Chris Santerre wrote:
-----Original Message-----
From: mouss [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 20, 2006 6:12 PM
To: SpamAssassin
Subject: Re: FP: URI_NOVOWEL
Theo Van Dinter wrote:
On Tue, Sep 19, 2006 at 10:58:46PM +0200, mouss wrote:
URI_NOVOWEL fires with things like href="#id" where id is
a string that
starts with 7 "no-vowel" chars.
uri URI_NOVOWEL
m%^https?://[^/?]*[bcdfghjklmnpqrstvwxz]{7}%i
uri URI_NOVOWEL
m%^https?://[^/?\#]*[bcdfghjklmnpqrstvwxz]{7}%i
is this correct?
Well I changed the RE a bit for testing:
uri URI_NOVOWEL /https?\:\/\/[^\/?\#]*[bcdfghjklmnpqrstvwxz]{7}/i
describe URI_NOVOWEL testing for MOUSS
score URI_NOVOWEL 0.75
Initial tests show a few problems...(verified ham hits)
http://www.phpwcms.....
http://trkcnfrm......
http://BlankBkgrd....
http://SearchSQLS.....
http://www.astdhpph.....
http://libctxssl.......
http://sccrmxc.......
http://pluginsnppdf.......
It does however have some potential,
Spam hits: 400 Ham hits: 3 S/O: 0.889
Spam hits: 1747 Ham hits: 6 S/O: 0.987
Spam hits: 2754 Ham Hits: 4 S/O: 0.997
Spam hits: 1976 Ham Hits: 15 S/O: 0.975
Hope that helps a bit!
Thanks chris, this is very helpful.
So the test catches legitimate URIs. an immediate improvement is
uri URI_NOVOWEL /https?\:\/\/[bcdfghjklmnpqrstvwxz]{7}/i
because the goal is to catch URIs with random hostname parts. Of course,
they can still put that in the middle, aka www $dot random $dot
domain.example. but I didn't see that yet. An alternative is to disable
the rule?
(For some reason I'm being rejected to posting to SAUSERs with a 500: PHISH
elsewhere. Please reply to the list with this for others to see. I'm trying
to get it resolved.)
PHISH???? they must have some broken rules...