[tor-bugs] #9385 [BridgeDB]: bridgedb's email responder should fuzzy match email addresses within time periods

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Aug 6 18:03:20 UTC 2013


#9385: bridgedb's email responder should fuzzy match email addresses within time
periods
-----------------------------------------+----------------------------------
 Reporter:  isis                         |          Owner:  isis
     Type:  defect                       |         Status:  new 
 Priority:  normal                       |      Milestone:      
Component:  BridgeDB                     |        Version:      
 Keywords:  email,distributor,spam,bots  |         Parent:      
   Points:                               |   Actualpoints:      
-----------------------------------------+----------------------------------

Comment(by sysrqb):

 Replying to [comment:1 phw]:
 > Interesting. Nice find, isis!

 Definitely!

 This will be (sadly) very difficult to fix, however. We do handle the '+'
 notation already:

 {{{
     idx = localpart.find('+')
     if idx >= 0:
         localpart = localpart[:idx]
     rules = domainrules.get(domain, [])
     if 'ignore_dots' in rules:
         # j.doe@ is the same as jdoe at .
         localpart = localpart.replace(".", "")

     return "%s@%s"%(localpart, domain)
 }}}

 So, limiting "incrementing" addresses and "similar" addresses is the next
 challenge. I fear it will be a losing battle.

 Replying to [comment:2 mparte]:
 > Could you test for Kolmogorov Complexity?
 Interesting thought, it's something we can look into and experiment with.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9385#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list