On Sun, 21 Mar 1999, Walter Dnes wrote:
NONSTANDARD="(0x[0-9a-f]+|0[0-7]+)"
:0fb
* 1^0 http:(//|//.*@)[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9]
* 1^0
http:(//|//.*@)0x[0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f][0-9a-f]
*$ 1^0 http:(//|//.*@)${NONSTANDARD}\..*\..*\..*
*$ 1^0 http:(//|//.*@).*\.${NONSTANDARD}\..*\..*
*$ 1^0 http:(//|//.*@).*\..*\.${NONSTANDARD}\..*
*$ 1^0 http:(//|//.*@).*\..*\..*\.${NONSTANDARD}
| formail -A "X-Reject: Non-standard URL format; often used by spammers"
3) through 6) Check for non-standard (non-base-10) notation
in each of the quads separately, just in case spammers
try to mix-n-match.
Instead of \..*\. shouldn't it be \.[0-9]+\. ? What if somebody has
a legitimate server at, say, http://0xdeadbeef.computer.lore.com/ ?
Side issue: what would a browser try to do with that example URL?
--
John Hardin KA7OHZ
jhardin(_at_)wolfenet(_dot_)com
pgpk -a finger://gonzo.wolfenet.com/jhardin PGP key ID: 0x41EA94F5
PGP key fingerprint: A3 0C 5B C2 EF 0D 2C E5 E9 BF C8 33 A7 A9 CE 76
-----------------------------------------------------------------------
In the Lion
the Mighty Lion
the Zebra sleeps tonight...
Dee de-ee-ee-ee-ee de de de we um umma way!
-----------------------------------------------------------------------
58 days until Star Wars episode I