I just got the spam below (headers removed except few).

this hasn't been caught at reception time. It now triggers RCVD_IN_BL_SPAMCOP_NET.

however, it doesn't trigger surbl checks, since the '&' is considered as the end of the url.
        debug: URIDNSBL: domains to query: ins.com nusv.com
and I was surprised that the following works:
# host "nusv.com&wnrsyaidip4elp2wjw0z1li.henogenyhb.com"
nusv.com&wnrsyaidip4elp2wjw0z1li.henogenyhb-MUNGED.com has address 221.11.133.42

would it be reasonable to add a rule to check for anomalies in URLs? what's the best (TM) way?

another note is that the host (221.3.157.245) issues a helo of mx.adelphia.net, but 221.3.157.245 is in China while mx.adelphia.net is in US. shouldn't this trigger a forged helo? one can also see that the from addr is in .il (let's ignore the msg id). that makes 3 distant parts of the world:)



--------------- spam follows -----------------
...
Received: from unknown (HELO mx.adelphia.net) (221.3.157.245)
        ...
message-id: <[EMAIL PROTECTED]>
From: "Keeley Tate" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Subject: It isn't too good to be true. angelfish


When it comes to applications like MS Office, or Windows etc. they ask a pretty penny. We figured, scrap the manual, scrap the box, you really only need the CD so thats what we did.

You can have the CD's sent to you, or download instead, your choice.


For downloading - Browse up http://nusv.com&wnrsyaidip4elp2wjw0z1li.henogenyhb-MUNGED.com/ For shipped CD's - Browse up http://ins.com&dwpw3ibhdwafswlbxe.henogenyhb-MUNGED.com/


You'll be shocked at our pricing.

Reply via email to