RE: Problem with Hackers on Donation form through Authorize.net

2013-02-18 Thread Che Vilnonis

Al, I see values like this all of the time.

In most cases, I'll see values like -1, -1' or 1' for input fields. I use a
custom function to scan all form vars and if there is a match... I typically
ban the IP address for a period of time. You'll *likely* find a pattern to
the IP addresses that are problematic. Many IP subnets are repeat offenders.

~Che
 

-Original Message-
From: Al Musella, DPM [mailto:muse...@virtualtrials.com] 
Sent: Sunday, February 17, 2013 6:38 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net


I added another filter today...
I have always checked all form submissions for the bad keywords but I
noticed that many of the attacks seem to start with them entering 1 or -1 as
the first and or last name. Probably too lazy to put more keystrokes in when
they are setting up the script.
So now if a 1 or -1 is entered in any field that has the word name 
within the field name,   they get added to my list of banned IP 
addresses and if they go to any page on any of the websites I run, they get
an error page that looks like the website is down

Anyone else seeing a lot of form submissions with -1 or 1 as the name?



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354560
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-17 Thread Al Musella, DPM

I added another filter today...
I have always checked all form submissions for the bad keywords but I 
noticed that many of the attacks seem to start with them entering 1 
or -1 as the first and or last name. Probably too lazy to put more 
keystrokes in when they are setting up the script.
So now if a 1 or -1 is entered in any field that has the word name 
within the field name,   they get added to my list of banned IP 
addresses and if they go to any page on any of the websites I run, 
they get an error page that looks like the website is down

Anyone else seeing a lot of form submissions with -1 or 1 as the name?


At 08:48 AM 2/16/2013, you wrote:

What would be an appropriate length of time for a session variable
for a hacker who's doing what you described:

If they read in the form page and then submit it using a script for
many days without re-reading the original form it will appear to the
server that they took days to fill.

Would the same hold true for session session variables?


~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354556
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-17 Thread Les Mizzell

  Anyone else seeing a lot of form submissions with -1 or 1 as the name?

Yup - I get that sometimes.

Or, an attempt to enter the same web or email address entered into EVERY 
field.

 and I'm still getting weird *something* errors sent to me from a 
site that look like:

mypate.cfm?action=whateverResult:+no+post+sending+forms+are+found;

What the heck is that?

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354557
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-16 Thread Rick Faircloth

What would be an appropriate length of time for a session variable
for a hacker who's doing what you described:

If they read in the form page and then submit it using a script for 
many days without re-reading the original form it will appear to the 
server that they took days to fill.

Would the same hold true for session session variables?


-Original Message-
From: Al Musella, DPM [mailto:muse...@virtualtrials.com] 
Sent: Friday, February 15, 2013 11:18 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net


If they read in the form page and then submit it using a script for 
many days without re-reading the original form, it will appear to the 
server that they took days to fill.  So testing for more than a few 
hours should be good...

sessions might work but they should expire quickly... then if the 
session variable is not present you know they took too long.


At 10:04 PM 2/15/2013, you wrote:
You mean, by staying on the page so long that it's an indication
that he's hacking the form or the cfc method that does the processing
instead of doing a normal form submit like typical user would?

And what if the hacker has cookies disabled? And are you suggesting that
a session variable wouldn't be as good as a cookie?

Thanks for the feedback...

Rick




~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354554
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-16 Thread Al Musella, DPM

You can set the session timeout to about 45 minutes and it should 
work..  if they try to submit the page using the same session the 
next day, it will time out.

At 08:48 AM 2/16/2013, Rick Faircloth wrote:

What would be an appropriate length of time for a session variable
for a hacker who's doing what you described:

If they read in the form page and then submit it using a script for
many days without re-reading the original form it will appear to the
server that they took days to fill.

Would the same hold true for session session variables?


~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354555
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-15 Thread Revolution

CFFormProtect works well (for me).

I need to a PHP version of this. I'm sure there's one out there.

May have to write my own.

Your blog is running CF ?



-Original Message-
From: Raymond Camden [mailto:raymondcam...@gmail.com] 
Sent: Monday, February 11, 2013 11:46 AM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net


As an FYI, my blog never had a lot of spam, but it was pretty regular. When
I started using CFFP, it dropped dramatically. I can't even remember my last
spam comment.


On Mon, Feb 11, 2013 at 10:43 AM, Rick Faircloth
r...@whitestonemedia.comwrote:


 Thanks for the recommendation, Dave.

 It seems like an all-in-one approach, like CFFormProtect, might be 
 the only way to beat this thing!

 I'll go check it out...

 Rick

 -Original Message-
 From: Dave Watts [mailto:dwa...@figleaf.com]
 Sent: Monday, February 11, 2013 11:30 AM
 To: cf-talk
 Subject: Re: Problem with Hackers on Donation form through 
 Authorize.net


  I realize that if someone is hiring cheap human labor for $1 per day 
  to sit and enter form info, that I can't stop that, but if it is 
  bots doing the spamming, will making CF captcha more difficult to 
  read have a good chance of stopping the bots, or do I need to get 
  with reCaptcha.  I like using CF's solution, because I can code it 
  myself.  But if it doesn't work...

 I recommend you use this instead of any CAPTCHA:

 http://cfformprotect.riaforge.org/

 Dave Watts, CTO, Fig Leaf Software
 http://www.figleaf.com/
 http://training.figleaf.com/

 Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on GSA 
 Schedule, and provides the highest caliber vendor-authorized 
 instruction at our training centers, online, or onsite.



 



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354531
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-15 Thread Raymond Camden

My blog? Running CF? Wow. Um, yes. :) Running BlogCFC, an open source
blog-ware.




On Fri, Feb 15, 2013 at 7:05 AM, Revolution 
houseoffusion_...@internetemail.info wrote:


 CFFormProtect works well (for me).

 I need to a PHP version of this. I'm sure there's one out there.

 May have to write my own.

 Your blog is running CF ?



 -Original Message-
 From: Raymond Camden [mailto:raymondcam...@gmail.com]
 Sent: Monday, February 11, 2013 11:46 AM
 To: cf-talk
 Subject: Re: Problem with Hackers on Donation form through Authorize.net


 As an FYI, my blog never had a lot of spam, but it was pretty regular. When
 I started using CFFP, it dropped dramatically. I can't even remember my
 last
 spam comment.


 On Mon, Feb 11, 2013 at 10:43 AM, Rick Faircloth
 r...@whitestonemedia.comwrote:

 
  Thanks for the recommendation, Dave.
 
  It seems like an all-in-one approach, like CFFormProtect, might be
  the only way to beat this thing!
 
  I'll go check it out...
 
