dbiel Posted June 24, 2005 Share Posted June 24, 2005 Taken from a thread discussing /dev/null'ing I think where we're at .. you submit a spam .. parser kicks in ... various "threads" are started ... header stucture analyzed body looked for chain test starts on the header 'logical' source address found - internal/external database lookups started body analyzed for URLs body URLs found - internal/external database lookups started now, remember, the parsing 'process' is still sitting there, waiting for a response from all of the sub-processes fired up .... (and this leads us into that area of the internal/external database lookups timing out) eventually/hopefully all the lookup sub-processes come back with results ... so we're sitting there with a minimum of five storage locations tied up with that spam .. the spam itself, the Tracking URL, the spew source, the spamvertised site, and the "computer notepad" that's keeping all of this stuff tied together ... all that data gets fed into the "handling" side of the "reporting" section ... Now we've got to tickle the SpamCopDNSBL counter for the source IP, generate the e-mails for "all" of the target e-mail addresses found by the parser ... this generates the stuff found when you hit the "Preview" button ... At the point you hit the "Send" button, then decision are made where to "send" the e-mail ... stuff going out gets sent to the SMTP engine, stuff that goes to "special" addresses gets handled internally based on those internal factors (some ISPs want groups, some want a special format, and as above, some go to special internal accounts for other purposes) .. and those items already identified as going to ISPs that specifically requested/selected not to be informed make their trip to the /dev/null bit-bucket. Again, the intent is to let the computer do its thing, empty the "notepad" of collected data and clear all the flags set to "done" ... All the space, resources, attention that was focused on your last spam submittal are now free to handle the next incoming spam submittal. 29561[/snapback] Link to comment Share on other sites More sharing options...
DavidT Posted October 25, 2005 Share Posted October 25, 2005 ...and what the parser does NOT do: It apparently isn't programmed to do a SpamCop DNSBL lookup on the source IP, because the extra queries generated by that would be hard on the BL server. See this discussion in the Reporting forum for details: Parsing source IP vs. full spam, no "listed in bl.spamcop.net" Therefore, if you want to know whether or not the spam source is already listed by SpamCop and if there's a "History" of reports available, the current workaround is to open a separate reporting form window and paste in the source IP address for parsing. DT Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.