Mailing List Archive

svn commit: rev 6858 - incubator/spamassassin/trunk/rules
Author: quinlan
Date: Wed Feb 25 19:10:52 2004
New Revision: 6858

Modified:
incubator/spamassassin/trunk/rules/20_head_tests.cf
incubator/spamassassin/trunk/rules/70_testing.cf
Log:
delete some poor rules


Modified: incubator/spamassassin/trunk/rules/20_head_tests.cf
==============================================================================
--- incubator/spamassassin/trunk/rules/20_head_tests.cf (original)
+++ incubator/spamassassin/trunk/rules/20_head_tests.cf Wed Feb 25 19:10:52 2004
@@ -749,12 +749,3 @@
header X_ORIG_IP_NOT_IPV4 X-Originating-IP !~ /\[?(?:\d{1,3}\.){3}\d{1,3}\]?/ [if-unset: 0.0.0.0]
describe X_ORIG_IP_NOT_IPV4 X-Originating-IP doesn't look like IPv4 address

-# Hotmail's DAV interface uses this and it's heavily exploited right now. As
-# far as I can tell, it requires an msn.com or hotmail.com X-Originating-Email:
-# but allows anything for From: so use that as a spamsign.
-header __HAS_MSN_RCVD_DAV Received =~ / by \S+\.(?:hotmail|msn)\.com with (?:HTTP|DAV)\;/
-header __HAS_MSN_ORIG_EMAIL X-Originating-Email =~ /(?:hotmail|msn)\.com\b/
-header __HAS_MSN_FROM From =~ /(?:hotmail|msn)\.com\b/
-meta FAKED_HOTMAIL_DAV (__HAS_MSN_RCVD_DAV && __HAS_MSN_ORIG_EMAIL && !__HAS_MSN_FROM)
-describe FAKED_HOTMAIL_DAV X-Originating-Email header does not match From
-

Modified: incubator/spamassassin/trunk/rules/70_testing.cf
==============================================================================
--- incubator/spamassassin/trunk/rules/70_testing.cf (original)
+++ incubator/spamassassin/trunk/rules/70_testing.cf Wed Feb 25 19:10:52 2004
@@ -41,21 +41,14 @@
# 0.093 0.1201 0.0000 1.000 0.93 0.01 T_SPRINTF_5X
full T_SPRINTF_5X /[^-][A-F1-9][A-F0-9]{5,7}-[A-F1-9][A-F0-9]{5,7}-[A-F1-9][A-F0-9]{5,7}-[A-F1-9][A-F0-9]{5,7}-[A-F1-9][A-F0-9]{5,7}[^-]/

-# (time_t/4444)
-# low hit rate
-# 0.115 0.1174 0.1061 0.525 0.13 0.01 T_TIME_OVER_4444
-header T_TIME_OVER_4444 ALL =~ /\D23[67][0-9][0-9][0-9]\D/
-
# replacements for PORN_4; split out sub-patterns as some are more FP-prone
# than others.
-uri T_PORN_URL_XXX /^https?:\/\/[\w\.-]*xxx[\w-]*\./
uri T_PORN_URL_SEX /^https?:\/\/[\w\.-]*(?<!es|ba)(?<!dle|sus)sex(?!press)[\w-]*\./
uri T_PORN_URL_ANAL /^https?:\/\/[\w\.-]*anal(?!og|y[sz])[\w-]*\./
uri T_PORN_URL_SLUT /^https?:\/\/[\w\.-]*slut[\w-]*\./
uri T_PORN_URL_CUM /^https?:\/\/[\w\.-]*(?<!cir)(?<!\bdo)cum(?!ul|be?r|b?en)[\w-]*\./
uri T_PORN_URL_LUST /^https?:\/\/[\w\.-]*lust(?!(?<=illust)(?:rat|rious)|(?<=clust)er)[\w-]*\./
uri T_PORN_URL_PANT /^https?:\/\/[\w\.-]*pant(?:y|ies)[\w-]*\./
-uri T_PORN_URL_SUCK /^https?:\/\/[\w\.-]*suck[\w-]*\./
uri T_PORN_URL_TEEN /^https?:\/\/[\w\.-]*(?<!thir|four|eigh|nine)(?<!fif|six)(?<!seven)teen(?!th)[\w-]*\./
uri T_PORN_URL_MISC /^https?:\/\/[\w\.-]*(pussy|nympho|porn|hard-?core|taboo|whore|voyeur|lesbian|gurlpages|naughty|lolita|schoolgirl|kooloffer|erotic)[\w-]*\./