  Rick
 
  -Original Message-
  From: Dave Watts [mailto:dwa...@figleaf.com]
  Sent: Monday, February 11, 2013 11:30 AM
  To: cf-talk
  Subject: Re: Problem with Hackers on Donation form through
  Authorize.net
 
 
   I realize that if someone is hiring cheap human labor for $1 per day
   to sit and enter form info, that I can't stop that, but if it is
   bots doing the spamming, will making CF captcha more difficult to
   read have a good chance of stopping the bots, or do I need to get
   with reCaptcha.  I like using CF's solution, because I can code it
   myself.  But if it doesn't work...
 
  I recommend you use this instead of any CAPTCHA:
 
  http://cfformprotect.riaforge.org/
 
  Dave Watts, CTO, Fig Leaf Software
  http://www.figleaf.com/
  http://training.figleaf.com/
 
  Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on GSA
  Schedule, and provides the highest caliber vendor-authorized
  instruction at our training centers, online, or onsite.
 
 
 
 



 

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354538
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-15 Thread Al Musella, DPM

You have to be careful not to interfere with normal donations.
When I fill out forms using chrome, chrome fills in my name, address 
and phone number.  It might take me only 15 seconds to fill out my 
donation form..

You can determine if he bypasses your form by setting a cookie on the 
form page with the datestamp encrypted... and check it on the 
processing page.  you can tell  how much time from form page load to 
submit.If it is more than about an hour, he probably didn't fill out 
the form and submit it as you would expect.




The hacking has slowed down some; there's only been three or four attempts
in the last couple of days. Nothing I've done, since it's apparently
a human hacker, and the only thing I'm using now is a CF-generated captcha
set to medium. So, that's not stopping the hacker. Perhaps the hacker has
just moved on to another target for awhile.

When (not if...) it starts up again, I'm going to try the javascript timing
function, timing when a form element is first clicked and making sure it takes
at least 2 minutes until the form is submitted, or I'll fail the transaction.

None of the hacker's attempts have taken more than about 1 min 15 sec, and
most are about 15-30 seconds, so, hopefully, that will be just enough of an
irritant to run the hacker off.

If the hacker is bypassing my form, however, which depends on javascript to
function, and is attacking my CFC which submits the form when all CF 
validation
is passed via CFHTTP, I wonder if the hacker can still submit the form with
javascript turned off? How would I go about determining just what the hacker's
process is?

And if the hacker is disabled javascript, I guess I can use a session variable
in CF to check the time for the start and end of form input. But if, 
he's (or she's)
attacking the CFC method directly, would the form timing even be relevant?

I wish I could send enough of an electric shock through hackers' keyboards
to knock them out for an hour...maybe someday. I can only hope!


-Original Message-
From: UXB [mailto:denn...@uxbinternet.com]
Sent: Wednesday, February 13, 2013 9:23 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net


  Part of the verification in the processing can be reliant upon something
  executing in JavaScript and being passed in with the form submission.

While I do not disagree with your statements anything that is part of the
form data that can be generated by JavaScript can be submitted without it
by, as you said, capturing a real form submission and then simulating it.
The final protection has to be server side because you cannot rely on the
data sent by the client.


  The idea with these kinds of protections is to make it sufficiently
inconvenient
  for an attacker to go to the trouble and move on to the next guy who is
easier to exploit.

  Abuse can be a hard problem to solve.

Very!  It is almost always proportional to the potential gain of the abuse.
In Rick's case there is a fairly high financial gain to be had by the
verification of credit card numbers.

Like you we had a donation page for a client and they too were getting a
large number of abusive submissions until we but it behind a signup/login
page that required a valid email address and a easy to read captcha.  In
that case it solved the issue and they had no more problems but then they
were clearing the CC numbers manually so there was always human oversight.


Dennis Powers
UXB Internet - A website Design and Hosting Company
P.O. Box 6028, Wolcott, CT 06716 - T:203-879-2844
W: http://www.uxbinternet.com
W: http://www.ctbusinesslist.com







~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354543
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-15 Thread Rick Faircloth

 You have to be careful not to interfere with normal donations.
 When I fill out forms using chrome, chrome fills in my name, address 
 and phone number.  It might take me only 15 seconds to fill out my 
 donation form..

Yes, I've thought about that. There's some sections of the form that
are only shown if a user answers question a certain way, so that does
take a little longer, even with autofill.

I had a few hack attempts today, and some of them were submitted faster
than the Javascript time limit imposed, so the hacker must have JS turned off.

A few other attempts were stopped by the captcha, so there must be a bot
involved in some attempts, as well.

 You can determine if he bypasses your form by setting a cookie on the 
 form page with the datestamp encrypted... and check it on the 
 processing page.  you can tell  how much time from form page load to 
 submit. If it is more than about an hour, he probably didn't fill out 
 the form and submit it as you would expect.

You mean, by staying on the page so long that it's an indication
that he's hacking the form or the cfc method that does the processing
instead of doing a normal form submit like typical user would?

And what if the hacker has cookies disabled? And are you suggesting that
a session variable wouldn't be as good as a cookie?
 
Thanks for the feedback...

Rick


-Original Message-
From: Al Musella, DPM [mailto:muse...@virtualtrials.com] 
Sent: Friday, February 15, 2013 7:21 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net


You have to be careful not to interfere with normal donations.
When I fill out forms using chrome, chrome fills in my name, address 
and phone number.  It might take me only 15 seconds to fill out my 
donation form..

You can determine if he bypasses your form by setting a cookie on the 
form page with the datestamp encrypted... and check it on the 
processing page.  you can tell  how much time from form page load to 
submit.If it is more than about an hour, he probably didn't fill out 
the form and submit it as you would expect.




The hacking has slowed down some; there's only been three or four attempts
in the last couple of days. Nothing I've done, since it's apparently
a human hacker, and the only thing I'm using now is a CF-generated captcha
set to medium. So, that's not stopping the hacker. Perhaps the hacker has
just moved on to another target for awhile.

When (not if...) it starts up again, I'm going to try the javascript timing
function, timing when a form element is first clicked and making sure it takes
at least 2 minutes until the form is submitted, or I'll fail the transaction.

None of the hacker's attempts have taken more than about 1 min 15 sec, and
most are about 15-30 seconds, so, hopefully, that will be just enough of an
irritant to run the hacker off.

If the hacker is bypassing my form, however, which depends on javascript to
function, and is attacking my CFC which submits the form when all CF 
validation
is passed via CFHTTP, I wonder if the hacker can still submit the form with
javascript turned off? How would I go about determining just what the hacker's
process is?

And if the hacker is disabled javascript, I guess I can use a session variable
in CF to check the time for the start and end of form input. But if, 
he's (or she's)
attacking the CFC method directly, would the form timing even be relevant?

I wish I could send enough of an electric shock through hackers' keyboards
to knock them out for an hour...maybe someday. I can only hope!


-Original Message-
From: UXB [mailto:denn...@uxbinternet.com]
Sent: Wednesday, February 13, 2013 9:23 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net


  Part of the verification in the processing can be reliant upon something
  executing in JavaScript and being passed in with the form submission.

