procmail
[Top] [All Lists]

Re: Trapping non-standard URL's in spam

1999-03-21 12:39:02
On Sun, 21 Mar 1999, Walter Dnes wrote:

 NONSTANDARD="(0x[0-9a-f]+|0[0-7]+)"
 :0fb
 *  1^0 http:(//|//.*@)[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9]
 *  1^0 
http:(//|//.*@)0x[0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f]
 *$ 1^0 http:(//|//.*@)${NONSTANDARD}\..*\..*\..*
 *$ 1^0 http:(//|//.*@).*\.${NONSTANDARD}\..*\..*
 *$ 1^0 http:(//|//.*@).*\..*\.${NONSTANDARD}\..*
 *$ 1^0 http:(//|//.*@).*\..*\..*\.${NONSTANDARD}
 | formail -A "X-Reject: Non-standard URL format; often used by spammers"

3) through 6) Check for non-standard (non-base-10) notation
   in each of the quads separately, just in case spammers
   try to mix-n-match.

Instead of \..*\. shouldn't it be \.[0-9]+\. ? What if somebody has
a legitimate server at, say, http://0xdeadbeef.computer.lore.com/ ?

Side issue: what would a browser try to do with that example URL?

--
 John Hardin KA7OHZ                               
jhardin(_at_)wolfenet(_dot_)com
 pgpk -a finger://gonzo.wolfenet.com/jhardin    PGP key ID: 0x41EA94F5
 PGP key fingerprint: A3 0C 5B C2 EF 0D 2C E5  E9 BF C8 33 A7 A9 CE 76 
-----------------------------------------------------------------------
  In the Lion
  the Mighty Lion
  the Zebra sleeps tonight...
  Dee de-ee-ee-ee-ee de de de we um umma way!
-----------------------------------------------------------------------
   58 days until Star Wars episode I

<Prev in Thread] Current Thread [Next in Thread>