On 14/03/12 03:09, David B Funk wrote:
On Tue, 13 Mar 2012, Alex wrote:

Hi,

http://pastebin.com/raw.php?i=iquXBnH0

While I could create a rule to block this specific domain, or submit
it to a RBL, I'd appreciate any ideas how to more generally block
them, rather than by one characteristic in the message.

We need more examples.

That just occurred to me that it would help. Here are a few similar
ones, but these hit bayes99:

http://pastebin.com/raw.php?i=Axgx8qSP
http://pastebin.com/raw.php?i=7iU2MnP7

Here is an example more closely relating to the first one. Hit only
bayes50, no subject, freemail, very similar short body:

http://pastebin.com/raw.php?i=juvD9yzS

Thanks,
Alex

Note that URL, yet another p0ned WordPress website (the
"/wp-content/plugins/" stuff). Now you get a hint of why I hate
"install-and-forget" websites.
When ever I run into p0ned websites their domain name goes into my
private URIBL list. They don't get spam past me again.


Here's a rule to catch that:

# URIs matching http://some.domain.com/wp-content/plugins/
uri             LOCAL_URI_WPCONTENT     m{https?://[^/]+/wp-content/plugins/}
describe        LOCAL_URI_WPCONTENT     Spammy URI with /wp-content/plugins/

I have similar rules for other hacked site templates and they work quite well.


One clue: "X-Originating-IP: [41.189.207.189]"
Check the various RBL hits on that address. ;)


Or if you don't expect to receive email from Africa then just score this quite heavily. There are already non-scoring meta rules in place:

$ grep FROM_41 *.cf
72_active.cf: meta __FROM_41_FREEMAIL (__NSL_ORIG_FROM_41 || __NSL_RCVD_FROM_41) && (FREEMAIL_FROM || FREEMAIL_REPLYTO) && !__THREADED 72_active.cf: describe __FROM_41_FREEMAIL Sent from Africa + freemail provider 72_active.cf:header __NSL_ORIG_FROM_41 X-Originating-IP =~ /^(?:.+\[)?41\./ 72_active.cf:describe __NSL_ORIG_FROM_41 Originates from 41.0.0.0/8 72_active.cf:header __NSL_RCVD_FROM_41 X-Spam-Relays-External =~ / ip=41\./ 72_active.cf:describe __NSL_RCVD_FROM_41 Received from 41.0.0.0/8



Reply via email to