While I do not disagree with your statements anything that is part of the
form data that can be generated by JavaScript can be submitted without it
by, as you said, capturing a real form submission and then simulating it.
The final protection has to be server side because you cannot rely on the
data sent by the client.


  The idea with these kinds of protections is to make it sufficiently
inconvenient
  for an attacker to go to the trouble and move on to the next guy who is
easier to exploit.

  Abuse can be a hard problem to solve.

Very!  It is almost always proportional to the potential gain of the abuse.
In Rick's case there is a fairly high financial gain to be had by the
verification of credit card numbers.

Like you we had a donation page for a client and they too were getting a
large number of abusive submissions until we but it behind a signup/login
page that required a valid email address and a easy to read captcha.  In
that case it solved the issue and they had no more problems but then they
were clearing the CC numbers manually so there was always human

RE: Problem with Hackers on Donation form through Authorize.net

2013-02-15 Thread Al Musella, DPM

If they read in the form page and then submit it using a script for 
many days without re-reading the original form, it will appear to the 
server that they took days to fill.  So testing for more than a few 
hours should be good...

sessions might work but they should expire quickly... then if the 
session variable is not present you know they took too long.


At 10:04 PM 2/15/2013, you wrote:
You mean, by staying on the page so long that it's an indication
that he's hacking the form or the cfc method that does the processing
instead of doing a normal form submit like typical user would?

And what if the hacker has cookies disabled? And are you suggesting that
a session variable wouldn't be as good as a cookie?

Thanks for the feedback...

Rick


~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354553
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-14 Thread UXB

 I wonder if the hacker can still submit the form with JavaScript turned
off? 
 How would I go about determining just what the hacker's process is?

At a base level they can copy your form page to their local server then
manipulate the form submitting it to your cfc directly.  I have seen people
even write scripts to open the form page to obtain the server generated
settings in the form and then repost them back with scripted manipulated
fields.

As Justin so aptly said: Abuse can be a hard problem to solve.

Dennis Powers
UXB Internet - A website Design and Hosting Company
P.O. Box 6028, Wolcott, CT 06716 - T:203-879-2844
W: http://www.uxbinternet.com
W: http://www.ctbusinesslist.com



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354515
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-13 Thread Rick Faircloth

Thanks for the feedback, Justin...

-Original Message-
From: Justin Scott [mailto:leviat...@darktech.org] 
Sent: Tuesday, February 12, 2013 6:01 PM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net


 Forget the form page the bots/humans are not even seeing it they are
 attacking your processing cfc directly.  Your protection has to be server
 side since any JavaScript on the form page is ignored. They are
 submitting form data directly to your CFC processing page.

Part of the verification in the processing can be reliant upon
something executing in JavaScript and being passed in with the form
submission.  This is how CFFormProtect works (looks for and tracks
timing, keystrokes, mouse movement, etc.).  This data is tracked and
passed in to the form and the server runs checks against it to
determine whether the script ran and events occurred that you would
expect to see in a real environment vs. an automated script (it does
have some server-side checks as well such as Akismet lookups, etc.).

It is true that an attacker could capture one real submission
between the browser and the server and modify their scripts to submit
the appropriate data to make it appear as though a script ran and
those form fields were populated naturally when they actually weren't,
though an attacker would need to be pretty persistent to go through
all that trouble.

The idea with these kinds of protections is to make it sufficiently
inconvenient for an attacker to go to the trouble and move on to the
next guy who is easier to exploit.

One of the sites I ran years ago had a problem with people scripting
the signup process to generate accounts (even to the point of
generating e-mail accounts to use for the e-mail validation process).
We really didn't want to use a CAPTCHA, so we ended up randomizing the
form field names (and creating a map of the random names to the real
names as a session variable when the form was generated so we could
match them back up when it was submitted).  This prevented the process
script from being hit directly and would have forced them to load the
actual signup page first, parse all the fieldnames out, and then run
the submission again.  They could have automated this as well, but
never did (perhaps because it was too inconvenient and there were
easier targets to go after).

The earlier idea of automatically rejecting transactions and
transparently showing a reject notice after a couple of failures is a
good anti-abuse measure in this instance.  If logs are being kept,
they can be reviewed periodically and anyone who looks like they may
have been accidentally rejected can be contacted again later to
recapture their donation if needed.  Abuse can be a hard problem to
solve.


-Justin



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354493
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-13 Thread Rick Faircloth

Thanks, Dennis!

-Original Message-
From: UXB [mailto:denn...@uxbinternet.com] 
Sent: Tuesday, February 12, 2013 5:31 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net


 button for my form is just a regular button that triggers an AJAX 
 function that sends the data to a CFC for further processing and then
submission

Forget the form page the bots/humans are not even seeing it they are
attacking your processing cfc directly.  Your protection has to be server
side since any JavaScript on the form page is ignored. They are
submitting form data directly to your CFC processing page.



Dennis Powers
UXB Internet - A website Design and Hosting Company
P.O. Box 6028, Wolcott, CT 06716 - T:203-879-2844
W: http://www.uxbinternet.com
W: http://www.ctbusinesslist.com






~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354494
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-13 Thread UXB

 Part of the verification in the processing can be reliant upon something 
 executing in JavaScript and being passed in with the form submission.  

While I do not disagree with your statements anything that is part of the
form data that can be generated by JavaScript can be submitted without it
by, as you said, capturing a real form submission and then simulating it.
The final protection has to be server side because you cannot rely on the
data sent by the client.


 The idea with these kinds of protections is to make it sufficiently
inconvenient 
 for an attacker to go to the trouble and move on to the next guy who is
easier to exploit.

 Abuse can be a hard problem to solve.

Very!  It is almost always proportional to the potential gain of the abuse.
In Rick's case there is a fairly high financial gain to be had by the
verification of credit card numbers.

Like you we had a donation page for a client and they too were getting a
large number of abusive submissions until we but it behind a signup/login
page that required a valid email address and a easy to read captcha.  In
that case it solved the issue and they had no more problems but then they
were clearing the CC numbers manually so there was always human oversight.


Dennis Powers
UXB Internet - A website Design and Hosting Company
P.O. Box 6028, Wolcott, CT 06716 - T:203-879-2844
W: http://www.uxbinternet.com
W: http://www.ctbusinesslist.com



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354497
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-13 Thread Rick Faircloth

The hacking has slowed down some; there's only been three or four attempts
in the last couple of days. Nothing I've done, since it's apparently
a human hacker, and the only thing I'm using now is a CF-generated captcha
set to medium. So, that's not stopping the hacker. Perhaps the hacker has
just moved on to another target for awhile.

When (not if...) it starts up again, I'm going to try the javascript timing
function, timing when a form element is first clicked and making sure it takes
at least 2 minutes until the form is submitted, or I'll fail the transaction.

