-
Notifications
You must be signed in to change notification settings - Fork 186
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expand scope of whitelisting to all domain lookups #3006
Comments
Can't assign to @bertiebaggio explicitly it seems, but he was volunteering to look into this. https://chat.stackexchange.com/transcript/message/50359451#50359451 |
Tangentially related perhaps: #1630 |
Thanks for the ping 😄 Discussion of a more general whitelist came up when considering the ASN whitelist, @makyen's thoughts seem relevant here:
Do we have a few representative examples of things we'd like to exclude? I've been away from the Smokey coalface due to a job application recently so have missed some of the chat around this. |
Mithrandir pointed out a few in chat last week, I think search for when I mentioned "bertieb" as a quick shortcut, or I can try to provide links tomorrow. Glorfindel mentioned one today, I think xda-develop.com or similar. A search in the FPs woud probably be more methodologically sound, similar to what I did for reviewing ASN:s today (I think #3007) |
@bertiebaggio check your inbox for an org invite - that should make it possible to actually assign you here. |
Related (possibly duplicate?): #490 |
tripleee: Thanks, I'll have a look through chat history Art: done, thanks! |
Pling, any progress? |
This issue has been closed because it has had no recent activity. If this is still important, please add another comment and find someone with write permissions to reopen the issue. Thank you for your contributions. |
As of ce83f31, I've added an The new helper method feeds from the metasmoke API: any domain that's tagged with We can also add the helper to more findspam checks if we think it's necessary. |
Is your feature request related to a problem? Please describe.
There is a number of domains which routinely triggers FPs because some of the watches are very broad. We want to be able to exclude well-known good sites from these broad watches in order to improve precision and reduce noise.
Describe the solution you'd like
bertieb implemented whitelisting for ASN checks in #2664 and I was thinking already at the time that this should be refactored to govern all domain name checks.
Describe alternatives you've considered
Perhaps this should be coupled with a broader review of FPs so we can disable entire reasons (e.g. individual ASNs which produce too many FPs?) but let's keep this focused on the technical implementation.
Additional context
This has been raised in chat repeatedly over the last couple of weeks. I don't think it should be hard to do.
The text was updated successfully, but these errors were encountered: