Ben Cooksley writes:

 > If Mailman were to implement basic CSRF protection for all POST requests
 > that would also slow the attackers down I suspect (as they would have to
 > make a GET request first and parse it).

It might slow a human down, but as soon as it becomes a feature of
Mailman, the attackers will implement the necessary countermeasure (if
it isn't already implemented because they use libcurl or so in their
program!)  Bandwidth?  CPU?  These guys have no such constraints.

 > One thing I do know is that at least for us the attacks all
 > appeared to be coming from Tor endpoints or open web proxies.

Big surprise.  Not to mention demonstrating that CSRF protection won't
help, because you're dealing with real players, not junior high school
students from a fishing village in western Japan.

The problem here is that you cannot authenticate users you don't
already know.  So CSRF just adds a "get a free token" step to the
automated process.  I'm sure all the major libraries already implement
this, so unless the attackers are remarkably stupid, undoubtedly the
needed code is immediately to hand.

One partial solution would be to allow OpenID logins to the website to
use it to register subscriptions.  Of course you probably can't trust
Google or Yahoo accounts. ;-)


------------------------------------------------------
Mailman-Users mailing list Mailman-Users@python.org
http://mail.python.org/mailman/listinfo/mailman-users
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/
Unsubscribe: 
http://mail.python.org/mailman/options/mailman-users/archive%40jab.org

Reply via email to