On 11/7/2013 10:40 AM, emailitis.com wrote:

I am getting lots of Spam which shows on the maillog as:

Nov 7 10:50:39 plesk3 qmail-scanner-queue.pl: qmail-scanner[6974]: Clear:RC:0(217.92.121.114):SA:1(5.9/5.0): 9.209114 16127 fr...@aexp.com <mailto:fr...@aexp.com>

Or

Nov 7 10:15:36 plesk3 spamdyke[26254]: ALLOWED from: administrator+98453-927...@dcbltd.exvm.com to: u...@domain.com origin_ip: 193.133.125.41 origin_rdns: mta18.evmailer.com auth: (unknown) encryption: (none) reason:

250_ok_1383819336_qp_26270

I want to write some custom rules that can capture part of this (because on the actual emails, the sender often purports to be from someone totally different). Will the following work in my custom_rules.cf?:

header AEXP_ALL  ALL =~ /aexp\.com/i

score AEXP_ALL 4

header EXVM_ALL ALL =~ /exvm\.com/i

score AEXP_ALL 4


That will work, but you should watch for false positives. I would suggest anchoring it a bit as a first step.

header AEXP_ALL  ALL =~ /\baexp\.com\b/i

This will catch any emails that have the string "aexp.com" anywhere in the header. The "\b" represents a word boundary so that "u...@aexp.com" or "blah.aexp.com" will match, but "naexp.com" will not.

--
Bowie

Reply via email to