>I barely understand what we're protecting against here
Yes.
http://www.pc-help.org/obscure.htm

>1 & 2 are in the query string.  Do we care? 
Yes. They may contain redirects.

Thomas


Von:    K Post <[email protected]>
An:     ASSP development mailing list <[email protected]>
Datum:  24.12.2016 19:38
Betreff:        Re: [Assp-test] URIBL: fail, very strong obfuscated IP 
found in URI



I didn't mean to imply that any of this was easy.  If it was, I'd do it 
myself and give you the code.  I barely understand what we're protecting 
against here, I just know that we're seeing a lot of false positives here.

That's one heck of a regex!!  Would it be unsafe to only compare it to 
hostnames?  Are you seeing spam (or phishing attacks) that have clear 
hostnames about obfuscated file/query string?  I haven't, but I don't have 
the depth of knowledge, experience, or exposure that you do.  I'm curious 
to know what we're trying to avoid blocking more than just the hostname 
and if it's "worth it" vs false positives.

>.1. it uses an unknown protocol parameter in a GET value (s=) : gusqr:// 
>2. it uses an unknown hostname there: qkvr.hnpfmd.dnn 
1 & 2 are in the query string.  Do we care?  Aren't we most interested in 
looking for obfuscated hostnames and file paths?
I'm curious here, not being argumentative: what's the spammer strategy 
that we're protecting against by rejecting these messages?

>3 in t= it uses: 2@031-040 - a username followed by an @ and an octal 
number range 
 don't tons of tracking images use similar methodology?  

>For me this looks like: "if you have my trojan available - nice, I'll 
start it now" 
Well that's scary - but don't plenty of legitimate emails do the same 
thing where there's extra stuff in the query string?

>This gives me the idea, to make this check much more restrictive in 
future. So you'll have the problem again in some time. 
Would love to know your thinking - 

I worry when we restrictive to absolutely be able to block a certain type 
of email when there are lots of false positives caused by the 
restriction.  It's not like we're going to be able to change the way that 
legitimate emailer send messages (especially with tracking codes in URL's) 
and we can't (or at least I can't) simply say to our users that they're 
not allowed to get those mails because they have a way of putting URLs 
that some phishers might.  It's all about that delicate balance between 
stopping the spams/scams and insuring deliverability of legitimate 
messages.

HAPPY HOLIDAYS!


------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform 
today.http://sdm.link/intel_______________________________________________
Assp-test mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/assp-test




DISCLAIMER:
*******************************************************
This email and any files transmitted with it may be confidential, legally 
privileged and protected in law and are intended solely for the use of the 

individual to whom it is addressed.
This email was multiple times scanned for viruses. There should be no 
known virus in this email!
*******************************************************

------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/intel
_______________________________________________
Assp-test mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/assp-test

Reply via email to