On 12/11/19 6:21 AM, KADAM, SIDDHESH wrote:
> Hi PFA...
>
> On 12/11/2019 12:36 AM, Giovanni Bechis wrote:
>> On 12/10/19 7:49 PM, Michael Storz wrote:
>> [...]
>>> My copy hit
>>>
>>> BODY_SINGLE_WORD=1.347, HTML_IMAGE_ONLY_04=1.172, MPART_ALT_DIFF=0.79
>>>
>>> not enough to mark it as spammy.
>
> hmmm, the machine has 4G of RAM and SA now takes 4.5.
> The check rund out of time but produces ~450K debug file.
>
> This is where it hangs:
>
> Dec 10 17:43:51.727 [9721] dbg: bayes: tokenized header: 211 tokens
What are the full counts if you put it through 'grep tokenized'
On 12/10/19 7:49 PM, Michael Storz wrote:
[...]
> My copy hit
>
> BODY_SINGLE_WORD=1.347, HTML_IMAGE_ONLY_04=1.172, MPART_ALT_DIFF=0.79
>
> not enough to mark it as spammy.
>
>
could you share a spample (as a pastebin uri or in private) ?
Giovanni
Am 2019-12-10 19:03, schrieb Joseph Brennan:
A user here reported a new twist on the bitcoin ransom mail. New to
me, anyway.
From: Casper Mitten
Sent: Monday, December 9, 2019 10:00 PM
The Subject was a single word, supposedly a password.
The message was a jpg picture of text.
Although it was
A user here reported a new twist on the bitcoin ransom mail. New to me,
anyway.
From: Casper Mitten
Sent: Monday, December 9, 2019 10:00 PM
The Subject was a single word, supposedly a password.
The message was a jpg picture of text.
Although it was in English, many vowels were accented special c
On Mon, Dec 09, 2019 at 10:54:00AM +0100, Matus UHLAR - fantomas wrote:
I'm afraid I can't provide clients' file.
I can only repeat:
- the mail is 20424329 bytes
- the mail contains single uuencoded .rar file inline.
-rw-rw-rw- 1 root root 14818832 Dec 9 10:50 'redacted.rar'
I have tried to r
On 2019-12-09 22:52, Daniel J. Luke wrote:
I uploaded a patch for postgresql on
https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7218 a while ago -
but I haven't had time to clean it up into something that should be
included into a release.
added this patch, seem to solve it
It might serve