[spambayes-dev] Re: Generating SB tokens based upon information on the net

Skip Montanaro skip at pobox.com
Wed Aug 4 19:20:35 CEST 2004

    Brad> In the case of reverse DNS, all that work will already have been
    Brad> done by the system before you ever get the message.  

Apologies, my bad.

    Brad> Or, you could just parse the content of the appropriate headers
    Brad> that we just added.

Spambayes will root around in the Received: headers if you ask it to.  It
generates all sorts of tokens based on fragments of IP addresses and
hostnames it finds.  Perhaps it's already doing what you wanted and I failed
to make the connection in my original note.

    Brad> If we're not doing DNS blacklist lookups within SpamBayes, then I
    Brad> think we need to seriously look at adding that capability in some
    Brad> other fashion.  My experience has been that these are some of the
    Brad> most important information sources you can have available to you
    Brad> when attempting to score a message for spam probability.

There's no need to do blacklisting as far as I'm concerned.  Spambayes
already mines content from the sender fields, so (for example), mail
purporting to come from "billr at smart.net" generates tokens which are highly
spammy.  That effectively serves the same purpose but doesn't have the bad
property of blacklists or whitelists - that they ignore everything else the
software is trying to tell you about the content of the message.


More information about the spambayes-dev mailing list