>
> Also of note it looks like the thing has some bugs in it.. it would appear
> that $RANDOMIZE is intended to be replaced with random words, but in a few
> spots, a $RANDOMIZE got split with a newline in between. It might be
> interesting to do a rule to look for it which has some \s?'s added in.
>
> Something like this rule (note: untested, just conceptual off the top of my
> head)
>
> body LOCAL_RANDOMIZE_SPLIT /\$R\s?A\s?N\s?D\s?O\s?M\s?I\s?Z\s?E/

Sounds good. I'll give something like that a try.

But I wonder if the spammers might not just fix that bug at some point, and use
their current subterfuge of lots of random words whited out by the font,
and URL indirection?

Would it make sense for SA, to detect URL indirection and assert a spam
tag? Also would it make sense for SA's canonical HTML processing to simply
delete
"whited out" text from the body text that is subsequently processed?
(admittedly,
a full "white out" test would have to match the foreground with the current
background
color, rather than just looking for <font color="#ffffff">, but color="#ffffff"
would
still catch most of the spam uses of this trick.




-------------------------------------------------------
This SF.Net email sponsored by: Free pre-built ASP.NET sites including
Data Reports, E-commerce, Portals, and Forums are available now.
Download today and enter to win an XBOX or Visual Studio .NET.
http://aspnet.click-url.com/go/psa00100003ave/direct;at.aspnet_072303_01/01
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to