On 10/15/2014 4:52 PM, Kevin A. McGrail wrote:
On 10/15/2014 4:49 PM, Ken Bass wrote:
1) My local.cf has a rule to address the new .link domain which spammers appear to be using recently:

uri LR_LINK_TLD /^(?:https?:\/\/|mailto:)[^\/]+\.link(?:\/|$)/i
describe LR_LINK_TLD  Contains a URL in the LINK top-level domain
score LR_LINK_TLD     3.0

2) The URIDNSBL rules are not being executed for these email either.

Debug of SA shows an empty domains to query: Huh?
Oct 15 16:24:55.416 [15519] dbg: uridnsbl: domains to query:

Here is the pastebin link to the full spam email:

http://pastebin.com/RJWyGkKB
The TLDs are hardcoded in SA 3.3.2. We are working on not having them hard-coded in 3.4.1.

I believe someone made a patch suitable for 3.3.2 but I can't find it at the moment.

Sorry but I think you might be confusing some specific TLD related rule issues rather than the more generic custom uri rules and uridnsbl rules that I am using. Because these work fine on OTHER emails. Something in specific emails, like the one in the above pastebin are causing the issue. I've got lots of other emails that hit the above LR_LINK_TLD and/or URIBL_DBL_SPAM.


Reply via email to