[tor-bugs] #9385 [BridgeDB]: bridgedb's email responder should fuzzy match email addresses within time periods

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Jul 8 13:40:07 UTC 2014


#9385: bridgedb's email responder should fuzzy match email addresses within time
periods
--------------------------+--------------------------------------------
     Reporter:  isis      |      Owner:  isis
         Type:  defect    |     Status:  needs_review
     Priority:  normal    |  Milestone:
    Component:  BridgeDB  |    Version:
   Resolution:            |   Keywords:  bridgedb-email, bridgedb-0.2.2
Actual Points:            |  Parent ID:
       Points:            |
--------------------------+--------------------------------------------
Changes (by isis):

 * keywords:  bridgedb-email, bridgedb-0.2.x => bridgedb-email,
               bridgedb-0.2.2
 * status:  accepted => needs_review


Comment:

 So, I've implemented this ''slightly'' differently than proposed.

 Right now, there is a `EMAIL_BLACKLIST` option in the `bridgedb.conf`
 config file. There is also another setting, `EMAIL_FUZZY_MATCH` which
 takes an integer for the ''maximum'' Levenshtein String Distance for an
 email address to be considered as "fuzzy-matching" one of the addresses in
 the blacklist. These things currently are quite simple, i.e. they have no
 mechanisms for learning, and email addresses must be added to the
 `EMAIL_BLACKLIST` list by hand.

 My work is in my `fix/9385-fuzzy-email-matching`
 [https://gitweb.torproject.org/user/isis/bridgedb.git/shortlog/refs/heads/fix/9385
 -fuzzy-email-matching branch], and there are some added unittests, [https
 ://travis-ci.org/isislovecruft/bridgedb/builds/29335058 all of which are
 passing].

 I would like to merge this into `bridgedb-0.2.2`, so please review!
 Thanks!

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9385#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list