None of the hacker's attempts have taken more than about 1 min 15 sec, and
most are about 15-30 seconds, so, hopefully, that will be just enough of an
irritant to run the hacker off.

If the hacker is bypassing my form, however, which depends on javascript to
function, and is attacking my CFC which submits the form when all CF validation
is passed via CFHTTP, I wonder if the hacker can still submit the form with
javascript turned off? How would I go about determining just what the hacker's
process is?

And if the hacker is disabled javascript, I guess I can use a session variable
in CF to check the time for the start and end of form input. But if, he's (or 
she's)
attacking the CFC method directly, would the form timing even be relevant?

I wish I could send enough of an electric shock through hackers' keyboards
to knock them out for an hour...maybe someday. I can only hope!


-Original Message-
From: UXB [mailto:denn...@uxbinternet.com] 
Sent: Wednesday, February 13, 2013 9:23 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net


 Part of the verification in the processing can be reliant upon something 
 executing in JavaScript and being passed in with the form submission.  

While I do not disagree with your statements anything that is part of the
form data that can be generated by JavaScript can be submitted without it
by, as you said, capturing a real form submission and then simulating it.
The final protection has to be server side because you cannot rely on the
data sent by the client.


 The idea with these kinds of protections is to make it sufficiently
inconvenient 
 for an attacker to go to the trouble and move on to the next guy who is
easier to exploit.

 Abuse can be a hard problem to solve.

Very!  It is almost always proportional to the potential gain of the abuse.
In Rick's case there is a fairly high financial gain to be had by the
verification of credit card numbers.

Like you we had a donation page for a client and they too were getting a
large number of abusive submissions until we but it behind a signup/login
page that required a valid email address and a easy to read captcha.  In
that case it solved the issue and they had no more problems but then they
were clearing the CC numbers manually so there was always human oversight.


Dennis Powers
UXB Internet - A website Design and Hosting Company
P.O. Box 6028, Wolcott, CT 06716 - T:203-879-2844
W: http://www.uxbinternet.com
W: http://www.ctbusinesslist.com





~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354498
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-12 Thread Rick Faircloth

Looks interesting. IP-based blocking may be a good way to go
for my donation form.

-Original Message-
From: Al Musella, DPM [mailto:muse...@virtualtrials.com] 
Sent: Tuesday, February 12, 2013 12:07 AM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net


I came across an interesting way to get the country from the IP 
address.. http://www.mximize.com/getting-country-by-ip-based-on-geolite
I might set this up and block non North American IPs...


At 04:43 PM 2/11/2013, Les Mizzell wrote:

One site of mine for a dance company used to get a ton of spam through
contact forms. Everybody hated CAPTCHA, so I put a simple question with
radio button choices:

A cow goes?
a. quack
b. woof
c. moo
d. chirp

VERY low tech, but believe it or not, we've not gotten a single piece of
bot spam since!

Wouldn't advise this for most uses though...




~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354475
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-12 Thread Rick Faircloth

Another good thought! Thanks!

-Original Message-
From: Byron Mann [mailto:byronos...@gmail.com] 
Sent: Tuesday, February 12, 2013 1:57 AM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net


A fairly inexpensive and easy to implement fraud screening service is
maxmind minfraud.

It's something like 0.005 per transaction methinks.

Another method I didn't see in the thread was doing an email confirmation
before performing the cc transaction. Like  send an email to the user with
a unique ID the user must click to verify a legit email address was used.

Can still be bot'd but requires a bit more work on their part, which might
be enough discourage since there are a lot of other places for them to go
do their dirtiness.

Byron Mann
Lead Engineer  Architect
HostMySite.com
On Feb 11, 2013 11:13 AM, Rick Faircloth r...@whitestonemedia.com wrote:


 Hi, guys...

 I'm been running my first eCommerce setup with a donation
 page/form using Authorize.net.

 Things have been running fine, excepts for spammers using
 the donation form to find legitmate CC numbers so they could
 abuse the card in other ways.

 I've assumed, up to this point, that the spammers are bots,
 not humans.  The spam attempts happened every 15-30 seconds
 for about an hour, then they stop.  Very few are able to
 successfully process a transaction, but I'm trying to stop
 the form from being submitted.

 I've tried honey-pot traps, then moved to CF's captcha (at
 its default level of difficulty). So far, the spam attempts
 keep coming and my client is wondering if they need to get
 someone (besides me) to handle the donations since I can't seem
 to stop the spam.

 I realize that if someone is hiring cheap human labor for $1
 per day to sit and enter form info, that I can't stop that,
 but if it is bots doing the spamming, will making CF captcha
 more difficult to read have a good chance of stopping the bots,
 or do I need to get with reCaptcha.  I like using CF's solution,
 because I can code it myself.  But if it doesn't work...

 Thoughts on this? I've got to get a solution working.

 Thanks for any feedback!

 Rick



 



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354476
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-12 Thread Peter Donahue

Good morning everyone,

That verification solution will also work with screen readers making it 
possible for disabled Web surfers to use that form. Good going although 
CFFormProtect would eliminate the captcha all together.

Peter Donahue


- Original Message - 
From: Al Musella, DPM muse...@virtualtrials.com
To: cf-talk cf-talk@houseoffusion.com
Sent: Monday, February 11, 2013 11:06 PM
Subject: Re: Problem with Hackers on Donation form through Authorize.net



I came across an interesting way to get the country from the IP
address.. http://www.mximize.com/getting-country-by-ip-based-on-geolite
I might set this up and block non North American IPs...


At 04:43 PM 2/11/2013, Les Mizzell wrote:

One site of mine for a dance company used to get a ton of spam through
contact forms. Everybody hated CAPTCHA, so I put a simple question with
radio button choices:

A cow goes?
a. quack
b. woof
c. moo
d. chirp

VERY low tech, but believe it or not, we've not gotten a single piece of
bot spam since!

Wouldn't advise this for most uses though...




~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354478
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-12 Thread Al Musella, DPM

   Your right  we do routinely get real donations from a few 
places like Puerto Rico and Mexico  (which both happen to be part of 
north america)... as well as most of Europe and Japan. We actually 
got real donations from China and  even Nigeria so we can't block any 
coutry outright.

So I am not going to bother blocking countries.
  We had another run of someone trying yesterday.. I detected it on 
the 3rd attmept (all of which failed).. then he (or she) tried about 
30 more times where I just sent the fake failure notice without 
letting it hit the credit card processor.




On 2/12/2013 12:06 PM, Al Musella, DPM wrote:
 
  I came across an interesting way to get the country from the IP
  address.. http://www.mximize.com/getting-country-by-ip-based-on-geolite
  I might set this up and block non North American IPs...

i would check w/your client first. not everybody outside NA is bent on
conducting fraud. and will you exclude users from Mexico, Puerto Rico, etc.?

and keep in mind that IP-to-country conversion isn't fool-proof as it is,
never-mind when folks actively try to defeat it.





