diff options
author | twesterhever <40121680+twesterhever@users.noreply.github.com> | 2024-11-04 11:59:22 +0000 |
---|---|---|
committer | twesterhever <40121680+twesterhever@users.noreply.github.com> | 2024-11-04 11:59:22 +0000 |
commit | cb3bbb54eadf5e4148ffdad856ba4961c8a78118 (patch) | |
tree | cebd2f0bdbd5c81d053e31cbf43bc69a0a54a584 | |
parent | 80cb50dea482246656a49e54a915bdc343ffe897 (diff) | |
download | rspamd-cb3bbb54eadf5e4148ffdad856ba4961c8a78118.tar.gz rspamd-cb3bbb54eadf5e4148ffdad856ba4961c8a78118.zip |
[Minor] Add "User" HELO in Received headers to ABUSE_FROM_INJECTOR
This pattern often surfaces in spam (frequently advance fee fraud)
disseminated via compromised accounts, adding it to ABUSE_FROM_INJECTOR
to increase the likelihood of such spam getting rejected.
-rw-r--r-- | conf/composites.conf | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/conf/composites.conf b/conf/composites.conf index 4fb97588f..5a3585e10 100644 --- a/conf/composites.conf +++ b/conf/composites.conf @@ -191,7 +191,7 @@ composites { description = "Message authenticated, but from a suspicios origin (potentially an injector)"; } ABUSE_FROM_INJECTOR { - expression = "SUSPICIOUS_AUTH_ORIGIN & (FAKE_REPLY | HAS_IPFS_GATEWAY_URL | HTML_SHORT_LINK_IMG_1)"; + expression = "SUSPICIOUS_AUTH_ORIGIN & (RCVD_HELO_USER | FAKE_REPLY | HAS_IPFS_GATEWAY_URL | HTML_SHORT_LINK_IMG_1)"; score = 2.0; policy = "leave"; description = "Message is sent from a suspicios origin and showing signs of abuse, likely spam injected in compromised account"; |