hi tom,
thx for the reply =)
> OpenMacNews wrote:
>
>> headers.banned
>> containing, e.g., a random assorment of header spec'ns, ala:
>> "X-Mailer: *Bobs Message Poster*",
>> "Subject: *ADV:*",
>> "From: *@*.com.dk*",
>> "From: *@blurg.com*",
>> "Return-Path: *@blah*",
>> ...
>
> ${if match{$header_X-Mailer:}{.*Bobs Message Poster.*}{1}{0}}
> You get the idea. This must be either in MIME or DATA ACLs (every ACL before
> does not have the headers yet). You can also use "regex" but that will be
> slower.
that one's clear.
but, not what i'm really looking for. allow me to be "greedy" here for a
moment ...
the above is specific to a given header type. and i have to write a specific
condition for each type.
i'm looking for, abstractly,
if HEADER_TYPE and SPECIFIED_CONTENT are found in BAD_HEADERS.TXT then
ACTION
where BAD_HEADERS.TXT contains the 'random assortment' of
HEADER_TYPE:SPECIFIED_CONTENT pairs, e.g.:
>> "X-Mailer: *Bobs Message Poster*",
>> "Subject: *ADV:*",
>> "From: *@*.com.dk*",
>> "From: *@blurg.com*",
>> "Return-Path: *@blah*",
> Try "mime_regex" or "regex".
good.
> Although pattern matching eats CPU just like SA.
true, although _my_ rule would *stop* on first instance without continuing
further ... so maybe a bit quicker?
cheers,
richard