On Fri, 20 Aug 2010, Karsten Br�ckelmann wrote:

On Fri, 2010-08-20 at 17:47 +0200, Karsten Bräckelmann wrote:
On Fri, 2010-08-20 at 17:12 +0200, Jan P. Kessler wrote:
false-positives hitting on the rules JM_SOUGHT_1 and JM_SOUGHT_2. Unfortunaley I can not give examples as these messages contain confidental customer data (assurance company). We had more than 100 false-positives with these rules in the last 2 days.

I hope you can tell us the __SEEK_* sub-rules triggered, though. That would help already. To extract these, either (a) pipe such a message to spamassassin -D, and get the sub-rule from the debug output, or (b) add a specific header only showing the sub-rules.

A word of caution: Do note that the seek sub-rules' names are generated using a hash function, and thus identify the actual string matched!

You might want to check the string in 20_sought.cf, before disclosing
the seek ID. I'd be surprised if it contains sensitive data, tough --
after all, it is found massively in spam.

...as well as in SA SVN. The matches can't be confidential as they're generated from public sources. The non-matching bits are what is confidential.

I agree with Karsten, it's most likely disclaimer text that doesn't have a ham exclusion in the SOUGHT rule generator.

--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 jhar...@impsec.org    FALaholic #11174     pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  I'll have that son of a bitch eating out of dumpsters in less than
  two years.       -- MS CEO Steve Ballmer, on RedHat CEO Matt Szulik
-----------------------------------------------------------------------
 4 days until the 1931st anniversary of the destruction of Pompeii

Reply via email to