2.5.4 16359 should address this.
Thomas
Von: K Post <[email protected]>
An: ASSP development mailing list <[email protected]>
Datum: 24.12.2016 19:38
Betreff: Re: [Assp-test] URIBL: fail, very strong obfuscated IP
found in URI
I didn't mean to imply that any of this was easy. If it was, I'd do it
myself and give you the code. I barely understand what we're protecting
against here, I just know that we're seeing a lot of false positives here.
That's one heck of a regex!! Would it be unsafe to only compare it to
hostnames? Are you seeing spam (or phishing attacks) that have clear
hostnames about obfuscated file/query string? I haven't, but I don't have
the depth of knowledge, experience, or exposure that you do. I'm curious
to know what we're trying to avoid blocking more than just the hostname
and if it's "worth it" vs false positives.
>.1. it uses an unknown protocol parameter in a GET value (s=) : gusqr://
>2. it uses an unknown hostname there: qkvr.hnpfmd.dnn
1 & 2 are in the query string. Do we care? Aren't we most interested in
looking for obfuscated hostnames and file paths?
I'm curious here, not being argumentative: what's the spammer strategy
that we're protecting against by rejecting these messages?
>3 in t= it uses: 2@031-040 - a username followed by an @ and an octal
number range
don't tons of tracking images use similar methodology?
>For me this looks like: "if you have my trojan available - nice, I'll
start it now"
Well that's scary - but don't plenty of legitimate emails do the same
thing where there's extra stuff in the query string?
>This gives me the idea, to make this check much more restrictive in
future. So you'll have the problem again in some time.
Would love to know your thinking -
I worry when we restrictive to absolutely be able to block a certain type
of email when there are lots of false positives caused by the
restriction. It's not like we're going to be able to change the way that
legitimate emailer send messages (especially with tracking codes in URL's)
and we can't (or at least I can't) simply say to our users that they're
not allowed to get those mails because they have a way of putting URLs
that some phishers might. It's all about that delicate balance between
stopping the spams/scams and insuring deliverability of legitimate
messages.
HAPPY HOLIDAYS!
------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform
today.http://sdm.link/intel_______________________________________________
Assp-test mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/assp-test
DISCLAIMER:
*******************************************************
This email and any files transmitted with it may be confidential, legally
privileged and protected in law and are intended solely for the use of the
individual to whom it is addressed.
This email was multiple times scanned for viruses. There should be no
known virus in this email!
*******************************************************
------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/intel
_______________________________________________
Assp-test mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/assp-test