On 2014-02-09 22:07, Marc Perkel wrote:
The list is just auth fooled users over the last 30 days.
could you track, sender domains from auth fooled ips, is sender domain
dnssec or not ?
this would be usefull data to collect
On 2/10/2014 12:14 PM, Axb wrote:
On 02/10/2014 05:16 PM, Joe Quinn wrote:
I've attached a munged example of a strange pattern we've just started
getting.
It consists of BODY_8BITS, plus an empty text/plain, nearly empty
text/html, and some other office attachment.
Is there a good way to match
On 02/10/2014 05:16 PM, Joe Quinn wrote:
I've attached a munged example of a strange pattern we've just started
getting.
It consists of BODY_8BITS, plus an empty text/plain, nearly empty
text/html, and some other office attachment.
Is there a good way to match for the empty plain and html parts
I've attached a munged example of a strange pattern we've just started
getting.
It consists of BODY_8BITS, plus an empty text/plain, nearly empty
text/html, and some other office attachment.
Is there a good way to match for the empty plain and html parts? The
__KAM_BODY_LENGTH_LT_XXX rules a
On 2/7/2014 7:49 AM, Torge Husfeldt wrote:
Hi list,
I hope I triggered a constructive and useful discussion here.
In between I realized my data was skewed and I wanted to apologize for
that.
The peak in load happened when I rolled out the rule-set which was
running fine on one machine to the w