Closed Bug 180972 Opened 22 years ago Closed 22 years ago

spamcop refused binary spam from mozilla but accepted it from netscape

Categories

(SeaMonkey :: General, defect)

Sun
SunOS
defect
Not set
normal

Tracking

(Not tracked)

RESOLVED WORKSFORME

People

(Reporter: schneidt, Assigned: asa)

References

()

Details

User-Agent:       Mozilla/5.0 (X11; U; SunOS sun4u; en-US; rv:1.3a) Gecko/20021117
Build Identifier: Mozilla/5.0 (X11; U; SunOS sun4u; en-US; rv:1.3a) Gecko/20021117

I got a spam contining binary.  I went to spamcop and dumped
it in using mozilla.  Spamcop objected:

No data / Too much data

You are most likely submitting a very large email. Please trim some of the
unnecessary data (noting where this has been done) from this posting and try
again. SpamCop will no longer accept email larger than 50.0K bytes.

Other possibilities: You may have a firewall which prevents HTTP POST commands,
you may have linked to the wrong URL or your browser does not handle binary
submissions correctly (try a different browser) 

I pasted the exact same cut into netscape and it was fine.

My report page (probably only accessable by me) is:
http://spamcop.net/sc?id=z52407750z70ec4880c9307b36141dce971c1532a0z
Of course it is probably accessible if the folks at spamcop help.

Reproducible: Didn't try

Steps to Reproduce:
1. Receive a spam
2. sign up for spamcop (http://spamcop.net/)
3. cut the spam and insert into spamcop

Actual Results:  
Spamcop refused to accept the spam.

Expected Results:  
Spamcop and mozilla should agree and work together so we can spend
more time with mozilla bugs than reporting spam!

I'm calling this a "Major feature broken" because the only known
work around is to abandon Mozilla!
Well, for most bugs the only way not to see them is to use another browser.
That does not mean that most bugs are 'major'!!
Since your bug report is spamcop specific and most users probably don't even
know it, I wouldn't call it a case of a broken major feature!

However, to get to the facts: which netscape version did you use instead?
Can you attach the data you wanted to send to spamcop in the first place?
Severity: major → normal
Andreas:  
 
| Well, for most bugs the only way not to see them is to use another browser.
| That does not mean that most bugs are 'major'!!
| Since your bug report is spamcop specific and most users probably don't even
| know it, I wouldn't call it a case of a broken major feature!
 
Oops, you are right.  I switched it back to 'Normal'. 
 
| However, to get to the facts: which netscape version did you use instead?
 
Netscape® Communicator 4.79
on Sun Solaris 8. 
 
| Can you attach the data you wanted to send to spamcop in the first place?
 
Unfortunately I let it get deleted DUH ... and it turns out that
spamcop DIDN'T keep it for me as I thought they would (or it is not
obvious how to retrieve it).  Further, another similar one went
through ok.  :-(  So if it happens again for another one I'll capture
it properly.  Alternatively perhaps the folks at spamcop could obtain
it.
I'm using spamcop all the time (even for bugmail), and I sometimes report using
copy-paste from other accounts. But I haven't met this 50K limit yet (maybe
because I'm a paying customer ?). I can see your report, but since a few months
spamcop doesn't save the full text of the message anymore, because spam has
increased dramatically this year, and they don't have enough space to store all
of them.

Anyway, is it possible that Netscape 4.79 was using posting a smaller number of
bytes than Mozilla ? Maybe there's a small difference, because you copied the
sample from your view-source window. Maybe Netscape 4.79 was posting the sample
with LF-endings, while Mozilla does it with CR/LF ? Or something similar.
The check is done in this javascript-function (by spamcop, not mozilla) :

function formval(maxlength) {
  var textval = document.forms[0].spam.value;
  var warning = "\n[truncated by SpamCop]\n";
  if (textval.length > maxlength) {
    if (confirm("Message is larger than maximum size, " + maxlength + " bytes. \
Truncate?")) {
      document.forms[0].spam.value =
      textval.substr(0, (maxlength - warning.length) - 1) +warning;
      return true;
    } else {
      return false;
    }
  } else {
    return true;
  }
}

and called like this :

<form method="post" action="/sc" name="submitspam"
  onsubmit="return formval(50000);"
  enctype="multipart/form-data"
  accept="text/plain"
  accept-charset="ISO-8859-1">

I don't see what's wrong with that. The length of the string can't exceed 50.000
bytes (and in 8859.1 encoding, so it's not a Unicode problem), but Spamcop.net
does that on purpose. If the check didn't work in Netscape 4.79, then that is a
bug in Netscape. Maybe you weren't using Javascript ?

I've met the limit too, but only with spam that was really more than 50K long.
Samller ones don't have that problem.

I'm closing this now as WORKSFORME. Please reopen when you know that it doesn't
work for spam smaller than 50K. The limit is imposed by Spamcop, not by Mozilla.
Status: UNCONFIRMED → RESOLVED
Closed: 22 years ago
Resolution: --- → WORKSFORME
Product: Browser → Seamonkey
You need to log in before you can comment on or make changes to this bug.