Spam detection software, running on the system "kualalumpur.lrde.epita.fr", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or block
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: paragraph olsen sidereal wilsonian algebraic
chloroplatinate diocesan coach creed steeve drastic
URI:http://mega-cheap4u.biz Browse URI:http://mega-cheap4u.biz Search
URI:http://mega-cheap4u.biz Order URI:http://mega-cheap4u.biz My eSoft
URI:http://mega-cheap4u.biz Community
URI:http://pics.ebaystatic.com/aw/pics/viewitem/backArrow_14x14.gif
URI:http://mega-cheap4u.biz Back to Software Overview
URI:http://mega-cheap4u.biz Home > URI:http://mega-cheap4u.biz All
Categories > URI:http://mega-cheap4u.biz Computers >
URI:http://mega-cheap4u.biz Software > URI:http://mega-cheap4u.biz
Operating Systems > Windows
URI:http://pics.ebaystatic.com/aw/pics/listings/allitems_firstDark_6x29.gif
All Items
URI:http://pics.ebaystatic.com/aw/pics/listings/allitems_midDarkOnLight_14x…
URI:http://mega-cheap4u.biz Auctions
URI:http://pics.ebaystatic.com/aw/pics/listings/allitems_midLightLight_14x2…
URI:http://mega-cheap4u.biz Buy It Now
URI:http://pics.ebaystatic.com/aw/pics/listings/allitems_endLightTab_14x29.…URI:http://pics.ebaystatic.com/aw/pics/s.gif Windows
URI:http://mega-cheap4u.biz URI:http://mega-cheap4u.biz Refine
SearchURI:http://mega-cheap4u.biz bruise Top Ten Sellers 1 -
URI:http://mega-cheap4u.biz Windows XP Pro 2 -
URI:http://mega-cheap4u.biz Office XP Pro 3 -
URI:http://mega-cheap4u.biz Adobe Acrobat 6.0 Professional 4 -
URI:http://mega-cheap4u.biz Adobe Photoshop CS 8.0
5URI:http://mega-cheap4u.biz - SystemWorks 2004 Pro 6 -
URI:http://mega-cheap4u.biz Macromedia DreamWeaver MX 2004
URI:http://mega-cheap4u.biz 7 URI:http://mega-cheap4u.biz -
URI:http://mega-cheap4u.biz Macromedia Flash MX 2004 Pro 8 -
URI:http://mega-cheap4u.biz MS 2003 Server (Enterprise Edition) 9 -
URI:http://mega-cheap4u.biz Windows XP (Longhorn Edition) 10 -
URI:http://mega-cheap4u.biz CorelDRAW Graphics Suite 12.0 [...]
Content analysis details: (9.9 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.1 HTML_MESSAGE BODY: HTML included in message
0.1 HTML_FONTCOLOR_UNSAFE BODY: HTML font color not in safe 6x6x6 palette
5.4 BAYES_99 BODY: Bayesian spam probability is 99 to 100%
[score: 1.0000]
0.3 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
0.1 HTML_FONTCOLOR_RED BODY: HTML font color is red
0.1 BIZ_TLD URI: Contains a URL in the BIZ top-level domain
2.6 RCVD_IN_DYNABLOCK RBL: Sent directly from dynamic IP address
[64.173.197.52 listed in dnsbl.sorbs.net]
0.1 RCVD_IN_SORBS RBL: SORBS: sender is listed in SORBS
[64.173.197.52 listed in dnsbl.sorbs.net]
1.1 MIME_HTML_ONLY_MULTI Multipart message only has text/html MIME parts
The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.
Spam detection software, running on the system "kualalumpur.lrde.epita.fr", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or block
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: Millions of Americans suffer from muscler related
problems.With today's modern treatments, there no reason to suffer
anymore. http://www.med12now.com/c49m +Solution for your medical needs+
[...]
Content analysis details: (9.8 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.0 BAYES_50 BODY: Bayesian spam probability is 50 to 56%
[score: 0.5318]
4.1 FORGED_RCVD_NET_HELO Host HELO'd using the wrong IP network
0.7 RCVD_IN_DSBL RBL: Received via a relay in list.dsbl.org
[<http://dsbl.org/listing?ip=218.95.119.119>]
1.5 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
[Blocked - see <http://www.spamcop.net/bl.shtml?218.95.119.119>]
2.6 RCVD_IN_DYNABLOCK RBL: Sent directly from dynamic IP address
[218.95.119.119 listed in dnsbl.sorbs.net]
0.1 RCVD_IN_SORBS RBL: SORBS: sender is listed in SORBS
[218.95.119.119 listed in dnsbl.sorbs.net]
0.1 RCVD_IN_RFCI RBL: Sent via a relay in ipwhois.rfc-ignorant.org
[$ has inaccurate or missing WHOIS data at the]
[RIR]
0.7 MSGID_FROM_MTA_HEADER Message-Id was added by a relay
The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.
Spam detection software, running on the system "kualalumpur.lrde.epita.fr", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or block
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: Projects We can get you any medication you require
http://www.saigon393dryg.us/c49 [...]
