[prev in list] [next in list] [prev in thread] [next in thread] 

List:       spamassassin-devel
Subject:    [Bug 7156] new_dns_packet (domain=something type=A class=IN) failed: a domain name contains a null l
From:       bugzilla-daemon () bugzilla ! spamassassin ! org
Date:       2016-07-11 12:17:05
Message-ID: bug-7156-26-7qjBy0SwAD () https ! bz ! apache ! org/SpamAssassin/
[Download RAW message or body]

https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7156

Reindl Harald <h.reindl@thelounge.net> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |h.reindl@thelounge.net

--- Comment #32 from Reindl Harald <h.reindl@thelounge.net> ---
> OK, what about if I write make sure you download 
> those files...microsoft.com.
>
> Do I mean an ellipses (...)?  Something to watch for

i think that's not the point - the question is does a DNS request happen with
"files...microsoft.com." and when yes normalize it before send the DNS query
itself OR skip it entirely

i would prefer normalize it an look for "files...microsoft.com" because of the
simple reason that MUA's randomly make things clickable and when then a error
in the browser appears the user might realize the multiple, dots, fix it and
press enter which probably is the expected behavior of the spammer to work
around URIBL with no cost

what bad should happen with the DNS request for "files.microsoft.com." - it's
either a NXDOMAIN or when it is listed then well, caught for some reason

-- 
You are receiving this mail because:
You are the assignee for the bug.
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic