On 2011-11-25 21:36, Sergio wrote:
@Axb,
just curious.. what are you trying to achieve by running these domains
through ALL headers?
catch senders?  received headers?
there headers that comes with the following:

Received: from [66.85.187.123] *(helo=vpn123.layeredvpnzervices.com)*
      by izabal.espacioydominio.com with esmtp (Exim 4.69)
      (envelope-from<accountingeducation.yjuee*@nwwrej.afraidageshare.net*>)
      id 1RTzVK-0000Jp-IR
      for chard...@secmas.net; Fri, 25 Nov 2011 11:24:02 -0600
From: accounting education<
accountingeducation.yj...@nwwrej.afraidageshare.net>

Received: from [66.85.158.200] (*helo=search200.complementhold.com*)
      by izabal.espacioydominio.com with esmtp (Exim 4.69)
      (envelope-from<nursingschool.ncqq...@aifnqk.laughsidecant.net>)
      id 1RTzPA-0007TD-CR
      for chard...@secmas.net; Fri, 25 Nov 2011 11:17:40 -0600
From: nursing school<*nursingschool.ncqq...@aifnqk.laughsidecant.net*>

Just to mention two examples, well, the point is that in a lot of spam
emails the HELO is the same for a lot of different email addresses, so, I
am trying to block that.

Is there a better way than checking all the header?

look at it this way.. the less a rule has to do the faster it is and less prone to error/FPs

If you check ALL headers, SA will go thru long DKIM headers for a pattern which will not show up in DKIM header, it will look in X headers, From, To, etc,etc.. big waste of time and CPU cycles when all you want to check is Received:

try with:

header BLAH Received =~/\blayeredvpnzervices\.com\b/




Reply via email to