Content analysis details: (8.5 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.0 BAYES_50 BODY: Bayesian spam probability is 50 to 56%
[score: 0.5005]
0.7 RCVD_IN_DSBL RBL: Received via a relay in list.dsbl.org
[<http://dsbl.org/listing?ip=68.79.31.34>]
3.5 RCVD_IN_NJABL_DIALUP RBL: NJABL: dialup sender did non-local SMTP
[68.79.31.34 listed in dnsbl.njabl.org]
1.5 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
[Blocked - see <http://www.spamcop.net/bl.shtml?68.79.31.34>]
2.6 RCVD_IN_DYNABLOCK RBL: Sent directly from dynamic IP address
[68.79.31.34 listed in dnsbl.sorbs.net]
0.1 RCVD_IN_SORBS RBL: SORBS: sender is listed in SORBS
[68.79.31.34 listed in dnsbl.sorbs.net]
0.1 RCVD_IN_NJABL RBL: Received via a relay in dnsbl.njabl.org
[68.79.31.34 listed in dnsbl.njabl.org]
The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.
Spam detection software, running on the system "kualalumpur.lrde.epita.fr", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or block
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: URI:http://canterelle.warehousemedsplus.com/?man=x56
URI:http://amputate.justcheapdrugs.biz/pic2.jpg
http://amputate.justcheapdrugs.biz/pic2.jpghttp://canterelle.warehousemedsp…
[...]
Content analysis details: (11.0 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.1 HTML_MESSAGE BODY: HTML included in message
0.0 BAYES_50 BODY: Bayesian spam probability is 50 to 56%
[score: 0.5074]
0.1 HTML_70_80 BODY: Message is 70% to 80% HTML
1.2 HTML_IMAGE_ONLY_02 BODY: HTML: images with 0-200 bytes of words
0.1 BIZ_TLD URI: Contains a URL in the BIZ top-level domain
0.9 FORGED_YAHOO_RCVD 'From' yahoo.com does not match 'Received' headers
1.1 RCVD_IN_SORBS_HTTP RBL: SORBS: sender is open HTTP proxy server
[24.215.238.3 listed in dnsbl.sorbs.net]
1.0 RCVD_IN_OPM_HTTP RBL: OPM: sender is open HTTP CONNECT proxy
[24.215.238.3 listed in opm.blitzed.org]
1.0 RCVD_IN_OPM RBL: Received via a relay in opm.blitzed.org
[24.215.238.3 listed in opm.blitzed.org]
0.5 RCVD_IN_NJABL_PROXY RBL: NJABL: sender is an open proxy
[24.215.238.3 listed in dnsbl.njabl.org]
0.7 RCVD_IN_SORBS_MISC RBL: SORBS: sender is open proxy server
[24.215.238.3 listed in dnsbl.sorbs.net]
0.1 RCVD_IN_NJABL RBL: Received via a relay in dnsbl.njabl.org
[24.215.238.3 listed in dnsbl.njabl.org]
0.1 RCVD_IN_SORBS RBL: SORBS: sender is listed in SORBS
[24.215.238.3 listed in dnsbl.sorbs.net]
1.2 RCVD_IN_SORBS_SOCKS RBL: SORBS: sender is open SOCKS proxy server
[24.215.238.3 listed in dnsbl.sorbs.net]
0.7 RCVD_IN_DSBL RBL: Received via a relay in list.dsbl.org
[<http://dsbl.org/listing?ip=24.215.238.3>]
1.5 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
[Blocked - see <http://www.spamcop.net/bl.shtml?24.215.238.3>]
0.7 MSGID_FROM_MTA_HEADER Message-Id was added by a relay
Task #151 has been updated.
Project: LrdeTools
Subproject: prcs2svn
Summary: bug report svn
Complete: 100%
Status: Closed
Description: Isolate the bug which appeared in tc: a checkin using file:// with a log containing special chars is badly interpreted when you try to get it via http (i.e. svn checkout http://...).
Follow-Ups:
-------------------------------------------------------
Date: 19/07/2004 19:48
By: odou_s
Comment:
From: Simon Odou <simon(a)lrde.epita.fr>
To: dev(a)subversion.tigris.org
For the same project, the svn behavior is different with "file://" and
"http://". Commits with particular log message can be rejected with "http" but
accepted with "file". Then the command "svn log" might fail.
$ svn co http://localhost/test && cd test
Checked out revision 0.
$ touch a && svn add a
A a
$ echo "a" >> a && svn ci -m `echo -ne "\0x1"`
svn: Commit failed (details follow):
svn: applying log message
to /test/!svn/wbl/0f562004-95df-0310-837a-e85ba3689386/0: 400 Bad Request
(http://localhost)
If you checkout your project using file system, then your commit is accepted:
$ svn co file:///svn/test && cd test
Checked out revision 0.
$ touch a && svn add a
A a
$ echo "a" >> a && svn ci -m `echo -ne "\0x1"`
Adding a
Transmitting file data .
Committed revision 1.
Using the file system, the svn log command succeed:
$ svn log | cat -e
No commit for revision 0.$
------------------------------------------------------------------------$
r1 | simon | 2004-07-19 19:01:53 +0200 (Mon, 19 Jul 2004) | 1 line$
$
^A$
------------------------------------------------------------------------$
But using http, it fails:
$ svn log
svn: REPORT request failed on '/test/!svn/bc/2'
svn: The REPORT request returned invalid XML in the response: XML parse error
at line 7: internal error. (/test/!svn/bc/2)
NB: it seems to be the same problem for most of special characters between 0x1
and 0x1f.
-------------------------------------------------------
For more info, visit:
http://gforge.lrde.epita.fr/pm/task.php?func=detailtask&project_task_id=151…
La vérification de la cohérence des dates est effectuée même lorsque
l'option -p n'est pas activée. Si un problème survient, le programme
demande de désactiver l'option '-p' ...
--
Geoffroy Fouquier
Geoffroy.Fouquier(a)lrde.epita.fr