SA Bugzilla – Bug 694
False positive in URL detection triggers HTTP_ESCAPED_HOST
Last modified: 2002-08-13 08:25:05 UTC
The following line triggers HTTP_ESCAPED_HOST: inet6 fe80::206:25ff:fe08:f572%wi0 prefixlen 64 scopeid 0x1 The rule is: uri HTTP_ESCAPED_HOST /^https?\:\/\/[^\/]*%/ describe HTTP_ESCAPED_HOST Uses %-escapes inside a URL's hostname "http://" is added in function do_body_uri_tests. I think we can expect at least one dot in a hostname. The hostname cannot begin after ":" without having an explicit protocol name, or it will be too confusing for most recipients. Also, % should be followed by numbers to be an escape. I know, spammers are stupid and will send something broken, but this rule together with paranoid URL detection go too far.
could you try with CVS? I think this is already fixed. (we should not be adding the http:// bit). if not, just attach a message which triggers it and we'll test that: if it fires, bug valid, if not, bug already fixed ;) cheers!
Yes, the CVS version works correctly. Please close the bug.
Closing the bug, fixed in CVS.