|Main Archive Page > Month Archives > spamassassin-users archives|
On 01/14/2011 01:09 PM, Ned Slider wrote:
> On 14/01/11 21:04, Warren Togami Jr. wrote:
>> Anyone else have effective local rules? Please let me know and I'll put
>> them into the nightly masscheck for testing.
> header NSL_RCVD_HELO_USER Received =~ /helo[= ]user\)/i
> describe NSL_RCVD_HELO_USER Received from HELO User
> Might want to combine into a meta rule with existing NSL_RCVD_FROM_USER
> header NSL_RCVD_FROM_USER Received =~ /from User [\[\(]/
> describe NSL_RCVD_FROM_USER Received from User
> The above are particularly effective (here) against 419 / bank phish
> type emails sent from compromised webmail accounts. Hit rate is not
> great, but the FP count is near zero.
Both of the above rules are already in
0.5% spam hit rate, and some ham hits, however they are all in the
ancient enron corpus that we will soon be removing.
Very few spam hits, and a number of ham hits but all in DOS's corpus.
Perhaps we should ask him if they really are ham?
Could you please describe how these rules work, and why the combination
of them would be useful?
NSL_RCVD_FROM_USER already has a score.
It appears that the combination of the two rules will be zero masscheck
FP's, but a maximum of 0.1% spam hits. I suppose this is worthwhile for
a night of testing, but I suspect it will be too small?