~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354480
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-12 Thread Justin Scott

   We had another run of someone trying yesterday.. I detected it on
 the 3rd attmept (all of which failed).. then he (or she) tried about
 30 more times where I just sent the fake failure notice without
 letting it hit the credit card processor.

I like this approach on two fronts.  First it protects you and your
merchant account, and second it gives the attacker a false negative on
card numbers that may have been otherwise valid which could help save
the cardholder from a lot of bogus charges down the line.


-Justin

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354481
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-12 Thread Rick Faircloth

All of my attempts over the last couple of months
have been under 2 minutes apart.

It takes a lot longer than that to fill out the donation form.

I think I'm going to try a timing function to determine
the time of the first click of the form and the click of the
submit button, and if the times is less than 12ms (2 minutes),
I'm going to reject the submission.

Nothing else is working, I might as well try that.  If it's a bot
doing the spamming, it probably won't wait. If it's a person, doing
the spamming, they won't know why they're getting the failure notice.

Any problems with this approach?


-Original Message-
From: Justin Scott [mailto:leviat...@darktech.org] 
Sent: Tuesday, February 12, 2013 2:36 PM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net


   We had another run of someone trying yesterday.. I detected it on
 the 3rd attmept (all of which failed).. then he (or she) tried about
 30 more times where I just sent the fake failure notice without
 letting it hit the credit card processor.

I like this approach on two fronts.  First it protects you and your
merchant account, and second it gives the attacker a false negative on
card numbers that may have been otherwise valid which could help save
the cardholder from a lot of bogus charges down the line.


-Justin



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354482
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-12 Thread Rick Faircloth

Sometimes I hate this work... even though I've got it made as a
freelancer. I still hate this work at times. Maybe I'll just go
work at Lowes...

-Original Message-
From: Justin Scott [mailto:leviat...@darktech.org] 
Sent: Tuesday, February 12, 2013 2:36 PM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net


   We had another run of someone trying yesterday.. I detected it on
 the 3rd attmept (all of which failed).. then he (or she) tried about
 30 more times where I just sent the fake failure notice without
 letting it hit the credit card processor.

I like this approach on two fronts.  First it protects you and your
merchant account, and second it gives the attacker a false negative on
card numbers that may have been otherwise valid which could help save
the cardholder from a lot of bogus charges down the line.


-Justin



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354483
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-12 Thread Claude Schnéegans

 If so, this won't work because I don't use an actual button with
a type of submit. The submit button for my form is just a regular
button that triggers an AJAX function that sends the data to a CFC
for further processing and then submission in the CFC to Authorize.net.

 From this you can conclude at 99% that the spammers are human.
Bot very unlikely execute Ajax functions, not even any Javascript.
Then Captcha won't help.




~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354484
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-12 Thread UXB

 button for my form is just a regular button that triggers an AJAX 
 function that sends the data to a CFC for further processing and then
submission

Forget the form page the bots/humans are not even seeing it they are
attacking your processing cfc directly.  Your protection has to be server
side since any JavaScript on the form page is ignored. They are
submitting form data directly to your CFC processing page.



Dennis Powers
UXB Internet - A website Design and Hosting Company
P.O. Box 6028, Wolcott, CT 06716 - T:203-879-2844
W: http://www.uxbinternet.com
W: http://www.ctbusinesslist.com




~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354486
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-12 Thread Justin Scott

 Forget the form page the bots/humans are not even seeing it they are
 attacking your processing cfc directly.  Your protection has to be server
 side since any JavaScript on the form page is ignored. They are
 submitting form data directly to your CFC processing page.

Part of the verification in the processing can be reliant upon
something executing in JavaScript and being passed in with the form
submission.  This is how CFFormProtect works (looks for and tracks
timing, keystrokes, mouse movement, etc.).  This data is tracked and
passed in to the form and the server runs checks against it to
determine whether the script ran and events occurred that you would
expect to see in a real environment vs. an automated script (it does
have some server-side checks as well such as Akismet lookups, etc.).

It is true that an attacker could capture one real submission
between the browser and the server and modify their scripts to submit
the appropriate data to make it appear as though a script ran and
those form fields were populated naturally when they actually weren't,
though an attacker would need to be pretty persistent to go through
all that trouble.

The idea with these kinds of protections is to make it sufficiently
inconvenient for an attacker to go to the trouble and move on to the
next guy who is easier to exploit.

One of the sites I ran years ago had a problem with people scripting
the signup process to generate accounts (even to the point of
generating e-mail accounts to use for the e-mail validation process).
We really didn't want to use a CAPTCHA, so we ended up randomizing the
form field names (and creating a map of the random names to the real
names as a session variable when the form was generated so we could
match them back up when it was submitted).  This prevented the process
script from being hit directly and would have forced them to load the
actual signup page first, parse all the fieldnames out, and then run
the submission again.  They could have automated this as well, but
never did (perhaps because it was too inconvenient and there were
easier targets to go after).

The earlier idea of automatically rejecting transactions and
transparently showing a reject notice after a couple of failures is a
good anti-abuse measure in this instance.  If logs are being kept,
they can be reviewed periodically and anyone who looks like they may
have been accidentally rejected can be contacted again later to
recapture their donation if needed.  Abuse can be a hard problem to
solve.


-Justin

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354487
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Rick Faircloth

Hi, guys...

I'm been running my first eCommerce setup with a donation
page/form using Authorize.net.

Things have been running fine, excepts for spammers using
the donation form to find legitmate CC numbers so they could
abuse the card in other ways.

I've assumed, up to this point, that the spammers are bots,
not humans.  The spam attempts happened every 15-30 seconds
for about an hour, then they stop.  Very few are able to
successfully process a transaction, but I'm trying to stop
the form from being submitted.

I've tried honey-pot traps, then moved to CF's captcha (at
its default level of difficulty). So far, the spam attempts
keep coming and my client is wondering if they need to get
someone (besides me) to handle the donations since I can't seem
to stop the spam.

I realize that if someone is hiring cheap human labor for $1
per day to sit and enter form info, that I can't stop that,
but if it is bots doing the spamming, will making CF captcha
more difficult to read have a good chance of stopping the bots,
or do I need to get with reCaptcha.  I like using CF's solution,
because I can code it myself.  But if it doesn't work...

Thoughts on this? I've got to get a solution working.

Thanks for any feedback!

Rick



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354451
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Dave Watts

 I realize that if someone is hiring cheap human labor for $1
 per day to sit and enter form info, that I can't stop that,
 but if it is bots doing the spamming, will making CF captcha
 more difficult to read have a good chance of stopping the bots,
 or do I need to get with reCaptcha.  I like using CF's solution,
 because I can code it myself.  But if it doesn't work...

I recommend you use this instead of any CAPTCHA:

http://cfformprotect.riaforge.org/

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http://training.figleaf.com/

Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruction at our training centers, online, or onsite.

