Post Reply 
Ask for killing URL shorteners redirections
Oct. 03, 2009, 02:28 AM (This post was last modified: Dec. 17, 2009 06:48 PM by lnminente.)
Post: #1
Ask for killing URL shorteners redirections
First of all this filter is intended to work in the base config, if someone want to port it to another config replace $GET(RESP) for the url you get from the incoming header Location and share that version with us.

This filter intercepts some URL shortener services by its domain and shows you the real url asking if you want to visit it

Why it can be a security risk?
Demonstration: http://www.youtube.com/watch?v=Upciy-g_n28

Code:
[HTTP headers]
In = TRUE
Out = FALSE
Key = "! :I_52 Ask for killing URL shorteners redirections {ln}091003 WIP"
URL = "(^local.ptron/)(^$TST(keyword=*.NoKill.*)) $TST(uDom=bit.ly|is.gd|xrl.us|tinyurl.com) (^$TST(ContentType= image/*)) $LOG(RHeader $DTM(c),I_52 Ask for killing URL shorteners redirections in \h)$CONFIRM(URL SHORTENER REDIRECTION: \n\n\nBlock connection to the URL below?\n$GET(RESP)\n\a) $JUMP(http://local.ptron/base/killed.html?WHY=$ESC(URL Shortener redirection not accepted)&URL=$ESC(\u))""

The URL shortener covered are bit.ly|is.gd|xrl.us|tinyurl.com, do you know more?
Add Thank You Quote this message in a reply
Post Reply 


Messages In This Thread
Ask for killing URL shorteners redirections - lnminente - Oct. 03, 2009 02:28 AM

Forum Jump: