Re: SPOOFED_URL Re: antiphishing

2011-10-14 Thread darxus
Not relevant to the subject. We're talking about where somebody is maliciously making you think you're clicking on "www.youtube.com" when in fact you're clicking on "www.ILikeSpam.com". Somebody linking to one domain with an image hosted on another domain has plenty of possibility to be legit. Y

Re: SPOOFED_URL Re: antiphishing

2011-10-14 Thread Christian Grunfeld
you should be able to check against img src content, right? 2011/10/14 Christian Grunfeld : > and what about when there is no anchor text in the link ? eg. paypal > image button > > > 2011/10/14  : >> Existing rule: >> >> rawbody  __SPOOFED_URL  m/]{0,2048}\bhref=(?:3D)?.?(https?:[^>"'\# >> ]{8,

Re: SPOOFED_URL Re: antiphishing

2011-10-14 Thread darxus
None of these rules will hit that. That's what the second "http" is for. "Hit the host name part of the href value of an anchor tag, then do *not* match the same host name in the value part of the anchor, then hit 'href'". I should've called it SPOOFED_URL_HOST, because this one is matching the f

Re: New Bayes like paradigm

2011-10-14 Thread darxus
On 10/13, Adam Katz wrote: > PS: As an SA Committer, do I have access to those logs? Don't think so, but you can just ask for a regular masscheck account if you don't already have one, and with that account do: rsync --exclude '*~' -vaz "rsync.spamassassin.org::corpus" ./ -- "I'd rather be hap

Re: SPOOFED_URL Re: antiphishing

2011-10-14 Thread Christian Grunfeld
and what about when there is no anchor text in the link ? eg. paypal image button 2011/10/14 : > Existing rule: > > rawbody  __SPOOFED_URL  m/]{0,2048}\bhref=(?:3D)?.?(https?:[^>"'\# > ]{8,29}[^>"'\# > :\/?&=])[^>]{0,2048}>(?:[^<]{0,1024}<(?!\/a)[^>]{1,1024}>){0,99}\s{0,10}(?!\1)https?[^\w<]{1

Re: SPOOFED_URL Re: antiphishing

2011-10-14 Thread darxus
Existing rule: rawbody __SPOOFED_URL m/]{0,2048}\bhref=(?:3D)?.?(https?:[^>"'\# ]{8,29}[^>"'\# :\/?&=])[^>]{0,2048}>(?:[^<]{0,1024}<(?!\/a)[^>]{1,1024}>){0,99}\s{0,10}(?!\1)https?[^\w<]{1,3}[^<]{5}/i How about this, to only check for a changed domain part instead? rawbody SPOOFED_URL_DOMAIN

SPOOFED_URL Re: antiphishing

2011-10-14 Thread darxus
On 10/14, dar...@chaosreigns.com wrote: > rawbody __SPOOFED_URL > m/]{0,2048}\bhref=(?:3D)?.?(https?:[^>"'\# ]{8,29}[^>"'\# > :\/?&=])[^>]{0,2048}>(?:[^<]{0,1024}<(?!\/a)[^>]{1,1024}>){0,99}\s{0,10}(?!\1)https?[^\w<]{1,3}[^<]{5}/i > I agree it seems like we should be able to improve it.

Re: antiphishing

2011-10-14 Thread darxus
On 10/14, Matus UHLAR - fantomas wrote: > While I have no doubt there is much of wanted mail with URL and text > mismatch, I still would like to have such rule. It exists, you're welcome to copy it out of the rules sandbox and use it, false positives and all. I already linked to it: http://svn.ap

Re: antiphishing

2011-10-14 Thread Matus UHLAR - fantomas
On 10/12, Christian Grunfeld wrote: Many phishing mails exploit the bad knowledge of the difference between real url and link anchor text by simple users. So they show On 10/12/2011 2:25 PM, dar...@chaosreigns.com wrote: Does spamassassin really not have a rule to detect this? I just dug up

Monthly tested unofficial Ubuntu releases of SpamAssassin

2011-10-14 Thread darxus
The official spamassasin release process drives me nuts, so I set up almost completely automated monthly releases for Ubuntu. Packages in this PPA have been tested at least by me on my server for a month: https://launchpad.net/~spamassassin/+archive/spamassassin-monthly The version I'm currently

Re: Good bye RCVD_IN_HOSTKARMA_BL

2011-10-14 Thread Marc Perkel
On 10/13/2011 9:43 PM, Rob McEwen wrote: On 10/14/2011 12:05 AM, Marc Perkel wrote: OK - I didn't deliberately blacklist them. I found a bug in my yellow listing code No system or person or group of people is perfect and we ALL make mistakes... even big mistakes from time to time... and even