This plugin is considered experimental and is not insalled by default. It is recommended for experienced users only who know whats involved in properly maintaining it. Use it at your own risk. More Information


RHEL / Centos:

wget -P /usr/share/perl5/vendor_perl/Mail/SpamAssassin/Plugin/
chmod 444 /usr/share/perl5/vendor_perl/Mail/SpamAssassin/Plugin/

Debian / Ubuntu:

wget -P /usr/share/perl5/Mail/SpamAssassin/Plugin/
chmod 644 /usr/share/perl5/Mail/SpamAssassin/Plugin/

Then login to Plesk and go to Warden Anti-spam and Virus Protection -> Settings -> Plugin Settings to enable it then restart the Anti-spam service. When enabled Warden will install default rules for this plugin to /etc/mail/spamassassin/


This plugin looks for URLs shortened by a list of URL shortening services and upon finding a matching URL will connect using to the shortening service and do an HTTP HEAD lookup and retrieve the location header which points to the actual shortened URL, it then adds this URL to the list of URIs extracted by SpamAssassin which can then be accessed by other plug-ins, such as URIDNSBL.

This plugin also sets the rule HAS_SHORT_URL if any matching short URLs are found.

Regular 'uri' rules can be used to detect and score links disabled by the shortening service for abuse and URL_BITLY_BLOCKED is supplied as an example. It should be safe to score this rule highly on a match as experience shows that only blocks access to a URL if it has seen consistent abuse and problem reports.

This plug-in will follow 'chained' shorteners e.g.

short URL -> short URL -> short URL -> real URL

If this form of chaining is found, then the rule 'SHORT_URL_CHAINED' will be fired. If a loop is detected then SHORT_URL_LOOP will be fired. This plug-in limits the number of chained shorteners to a maximim of 10 at which point it will fire the rule SHORT_URL_MAXCHAIN and go no further.

If a shortener returns a '404 Not Found' result for the short URL then the rule SHORT_URL_404 will be fired.

If a shortener does not return an HTTP redirect, then a dynamic rule will be fired: SHORT_<SHORTENER>_<CODE> where <SHORTENER> is the uppercase name of the shortener with dots converted to underscores. e.g.: SHORT_T_CO_200 This is to handle the case of which now returns an HTTP 200 and an abuse page instead of redirecting to an abuse page like every other shortener does.

This plugin runs the parsed_metadata hook with a priority of -1 so that it may modify the parsed URI list prior to the URIDNSBL plugin which runs as priority 0.

Currently the plugin queries a maximum of 10 distinct shortened URLs with a maximum timeout of 5 seconds per lookup.


Area Test name Description Default scores
body HAS_SHORT_URL Message contains one or more shortened URLs 0.01
body SHORT_URL_CHAINED Message has shortened URL chained to other shorteners 3.0
body SHORT_URL_MAXCHAIN Message has shortened URL that causes more than 10 redirections 5.0
body SHORT_URL_LOOP Message has short URL that loops back to itself 0.01
body SHORT_URL_404 Message has short URL that returns 404 1.0
body SHORT_T_CO_200 Message contains a URL that has a warning due to abuse 10.0
body URI_BITLY_BLOCKED Message contains a URL that has been disabled due to abuse 10.0
body URI_SIMURL_BLOCKED Message contains a simurl URL that has been disabled due to abuse 10.0
body URI_MIGRE_BLOCKED Message contains a URL that has been disabled due to abuse 10.0
body URI_TINYURL_BLOCKED Message contains a tinyurl that has been disabled due to abuse 10.0
meta SHORT_URIBL Message contains shortened URL(s) and also hits a URIDNSBL 0.01