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354453
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Rick Faircloth

Thanks for the recommendation, Dave.

It seems like an all-in-one approach, like CFFormProtect,
might be the only way to beat this thing!

I'll go check it out...

Rick

-Original Message-
From: Dave Watts [mailto:dwa...@figleaf.com] 
Sent: Monday, February 11, 2013 11:30 AM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net


 I realize that if someone is hiring cheap human labor for $1
 per day to sit and enter form info, that I can't stop that,
 but if it is bots doing the spamming, will making CF captcha
 more difficult to read have a good chance of stopping the bots,
 or do I need to get with reCaptcha.  I like using CF's solution,
 because I can code it myself.  But if it doesn't work...

I recommend you use this instead of any CAPTCHA:

http://cfformprotect.riaforge.org/

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http://training.figleaf.com/

Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruction at our training centers, online, or onsite.



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354454
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Raymond Camden

As an FYI, my blog never had a lot of spam, but it was pretty regular. When
I started using CFFP, it dropped dramatically. I can't even remember my
last spam comment.


On Mon, Feb 11, 2013 at 10:43 AM, Rick Faircloth
r...@whitestonemedia.comwrote:


 Thanks for the recommendation, Dave.

 It seems like an all-in-one approach, like CFFormProtect,
 might be the only way to beat this thing!

 I'll go check it out...

 Rick

 -Original Message-
 From: Dave Watts [mailto:dwa...@figleaf.com]
 Sent: Monday, February 11, 2013 11:30 AM
 To: cf-talk
 Subject: Re: Problem with Hackers on Donation form through Authorize.net


  I realize that if someone is hiring cheap human labor for $1
  per day to sit and enter form info, that I can't stop that,
  but if it is bots doing the spamming, will making CF captcha
  more difficult to read have a good chance of stopping the bots,
  or do I need to get with reCaptcha.  I like using CF's solution,
  because I can code it myself.  But if it doesn't work...

 I recommend you use this instead of any CAPTCHA:

 http://cfformprotect.riaforge.org/

 Dave Watts, CTO, Fig Leaf Software
 http://www.figleaf.com/
 http://training.figleaf.com/

 Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
 GSA Schedule, and provides the highest caliber vendor-authorized
 instruction at our training centers, online, or onsite.



 

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354455
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Rick Faircloth

Thanks for the feedback, Ray, Dave...

Does CFFormProtect actually submit a form? I haven't parsed through
the code, yet, but I'm trying to determine if it just runs some tests
for validation or does it continue on to submit the form.

The form and processing I've code is quite extensive and involves jQuery
on the client side for validation, then CF validation in a CFC, then,
if all's well, I used cfhttps to submit the form to Authorize.net.

I've got to figure out just how CFFormProtect fits into this equation.
I've implemented it per the instructions, but I'm not sure just what type
of processing environment it's supposed to fit into.

I did get one successful transaction that I submitted to process with
CFFormProtect implemented, but the second on didn't pass CFFormProtect
and I didn't get a form response (success/failure) back from the AJAX
submission function.

If anyone cares to look, the form is at
http://uso.whitestonemedia.com/modules/donate/donation-form.cfm

That's the development site.

Rick



-Original Message-
From: Raymond Camden [mailto:raymondcam...@gmail.com] 
Sent: Monday, February 11, 2013 11:46 AM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net


As an FYI, my blog never had a lot of spam, but it was pretty regular. When
I started using CFFP, it dropped dramatically. I can't even remember my
last spam comment.


On Mon, Feb 11, 2013 at 10:43 AM, Rick Faircloth
r...@whitestonemedia.comwrote:


 Thanks for the recommendation, Dave.

 It seems like an all-in-one approach, like CFFormProtect,
 might be the only way to beat this thing!

 I'll go check it out...

 Rick

 -Original Message-
 From: Dave Watts [mailto:dwa...@figleaf.com]
 Sent: Monday, February 11, 2013 11:30 AM
 To: cf-talk
 Subject: Re: Problem with Hackers on Donation form through Authorize.net


  I realize that if someone is hiring cheap human labor for $1
  per day to sit and enter form info, that I can't stop that,
  but if it is bots doing the spamming, will making CF captcha
  more difficult to read have a good chance of stopping the bots,
  or do I need to get with reCaptcha.  I like using CF's solution,
  because I can code it myself.  But if it doesn't work...

 I recommend you use this instead of any CAPTCHA:

 http://cfformprotect.riaforge.org/

 Dave Watts, CTO, Fig Leaf Software
 http://www.figleaf.com/
 http://training.figleaf.com/

 Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
 GSA Schedule, and provides the highest caliber vendor-authorized
 instruction at our training centers, online, or onsite.



 



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354459
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Raymond Camden

No, it returns a pass/fail type response.In your example, I'd probably add
it after you do client side validation and CF validation, but before the
hit to Authorize.net.


On Mon, Feb 11, 2013 at 12:48 PM, Rick Faircloth
r...@whitestonemedia.comwrote:


 Thanks for the feedback, Ray, Dave...

 Does CFFormProtect actually submit a form? I haven't parsed through
 the code, yet, but I'm trying to determine if it just runs some tests
 for validation or does it continue on to submit the form.

 The form and processing I've code is quite extensive and involves jQuery
 on the client side for validation, then CF validation in a CFC, then,
 if all's well, I used cfhttps to submit the form to Authorize.net.

 I've got to figure out just how CFFormProtect fits into this equation.
 I've implemented it per the instructions, but I'm not sure just what type
 of processing environment it's supposed to fit into.

 I did get one successful transaction that I submitted to process with
 CFFormProtect implemented, but the second on didn't pass CFFormProtect
 and I didn't get a form response (success/failure) back from the AJAX
 submission function.

 If anyone cares to look, the form is at
 http://uso.whitestonemedia.com/modules/donate/donation-form.cfm

 That's the development site.

 Rick



 -Original Message-
 From: Raymond Camden [mailto:raymondcam...@gmail.com]
 Sent: Monday, February 11, 2013 11:46 AM
 To: cf-talk
 Subject: Re: Problem with Hackers on Donation form through Authorize.net


 As an FYI, my blog never had a lot of spam, but it was pretty regular. When
 I started using CFFP, it dropped dramatically. I can't even remember my
 last spam comment.


 On Mon, Feb 11, 2013 at 10:43 AM, Rick Faircloth
 r...@whitestonemedia.comwrote:

 
  Thanks for the recommendation, Dave.
 
  It seems like an all-in-one approach, like CFFormProtect,
  might be the only way to beat this thing!
 
  I'll go check it out...
 
  Rick
 
  -Original Message-
  From: Dave Watts [mailto:dwa...@figleaf.com]
  Sent: Monday, February 11, 2013 11:30 AM
  To: cf-talk
  Subject: Re: Problem with Hackers on Donation form through Authorize.net
 
 
   I realize that if someone is hiring cheap human labor for $1
   per day to sit and enter form info, that I can't stop that,
   but if it is bots doing the spamming, will making CF captcha
   more difficult to read have a good chance of stopping the bots,
   or do I need to get with reCaptcha.  I like using CF's solution,
   because I can code it myself.  But if it doesn't work...
 
