It is a list of obsolete uris.
Sent from ProtonMail Mobile
On Fri, Oct 14, 2016 at 10:30 AM, Nicola Piazzi
wrote:
> ABUSE.CH mantains an updated lists of ramsonware lists, here the txt file
> link :
>
> https://ransomwaretracker.abuse.ch/downloads/RW_URLBL.txt
>
> It is very simple to make a s
My only comment on this is that shell scripting is a completely inappropriate
language to use for this. Use a real language like Perl, Python, Ruby, or
whatever.
Regards,
Dianne.
On 07/16/17 06:07, Ian Zimmerman wrote:
But one still needs to signal rbldnsd to reload the data, right?
nope... no need to signal rbldnsd
see -c switch
On 2017-07-15 12:19, David B Funk wrote:
> Another way to use that data is to extract the hostnames and feed them
> into a local URI-dnsbl.
> Using "rbldnsd" is an easy to maintain, lightweight (low CPU/RAM
> overhead) way to implement a local DNSbl for multiple purposes (EG an
> IP-addr based li
On Sat, 15 Jul 2017 13:13:31 -0500 (CDT)
David B Funk wrote:
> > On Sat, 15 Jul 2017, Antony Stone wrote:
> One observation; that list has over 10,000 entries which means that
> you're going to be adding thousands of additional rules to SA on an
> automated basis.
>
> Some time in the past other
Ahuhaauahu ok ok
Thankyou for replay
--
View this message in context:
http://spamassassin.1065346.n5.nabble.com/ramsonware-URI-list-tp122939p135315.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.
On 7/15/2017 2:13 PM, David B Funk wrote:
How quickly do stale entries get removed from it?
I randomly sorted this list, then I tried visiting 10 randomly selected
links. I know that isn't a very large sample size, but it is a strong
indicator since they were purely randomly chosen. 9 of the
On Sat, 2017-07-15 at 09:59 -0700, Ian Zimmerman wrote:
> On 2017-07-15 11:59, Antony Stone wrote:
>
> > Maybe other people have further optimisations.
>
> With awk already part of the pipeline, all those seds are screaming
> for
> a vacation.
>
Indeed. I think the whole job can be done fairly e
On Sat, 15 Jul 2017, Antony Stone wrote:
On Saturday 15 July 2017 at 11:19:54, mastered wrote:
Hi Nicola,
I'm not good at SHELL script language, but this might be fine:
1 - Save file into lista.txt
2 - trasform lista.txt in spamassassin rules:
cat lista.txt | sed s'/http:\/\///' | sed s'/\
On Sat, 15 Jul 2017, Antony Stone wrote:
On Saturday 15 July 2017 at 11:19:54, mastered wrote:
Hi Nicola,
I'm not good at SHELL script language, but this might be fine:
1 - Save file into lista.txt
2 - trasform lista.txt in spamassassin rules:
cat lista.txt | sed s'/http:\/\///' | sed s'/\
On 2017-07-15 11:59, Antony Stone wrote:
> Maybe other people have further optimisations.
With awk already part of the pipeline, all those seds are screaming for
a vacation.
Also, isn't the following command just a no-op?
sed -n p
A couple of quick tests failed to detect any difference from ca
On Saturday 15 July 2017 at 11:19:54, mastered wrote:
> Hi Nicola,
>
> I'm not good at SHELL script language, but this might be fine:
>
> 1 - Save file into lista.txt
>
> 2 - trasform lista.txt in spamassassin rules:
>
> cat lista.txt | sed s'/http:\/\///' | sed s'/\/.*//' | sed s'/\./\\./g' |
done | sed s'/;/ /g' > blacklist.cf
If anyone can optimize it, i'm happy.
Alberto.
--
View this message in context:
http://spamassassin.1065346.n5.nabble.com/ramsonware-URI-list-tp122939p135313.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.
COMET s.p.a.
Via Michelino, 105 - 40127 Bologna – Italia
Tel. +39 051.6079.293
Cell. +39 328.21.73.470
Web: www.gruppocomet.it
-Messaggio originale-
Da: Axb [mailto:axb.li...@gmail.com]
Inviato: venerdì 14 ottobre 2016 10:41
A: users@spamassassin.apache.org
Oggetto: Re: ramsonware URI
On 10/14/2016 10:30 AM, Nicola Piazzi wrote:
ABUSE.CH mantains an updated lists of ramsonware lists, here the txt file link :
https://ransomwaretracker.abuse.ch/downloads/RW_URLBL.txt
It is very simple to make a shell script that check file changes every hour,
download if there is a new one, an
ABUSE.CH mantains an updated lists of ramsonware lists, here the txt file link :
https://ransomwaretracker.abuse.ch/downloads/RW_URLBL.txt
It is very simple to make a shell script that check file changes every hour,
download if there is a new one, and write a rule .cf using data contained in
the
16 matches
Mail list logo