUTGOING_SPAM_STAT
 
-# good enough
+# tflags net
 HDRS_LCASE
 
 # tflags publish
@@ -857,7 +857,7 @@ HTML_OFF_PAGE
 # tflags publish
 HTML_SHRT_CMNT_OBFU_MANY
 
-# tflags publish
+# tflags net
 HTML_SINGLET_MANY
 
 # good enough
@@ -882,6 +882,9 @@ JH_SPAMMY_PATTERN01
 JH_SPAMMY_PATTERN02
 
 # tflags net
+KHOP_FAKE_EBAY
+
+# tflags net
 KHOP_HELO_FCRDNS
 
 # tflags publish
@@ -926,12 +929,15 @@ MALWARE_PASSWORD
 # tflags publish
 MALW_ATTACH
 
-# good enough
+# tflags net
 MANY_HDRS_LCASE
 
 # tflags publish
 MANY_SPAN_IN_TEXT
 
+# tflags net
+MAY_BE_FORGED
+
 # tflags publish
 MILLION_HUNDRED
 
@@ -981,9 +987,6 @@ MONERO_MALWARE
 MONERO_PAY_ME
 
 # good enough
-MONEY_ATM_CARD
-
-# good enough
 MONEY_FORM
 
 # good enough
@@ -1103,7 +1106,7 @@ PDS_FRNOM_TODOM_DBL_URL
 # good enough
 PDS_FRNOM_TODOM_NAKED_TO
 
-# good enough
+# tflags net
 PDS_FROM_2_EMAILS
 
 # good enough
@@ -1608,9 +1611,6 @@ SUBJECT_IN_WELCOMELIST
 SUBJ_BRKN_WORDNUMS
 
 # tflags net
-SUBJ_UNNEEDED_HTML
-
-# tflags net
 SURBL_BLOCKED
 
 # good enough
@@ -1649,7 +1649,7 @@ TONLINE_FAKE_DKIM
 # tflags publish
 TO_EQ_FM_DIRECT_MX
 
-# good enough
+# tflags net
 TO_EQ_FM_DOM_HTML_IMG
 
 # tflags net
@@ -1697,12 +1697,15 @@ TVD_IP_SING_HEX
 # good enough
 TVD_PH_SUBJ_META
 
-# good enough
+# tflags net
 TVD_SPACE_ENCODED
 
-# good enough
+# tflags net
 TVD_SPACE_RATIO_MINFP
 
+# tflags net
+TVD_SUBJ_NUM_OBFU_MINFP
+
 # good enough
 TVD_VISIT_PHARMA
 
@@ -1871,7 +1874,7 @@ URI_MALWARE_SCMS
 # tflags userconf
 URI_NOVOWEL
 
-# tflags publish
+# tflags net
 URI_ONLY_MSGID_MALF
 
 # tflags publish
@@ -1898,7 +1901,7 @@ URI_WPADMIN
 # tflags publish
 URI_WP_DIRINDEX
 
-# tflags publish
+# tflags net
 URI_WP_HACKED
 
 # tflags publish