On Sunday 15 May 2005 17:51, List Mail User wrote:
> >...
> >
> >wolfgang wrote:
[...]
> >>
> >> I noticed that the WS URIBL does by now recognize various of the
> >> URIs in those mails, and a rule like
> >> # whois.rfc-ignorant.org URIBL http://www.rfc-ignorant.org/
> >> urirhssub URIBL_RFCI_WHOIS      whois.rfc-ignorant.org.     A   5
> >> body URIBL_RFCI_WHOIS          
> >> eval:check_uridnsbl('URIBL_RFCI_WHOIS') describe URIBL_RFCI_WHOIS 
> >>      URL listed at rfc-ignorant.org (whois) tflags
> >> URIBL_RFCI_WHOIS         net
> >> also works well here:
> >>
> >>  1.0 URIBL_RFCI_WHOIS       URL listed at rfc-ignorant.org (whois)
> >>                             [URIs: pro-koeln-online.de
> >> jungefreiheit.de] [g-d-f.de bewaeltigen.de kopfmord.de]
> >> [buergerbewegungen.de wk-institut.de] [das-gibts-doch-nicht.de
> >> un-nachrichten.de] [rocknord.de]
> >
> >And may cause LOTS of false positives as well
> >
> >Sun 2005-05-15 13:42:18: *  1.0 URIBL_RFCI_WHOIS URL listed at
> >rfc-ignorant.org (whois)
> >Sun 2005-05-15 13:42:18: *      [URIs: spiegel.de npd.de taz.de]
> >
> >FP: spiegel.de & taz.de
> >
> >Sun 2005-05-15 13:42:44: *  1.0 URIBL_RFCI_WHOIS URL listed at
> >rfc-ignorant.org (whois)
> >Sun 2005-05-15 13:42:44: *      [URIs: libasoli.de zdf.de]
> >
> >FP: zdf.de
> >
> >h2h
> >
> >Alex
>
>       Basically, this rule is incorrectly written.  Unlike SURBLs or
> URIBL, RFCI does not use bit masks, but multiple full addresses - so
> trying to use a bitmask (5 in this case) will also match the hits for
> 127.0.0.7 which is the code for RFC non-compliant TLDs, of which
> ".de" is one.  Put simply the rule above will match all ".de"
> domains, which probably is not desired.  Using a rule like
>
> urirhssub URIBL_RFCI_WHOIS      whois.rfc-ignorant.org.     A  
> 127.0.0.5
>
> will probably give results closer to what is desired (i.e. matches
> SLDs with invalid whois).  So, yes the OP's rule *will* give far too
> many FPs, but when written correctly, it will/should still filter out
> many/most of the Nazi party sites.

Sorry, RTFM failure on my part for the bitmask vs. whole IP address 
error. Please accept my apologies for any inconvenience caused by it.

> P.S. ".de" is interesting in that the Whois server does contain and
> will return the "desired" data, but the method of access is (AFAIK)
> only documented in the rfci entry for ".de"'s TLD invalidity (i.e. a
> bunch of undocumented flags which can be passed using telnet).  Most
> 127.0.0.7 entries are for TLDs which are RFC non-compliant, and a
> different code is used just so you can prevent marking every ".de"
> domain (last week someone else mentioned ".co.uk", but that Whois
> server got fixed and removed from listing quite a while ago). As
> another example, the OP's version of the rule will block all ".pl"
> domains also, probably not good either (and a bunch of other TLDs),
> but most American individual users won't notice the problems unless
> they happen to regularly communicate with people in foreign countries
> (".se" is one that would hurt me - though ".de" is probably the most
> significant - many "third world" country codes also have 127.0.0.7
> codes for the TLDs, ex. ".tv").

-- 
Rob Skedgell <[EMAIL PROTECTED]>

Attachment: pgp9ypKMilWjr.pgp
Description: PGP signature

Reply via email to