Jo Rhett wrote:
> Included below is a legitimate e-mail on a legitimate payment that I
> did make.
> 
> I've looked at the rule, and I can't figure out why it failed.
> 

Well, partly it failed because you set your limit to 4 instead of 5.
You take a risk of false positives by doing that, since the rulesets are
optimised with a score of 5 in mind.

However, the "real" culprit seems to be SARE_FORGED_CITI, which is
defined thusly:

-----------------------
header   __RCVD_CITIBNK         Received =~
/(?:citi(?:bank|cards|corp|bankcards)|acxiom|c2it)\.com/i
header   __FROM_CITIBNK         From =~ /citi(?:bank)?\.com/i
uri      __URI_CITIBNK          /citi(?:bank)?\.com/i
meta     SARE_FORGED_CITI       (__FROM_CITIBNK && __URI_CITIBNK &&
!__RCVD_CITIBNK)
-----------------------

We see this in your headers from that email...

> Received:     from bigfootinteractive.com
(arm184.bigfootinteractive.com
> [206.132.3.184]) by triceratops.lizardarts.com (8.13.8/8.13.8)

...and come to the conclusion that this email does, in fact, have forged
Citibank headers.  In this case, it's a legitimate email, but it's still
forged. Shame on Citibank.

My suggestion for working around this?  Create a meta rule that negates
SARE_FORGED_CITI.

header   __FROM_CITI_BFI      Received =~ /bigfootinteractive\.com/I
meta     CITI_FROM_BFI        (SARE_FORGED_CITI && __FROM_CITI_BFI)
score    CITI_FROM_BFI        -4.0
describe CITI_FROM_BFI        CitiBank tells BFI to forge their headers

(Side note: Times I mistyped "BFI" as "BIF" -- about 10)

You could probably also rewrite SARE_FORGED_CITI, but that might break
if the author of the SARE ruleset changes it behind the scenes in a
later release.

Reply via email to