  I recommend you use this instead of any CAPTCHA:
 
  http://cfformprotect.riaforge.org/
 
  Dave Watts, CTO, Fig Leaf Software
  http://www.figleaf.com/
  http://training.figleaf.com/
 
  Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
  GSA Schedule, and provides the highest caliber vendor-authorized
  instruction at our training centers, online, or onsite.
 
 
 
 



 

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354460
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Rick Faircloth

After more unsuccessful testing, I'm assuming that the form
button at the end of the form needs to be an actual button with
a type of submit to work with CFFormProtect?

If so, this won't work because I don't use an actual button with
a type of submit. The submit button for my form is just a regular
button that triggers an AJAX function that sends the data to a CFC
for further processing and then submission in the CFC to Authorize.net.

If I put:

cfset Cffp = CreateObject(component,cfformprotect.cffpVerify).init() /

cfif Cffp.testSubmission(form)

   cfmail  to = r...@whitestonemedia.com
  from = r...@whitestonemedia.com
   subject = Form Passed CFFormProtect Text!

  Form passed CFFormProtect test!

   /cfmail

   [ send data to authorize.net using arguments passed to method... ]

   [ send acknowledgement emails to donors, etc ] 

cfelse

   cfset authorizeStruct.FORMPOSTSTATUS = 'invalid' 
   cfset authorizeStruct.TRANSACTIONSTATUS = 'Transaction not processed...' 

   cfreturn authorizeStruct /

/cfif



Even when I know the form values are correct, I get the
failed notices at the end. So somehow the form values aren't
passing the tests for CFFormProtect.

I see there's mention of logFailure() and 'logFailedTests' and logFile'
in the notes, but I haven't figured out where to use those.

Thoughts?

Rick



-Original Message-
From: Raymond Camden [mailto:raymondcam...@gmail.com] 
Sent: Monday, February 11, 2013 2:02 PM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net


No, it returns a pass/fail type response.In your example, I'd probably add
it after you do client side validation and CF validation, but before the
hit to Authorize.net.


On Mon, Feb 11, 2013 at 12:48 PM, Rick Faircloth
r...@whitestonemedia.comwrote:


 Thanks for the feedback, Ray, Dave...

 Does CFFormProtect actually submit a form? I haven't parsed through
 the code, yet, but I'm trying to determine if it just runs some tests
 for validation or does it continue on to submit the form.

 The form and processing I've code is quite extensive and involves jQuery
 on the client side for validation, then CF validation in a CFC, then,
 if all's well, I used cfhttps to submit the form to Authorize.net.

 I've got to figure out just how CFFormProtect fits into this equation.
 I've implemented it per the instructions, but I'm not sure just what type
 of processing environment it's supposed to fit into.

 I did get one successful transaction that I submitted to process with
 CFFormProtect implemented, but the second on didn't pass CFFormProtect
 and I didn't get a form response (success/failure) back from the AJAX
 submission function.

 If anyone cares to look, the form is at
 http://uso.whitestonemedia.com/modules/donate/donation-form.cfm

 That's the development site.

 Rick



 -Original Message-
 From: Raymond Camden [mailto:raymondcam...@gmail.com]
 Sent: Monday, February 11, 2013 11:46 AM
 To: cf-talk
 Subject: Re: Problem with Hackers on Donation form through Authorize.net


 As an FYI, my blog never had a lot of spam, but it was pretty regular. When
 I started using CFFP, it dropped dramatically. I can't even remember my
 last spam comment.


 On Mon, Feb 11, 2013 at 10:43 AM, Rick Faircloth
 r...@whitestonemedia.comwrote:

 
  Thanks for the recommendation, Dave.
 
  It seems like an all-in-one approach, like CFFormProtect,
  might be the only way to beat this thing!
 
  I'll go check it out...
 
  Rick
 
  -Original Message-
  From: Dave Watts [mailto:dwa...@figleaf.com]
  Sent: Monday, February 11, 2013 11:30 AM
  To: cf-talk
  Subject: Re: Problem with Hackers on Donation form through Authorize.net
 
 
   I realize that if someone is hiring cheap human labor for $1
   per day to sit and enter form info, that I can't stop that,
   but if it is bots doing the spamming, will making CF captcha
   more difficult to read have a good chance of stopping the bots,
   or do I need to get with reCaptcha.  I like using CF's solution,
   because I can code it myself.  But if it doesn't work...
 
  I recommend you use this instead of any CAPTCHA:
 
  http://cfformprotect.riaforge.org/
 
  Dave Watts, CTO, Fig Leaf Software
  http://www.figleaf.com/
  http://training.figleaf.com/
 
  Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
  GSA Schedule, and provides the highest caliber vendor-authorized
  instruction at our training centers, online, or onsite.
 
 
 
 



 



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354461
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Raymond Camden

On Mon, Feb 11, 2013 at 1:45 PM, Rick Faircloth r...@whitestonemedia.comwrote:


 After more unsuccessful testing, I'm assuming that the form
 button at the end of the form needs to be an actual button with
 a type of submit to work with CFFormProtect?


Not as far as I know. I'm a bit rusty on the API, but here is how BlogCFC
uses it:

cfif application.usecfp and not isLoggedIn()
cfset cffp = createObject(component,cfformprotect.cffpVerify).init() /
!--- now we can test the form submission ---
cfif not cffp.testSubmission(form)
cfset arrayAppend(aErrors, Your comment has been flagged as spam.) /
/cfif
/cfif

If for some reason your Form struct wasn't, well, the Form, but it was
somewhere else, you would just pass that data in. I *believe* it does look
at somethings in terms of a form post, but it isn't tied to just that.




 If so, this won't work because I don't use an actual button with
 a type of submit. The submit button for my form is just a regular
 button that triggers an AJAX function that sends the data to a CFC
 for further processing and then submission in the CFC to Authorize.net.

 If I put:

 cfset Cffp = CreateObject(component,cfformprotect.cffpVerify).init()
 /

 cfif Cffp.testSubmission(form)


 Even when I know the form values are correct, I get the
 failed notices at the end. So somehow the form values aren't
 passing the tests for CFFormProtect.

 I see there's mention of logFailure() and 'logFailedTests' and logFile'
 in the notes, but I haven't figured out where to use those.


I'd figure it out. ;) Also, have you tried contacting the project admin?
 http://cfformprotect.riaforge.org/


-- 
===
Raymond Camden, Adobe Developer Evangelist

Email : raymondcam...@gmail.com
Blog : www.raymondcamden.com
Twitter: cfjedimaster


~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354462
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Al Musella, DPM

I have just gone through this...  A big problem is that the 
owner  complains and the credit card company charges you a penalty 
and  if many get through they can dump you.

