On 2013-08-13 14:25, David F. Skoll wrote:
I'm seeing a fair bit of spam from the null return path.  That is,
MAIL From:<> (or in the headers, Return-Path: <>).  A lot of this
spam lacks any MIME headers (MIME-Version:, Content-Type:)

I've experimented with a rule that adds points in this situation; most
legitimate DSNs have a MIME-Version: header.

So would anyone care to test this:

meta DSN_NO_MIMEVERSION (__BOUNCE_RPATH_NULL && !__MIME_VERSION)
describe DSN_NO_MIMEVERSION Return-Path <> and no MIME-Version: header
score DSN_NO_MIMEVERSION 2

The rules __BOUNCE_RPATH_NULL and __MIME_VERSION come from
20_vbounce.cf and 20_head_tests.cf respectively and look like this:

header __BOUNCE_RPATH_NULL    Return-Path =~ /<>/
header __MIME_VERSION         exists:MIME-Version

I'm unable to test the exact rule as BATV has resolved my backscatter problem completely. However, prior to implementing BATV, I experimented with similar techniques with very high success rates.

I started off accepting BATV-failing messages and quarantining them, but nobody ever missed them, so I started rejecting them, probably 3-4 years ago.

--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren

Reply via email to