On 12/18/2015 11:32 AM, John Hardin wrote:
On Fri, 18 Dec 2015, Mark Martinec wrote:

On 2015-12-18 16:29, Axb wrote:
 On 12/18/2015 04:17 PM, Mark Martinec wrote:
>  On 2015-12-17 22:41, Axb wrote:
> > could you make a version using redirector_pattern so the redirected
> >  target can be looked up via URIBL plugin?
> >  Isn't this already the case? Redirect targets are added
>  to a list of URIs and are subject to same rules as
>  directly collected URIs.
>
 I suggested converting the rawbody rule John was working on into a
 redirector_pattern

Note that the following rule as posted by John:

uri __GOOG_MALWARE_DNLD m;^https?://[^/]*\.google\.com/[^?]*url\?.*[\?&]download=1;i

would not currently work as a redirector_pattern due to the problem
I posted in my today's reply (Re: redirector_pattern question);
i.e. where the redirector target contains "http:", followed
by other URI arguments (like "&download=1" here).

Right, and I would take that into account when composing the redirector_pattern. That extra bit is there to avoid treating *all* google redirects as malware downloads.

Question: has anyone ever seen a *legit* (non-spam, non-phishing, non-malware) google redirect like that in an email? Maybe this rule is too restrictive and we should be suspicious of *all* google redirects?

I do it occasionally, if I am sending a link to someone and I right-click -> "copy link location" on the search results. I'd be suspicious of those sorts of links, but not too suspicious.

Reply via email to