Gary Forrest wrote:
> Hi All
>
> We are receiving the same image spam many times, random text within the  
> body.
> The only common thing is a image attachment, with the filename in the  
> following format
>
>   DSL1234.png
>
> I have made the following ' RAWBODY ' rule
>
> /dsl[0-9]{4}\.png/i
>
> This rule works if the text appears in the body, when testing with a  
> hand telnet to port 25, but fails in practice.
> I think this is because the  RAWBODY rule does not search the text of a  
> attachment.
>
> example text of a spam
>
> ------=_NextPart_000_0075_01C9C5DF.A7950570
> Content-Type: image/png;
>        name="DSL6672.png"
> Content-Transfer-Encoding: base64
> Content-ID: <a0ff8910$101f730d$6c822ecf>
> Content-Disposition: inline
>
> Any ideas ?

mimeheader LOCAL_DSL_ATTACHMENT Content-Type =~ /name="dsl[0-9]{4}\.png"/i
(Untested.)

Hope this helps,

James.

-- 
E-mail:     james@ | top! to bottom from or backwards read not do I, post top
aprilcottage.co.uk | not do Please
                   |     -- Jeff Vian

Reply via email to