As part of managing my own web presence, including a hosted email server with limited users (both in numbers and geography), I tend to try and cut large swathes of spam by simply “binning” any emails that have any association with specific TLDs, like .ru
or .us
or .cn
– whereby I know that my users and I have no legitimate reason to receive any email coming from those TLDs or passing through servers using any such TLDs.
However, it came to pass that some ham were getting caught, but simply looking at the email headers was not helping. Using CPanel’s in-built testing tool was helpful in surfacing which of my rules was triggering the spam trap, but not exactly why (or what part of the email was triggering it).
The triggering rule looked like regex, so I immediately tried to hunt down converted/parsed file to try and copy the rule in converted regular expression form.
Attempting to poke at the ~/.cpanel/filter.yaml
and ~/.cpanel/filter.cache
and even the /etc/vfilters/<domain>
did not turn up the regular expressions I was looking for.
In desperation, I took a quick look at the CPanel test tool results and decided to just copy the regex shown outright…
Unfortunately, pasting that regex directly into a regex test tool did not work…