I got one today that wasn't caught by your rule it had 22232 for the domain name inside of www and net and used bracket dot bracket for the separator.

Mike


On Jul 16, 2009, at 6:23 PM, McDonald, Dan wrote:

On Fri, 2009-07-17 at 00:04 +0200, Michelle Konzack wrote:
Good Evening,

Am 2009-07-16 23:42:44, schrieb Karsten Bräckelmann:
On Fri, 2009-07-17 at 00:37 +0300, Ibrahim Harrani wrote:
Is this rule available via updates.spamassassin.org sa-update channel?

Nope.  It's living in a sandbox.

http://svn.apache.org/viewvc/spamassassin/trunk/rulesrc/sandbox/jhardin/20_uri_obfu_ws.cf

And it does not work...  :-(

Gotten today more then 2800 of this ${STRONG_WORD_HERE}.

Have you tried my rule? I've caught 401 of them since I updated it this
morning.  It's also got a little surprise for the next logical
variant...

body __MED_OB /\bw{2,3}(?:[[:punct:][:space:]]{1,5}|[[:space:] [:punct:]]{1,3}dot[[:space:][:punct:]]{1,3})[[:alpha:]]{2,6}\d{2,6} (?:[[:punct:][:space:]]{1,5}|[[:space:][:punct:]]{1,3}dot[[:space:] [:punct:]]{1,3})(?:c\s?o\s?m|n\s?e\s?t|o\s?r\s?g)\b/i
body    __MED_NOT_OB    /\bw{2,3}\.[[:alpha:]]{2,6}\d{2,6}\.(?:com|net|
org)\b/i
meta    AE_MED44        (__MED_OB && ! __MED_NOT_OB)
describe        AE_MED44        Shorter rule to catch spam obfuscation
score   AE_MED44        2.0



Thanks, Greetings and nice Day/Evening
   Michelle Konzack
   Systemadministrator
   Tamay Dogan Network
   Debian GNU/Linux Consultant


--
Daniel J McDonald, CCIE # 2495, CISSP # 78281, CNX
www.austinenergy.com

Reply via email to