We've been receiving a lot of spam lately which is waltzing right through the 
spam filters.  I've trained a thousand or more yesterday (we only get around 
3-5 thousand legitimate messages a day), but of course it is always changing 
slightly, and comes from sources that most often aren't yet in any RBLs.

The spam is HTML mail and one thing I've noticed is that there is a large 
number of html break codes in the body, pushing the 'unsubscribe' down below 
the bottom of the screen.  (FWIW, clicking on an unsub link generally fires a 
warning from TrendMicro about the site being compromised.)

Anyway, I'm trying to write a local rule that will scan for 5 or more instances 
of "<br>" but not having much luck.  I'm testing first on the CLI, just trying 
to get the syntax down.  

What works:
I have a file called DomainLiterals.txt with repeating characters and it 
returns expected results:
mkm@mis-mkm-lnx:~$ egrep \[10.]{3} DomainLiterals.txt 
you can add a line containing only [10.10.10.10] to /etc/mail/local-host-names 
where 10.10.10.10 is the IP address you 

However, doing this fails:
mxg:/var/spool/MailScanner/quarantine/20110421/nonspam # egrep \[<br>]{5,} 
p3LJZSnX024470
-bash: br: No such file or directory

The file p3LJZSnX024470 is just a plain text file in a quarantine directory.

What am I missing?  I'll turn this into a body rule once I get the syntax right 
then test it for a day or so w/a score of .01.  If I'm not hitting legitimate 
mail I'll bump it up.

Thanks...

...Kevin
--
Kevin Miller                Registered Linux User No: 307357
CBJ MIS Dept.               Network Systems Admin., Mail Admin.
155 South Seward Street     ph: (907) 586-0242
Juneau, Alaska 99801        fax: (907 586-4500

Reply via email to