On Fri, 19 Mar 2004, Alton Danks wrote:

> Hello,
>
> Would someone give these rules a run and see how much trouble they cause?
> There might be some obvious overlap with existing, better, rulesets. If you
> feel like pointing them out it would be great. One last thing, on the
[snip..]

> rawbody CTS_HREF  /<a .{0,32}href[^=]/i
> describe CTS_HREF     Href Obfuscation
> score CTS_HREF 1.0

Be careful of rules that are too general, real danger of FPs as well
as increased CPU load. (the greater the amount of ambiguity in the pattern
the more back-tracking involved for the pattern matching engine).
For example, your CTS_HREF rule will hit on:

<a href="http://www.href.com";>HREF Tools Corp. home page</a>

(or almost any other URL that happens to have the substring
'href' in the hostname or page name. ;)

Here's the rule that I wrote (probably for the exact same kind of
spam that inspired you to write your 'CTS_HREF' ;):

rawbody L_FAKE_HREF     /\w\whref="?http:/i
describe L_FAKE_HREF    Faked href to hide spammer URLs
score L_FAKE_HREF       2.1

Dave

-- 
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to