is could be parsed into parts for rules checking.
i.e.
headerIS_ADDRESSED_TO_ME To =~ /$local_email/
describe IS_ADDRESSED_TO_ME To: contains your email address
score IS_ADDRESSED_TO_ME -3.0
headerIS_FROM_MY_DOMAIN From =~ /$local_domain/
describe IS_FROM_MY_DOMAIN From s
At 09:08 AM 5/26/02 -0500, dman wrote:
>On Sat, May 25, 2002 at 06:53:08PM -0700, Scott Nelson wrote:
>| At 11:01 AM 5/25/02 -0500, dman wrote:
>| >
>| >That sounds bad to me. I clearly recall a section of RFC821 stating
>| >that an MTA MUST not mangle a message in any
n transmit, they convert to CRLF.
But there is a general agreement that no changes to the body
of an email should be done unless they are required or requested.
As long as this is a user selectable option, I don't see any
problem with it, though some might claim the default should be "
HOST Uses %-escapes inside a URL's hostname
score HTTP_ESCAPED_HOST 1.849
I think ESCAPES_DIGIT /%3[0-9]/ might be a good test too,
and not just inside URIs. Escaping /any/ character that
doesn't need to be is suspect.
Scott
of data,
even with no repeats. Even 100,000 spams aren't going
to impact the database enough to warrent trimming.
Scott Nelson <[EMAIL PROTECTED]>
___
Have big pipes? SourceForge.net is looking for download
$seconds1)*100 + ($microseconds2-$microseconds1);
push(@times, $et);
}
@t2 = sort(@times);
printf "%9d ASCII_FORM_ENTRY\n", $t2[5];
--- end test script ---
Those who are interested might want to look at
www.spamwolf.com/sa/test_maker.html
Scott Nelson <[EMAIL PROTECTED]>
__