@@ -167,8 +160,6 @@
header T_FROM_DELPHI From:addr =~ /\d[^\@]+\d[^\@]+\@delphi\.com/i
header T_FROM_DELPHI_BASIC From:addr =~ /\@delphi\.com/i

-body T_RANDO_MIZE /\$RAN[DOMI]*\s+[DOMI]*ZE/
-
# great Yahoo! forgery rule, but is it going to be stable?
header __YAHOO_MSGID Message-ID =~ /\@yahoo\.com>/i
header __YAHOO_BEGINNING Message-ID =~ /<\S+(?:\.\S+|\.\S+\.\S+\.\S+)\@/
@@ -385,7 +376,6 @@
header T_HELO_DYNAMIC_ATTBI X-Spam-Relays-Untrusted =~ /^[^\]]+ helo=\S+\d+\S+\.client2\.attbi\.com/i
# pcp04024417pcs.toresd01.pa.comcast.net [68.86.206.126]
# bgp542174bgs.ewndsr01.nj.comcast.net[68.38.144.91]
-header T_HELO_DYNAMIC_COMCAST X-Spam-Relays-Untrusted =~ /^[^\]]+ helo=(?:pcp|bgp)\S+(?:pcs|bgs)\.comcast\.net/i
# CPE0004e2372711-CM000a73666706.cpe.net.cable.rogers.com
# CPE00e0184f0eba-CM014490118324.cpe.net.cable.rogers.com [24.43.109.140]
header T_HELO_DYNAMIC_ROGERS X-Spam-Relays-Untrusted =~ /^[^\]]+ helo=CPE\d+\S+\.rogers\.com/i
@@ -436,7 +426,6 @@
# pool-151-203-32-68.bos.east.verizon.net [151.203.32.68]
# 12-218-225-223.client.mchsi.com [12.218.225.223]

-
# bug 2992: Proposed new rules, Martin Radford
header T_RCVD_DOUBLE_IP Received =~ /from \[\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\] by \d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3} with/
describe T_RCVD_DOUBLE_IP Bulk email fingerprint (double IP) found
@@ -491,11 +480,6 @@
# same ratware; forges dates as 'with SMTP; Jan, 17 2004 22:05:48 -0300'
header T_DATE_COMMA Received =~ /\bwith \S+\; [A-Z][a-z][a-z],\s+\d\d\s+\d\d\d\d\s/

-# bug 3028, make HAS_MSG_FROM2 case insensitive -- also trying to ignore
-# anything not an address
-header __HAS_MSN_FROM2 From:addr =~ /(?:hotmail|msn)\.com/i
-meta T_FAKED_HOTMAIL_DAV (__HAS_MSN_RCVD_DAV && __HAS_MSN_ORIG_EMAIL && !__HAS_MSN_FROM2)
-
# some HTML rules to try
body T_HTML_TAG_BALANCE_FONT_0 eval:html_tag_balance('font', '!= 0')
describe T_HTML_TAG_BALANCE_FONT_0 HTML has unbalanced "font" tags
@@ -537,9 +521,6 @@

header T_RATWARE_FAKED_AOL_UA User-Agent =~ /^AOL /
describe T_RATWARE_FAKED_AOL_UA AOL clients don't use the User-Agent header
-
-uri T_URI_HTTP_TO_HEX_IP /^https?:\/\/(?:[^\@]*\@|)0x[0-9a-f]{8}/i
-describe T_URI_HTTP_TO_HEX_IP URI contains a link to a hexadecimal IP address

# bug 2996: HTML attribute testing
body T_HTML_ATTR_00_10 eval:html_range('attr_bad','0.0','0.1')