At first, I banned the IP address when someone tried 3 times 
unsuccessfuly.  That worked for about a day then they would come back 
and try again, but with different IPs.  Must be real people and not a bot.

Then I tried something different... if someone tries 3 times without 
success, I flag the IP address and then when they submit a donation, 
I return the  page that says it failed (and I do not even send it on 
to the credit card company).
I also flag the entire subnet to make it harder to get around.  Most 
are from south america and china..  should probably reject any non 
north american ip..


A few people have called me and told me they tried to make a donation 
and they get rejected for no apparent reason.. in which case I take 
the donation by phone.

   I went about a month without 1 complaint so it might be working!


~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354463
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Rick Faircloth

Thanks for the info, Al...

It is a royal pain trying to deal with these hackers.
I might just try a combination of two things:

1) a honey pot to catch the humans when it's empty

2) a captcha for the bots who, supposedly, can't read them

Wonder if that would work?

-Original Message-
From: Al Musella, DPM [mailto:muse...@virtualtrials.com] 
Sent: Monday, February 11, 2013 4:32 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net


I have just gone through this...  A big problem is that the 
owner  complains and the credit card company charges you a penalty 
and  if many get through they can dump you.

At first, I banned the IP address when someone tried 3 times 
unsuccessfuly.  That worked for about a day then they would come back 
and try again, but with different IPs.  Must be real people and not a bot.

Then I tried something different... if someone tries 3 times without 
success, I flag the IP address and then when they submit a donation, 
I return the  page that says it failed (and I do not even send it on 
to the credit card company).
I also flag the entire subnet to make it harder to get around.  Most 
are from south america and china..  should probably reject any non 
north american ip..


A few people have called me and told me they tried to make a donation 
and they get rejected for no apparent reason.. in which case I take 
the donation by phone.

   I went about a month without 1 complaint so it might be working!




~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354464
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Les Mizzell

One site of mine for a dance company used to get a ton of spam through 
contact forms. Everybody hated CAPTCHA, so I put a simple question with 
radio button choices:

A cow goes?
a. quack
b. woof
c. moo
d. chirp

VERY low tech, but believe it or not, we've not gotten a single piece of 
bot spam since!

Wouldn't advise this for most uses though...

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354465
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


RE: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Rick Faircloth

Boy was that a stupid, not-thought-out approach!

I was so focused on separating the spamming humans from
the spamming bots, I came up with a solution that wouldn't
let human or bot submit a form, whether the human was a
legitimate donor, or not!

Duh! (It's been a long day... time to go to Outback!)

Rick

-Original Message-
From: Rick Faircloth [mailto:r...@whitestonemedia.com] 
Sent: Monday, February 11, 2013 4:40 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net


Thanks for the info, Al...

It is a royal pain trying to deal with these hackers.
I might just try a combination of two things:

1) a honey pot to catch the humans when it's empty

2) a captcha for the bots who, supposedly, can't read them

Wonder if that would work?

-Original Message-
From: Al Musella, DPM [mailto:muse...@virtualtrials.com] 
Sent: Monday, February 11, 2013 4:32 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net


I have just gone through this...  A big problem is that the 
owner  complains and the credit card company charges you a penalty 
and  if many get through they can dump you.

At first, I banned the IP address when someone tried 3 times 
unsuccessfuly.  That worked for about a day then they would come back 
and try again, but with different IPs.  Must be real people and not a bot.

Then I tried something different... if someone tries 3 times without 
success, I flag the IP address and then when they submit a donation, 
I return the  page that says it failed (and I do not even send it on 
to the credit card company).
I also flag the entire subnet to make it harder to get around.  Most 
are from south america and china..  should probably reject any non 
north american ip..


A few people have called me and told me they tried to make a donation 
and they get rejected for no apparent reason.. in which case I take 
the donation by phone.

   I went about a month without 1 complaint so it might be working!






~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354466
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Al Musella, DPM

I came across an interesting way to get the country from the IP 
address.. http://www.mximize.com/getting-country-by-ip-based-on-geolite
I might set this up and block non North American IPs...


At 04:43 PM 2/11/2013, Les Mizzell wrote:

One site of mine for a dance company used to get a ton of spam through
contact forms. Everybody hated CAPTCHA, so I put a simple question with
radio button choices:

A cow goes?
a. quack
b. woof
c. moo
d. chirp

VERY low tech, but believe it or not, we've not gotten a single piece of
bot spam since!

Wouldn't advise this for most uses though...


~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354469
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Byron Mann

A fairly inexpensive and easy to implement fraud screening service is
maxmind minfraud.

It's something like 0.005 per transaction methinks.

Another method I didn't see in the thread was doing an email confirmation
before performing the cc transaction. Like  send an email to the user with
a unique ID the user must click to verify a legit email address was used.

Can still be bot'd but requires a bit more work on their part, which might
be enough discourage since there are a lot of other places for them to go
do their dirtiness.

Byron Mann
Lead Engineer  Architect
HostMySite.com
On Feb 11, 2013 11:13 AM, Rick Faircloth r...@whitestonemedia.com wrote:


 Hi, guys...

 I'm been running my first eCommerce setup with a donation
 page/form using Authorize.net.

 Things have been running fine, excepts for spammers using
 the donation form to find legitmate CC numbers so they could
 abuse the card in other ways.

 I've assumed, up to this point, that the spammers are bots,
 not humans.  The spam attempts happened every 15-30 seconds
 for about an hour, then they stop.  Very few are able to
 successfully process a transaction, but I'm trying to stop
 the form from being submitted.

 I've tried honey-pot traps, then moved to CF's captcha (at
 its default level of difficulty). So far, the spam attempts
 keep coming and my client is wondering if they need to get
 someone (besides me) to handle the donations since I can't seem
 to stop the spam.

 I realize that if someone is hiring cheap human labor for $1
 per day to sit and enter form info, that I can't stop that,
 but if it is bots doing the spamming, will making CF captcha
 more difficult to read have a good chance of stopping the bots,
 or do I need to get with reCaptcha.  I like using CF's solution,
 because I can code it myself.  But if it doesn't work...

 Thoughts on this? I've got to get a solution working.

 Thanks for any feedback!

 Rick



 

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354472
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Problem with Hackers on Donation form through Authorize.net

2013-02-11 Thread Paul Hastings

On 2/12/2013 12:06 PM, Al Musella, DPM wrote:

 I came across an interesting way to get the country from the IP
 address.. http://www.mximize.com/getting-country-by-ip-based-on-geolite
 I might set this up and block non North American IPs...

i would check w/your client first. not everybody outside NA is bent on 
conducting fraud. and will you exclude users from Mexico, Puerto Rico, etc.?

and keep in mind that IP-to-country conversion isn't fool-proof as it is, 
never-mind when folks actively try to defeat it.



~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354473
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm