On Thu, 25 Feb 2021, Jared Hall wrote:

On 2/24/2021 9:43 PM, John Hardin wrote:

The __XM_RANDOM header rule is intended to catch the specific condition of the email, the scored XM_RANDOM meta is intended to add points for when that condition indicates spam.

Ouch, I figured as much.  With a name like XM_RANDOM, it's gotta be good :)

I recall about 10 years ago getting floods with (pseudo)random (eg: qxvfdgeexcfffdf, etc) type mailers.  I was just wondering if this was artifactual.

It's current. Somebody decided to send a large spam campaign using forged sender addresses in my wife's domain, so I got a lot of NDA bounces with spam content I don't usually see. There were a lot of random gibberish mailers, as well as some that look plausible at a glance but suspicious upon further consideration.

I got a bunch of new rules off that so I'm not complaining too hard.

  I don't know if you Guys (pc: and Gals)  keep notes when each rule gets developed and what not.  But that's not really a question for this list, so No Big Deal.

For myself, not beyond the SVN history.

I've been scanning all outbound Email for 3-1/2 years now.  I scan at the SMTP level, with no discernible performance hit.  It certainly has saved my butt on a few occasions.  Now I *opine* this:  There is something to the  ZERO-TRUST security model.

Hm, yeah.


--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 jhar...@impsec.org                         pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  Where are my space habitats? Where is my flying car?
  It's 2010 and all I got from the SF books of my youth
  is the lousy dystopian government.                      -- perlhaqr
-----------------------------------------------------------------------
 271 days since the first private commercial manned orbital mission (SpaceX)

Reply via email to