Re: OT Spam sources

2005-09-14 Thread jdow

From: "Christopher X. Candreva" <[EMAIL PROTECTED]>


On Wed, 14 Sep 2005, DAve wrote:

Just curious if anyone else was seeing this besides me. I suspect the 
spammers
are making a new attempt to find web forms they can abuse and possibly 
the
robots are just not smart enough to know that our forms don't work the 
way

they suspect.


Seeing it too, others have described it in detail.

At this point it's just anoying, with users receiving many forms with this
garbage. Since the requests seem to come in rapid succession, I've thought
about an IP cache, and limiting the number of times an IP can submit the
form per unit time. It hasn't gone past the idea stage.


Has anybody observed the odd things you must go through to establish
or edit accounts with many larger forms based servers like e-bay or
yahoo? The "read the text from an image and type it in" forms are
about the only thing that slow down the spammers.

Although there is something to be said for requiring a user ID and a
password that cannot be automatically signed up for when using forms
that can send to addresses other than one that is hard wired in and
immutable. (If that is possible in all possible cases.)

{^_^} 



Re: OT Spam sources

2005-09-14 Thread jdow

From: "DAve" <[EMAIL PROTECTED]>


Michael Monnerie wrote:

On Mittwoch, 14. September 2005 16:03 DAve wrote:


the robots are just not smart enough to know that our forms
don't work the way they suspect.



Maybe rename the script? Could be there's a script of that name which is 
vulnerable...


mfg zmi


All our forms have odd names, we did that when the first Formmail.pl 
attacks showed up years ago.


I could come up with a rule or two to stop the message from being 
delivered, but I much prefer the image verification test in the form so 
the message never gets sent.


All one mail at a time does is slow them down. How many parallel
connections can they make at any one time?
{^_^} 



Re: OT Spam sources

2005-09-14 Thread Christopher X. Candreva
On Wed, 14 Sep 2005, DAve wrote:

> Just curious if anyone else was seeing this besides me. I suspect the spammers
> are making a new attempt to find web forms they can abuse and possibly the
> robots are just not smart enough to know that our forms don't work the way
> they suspect.

Seeing it too, others have described it in detail.

At this point it's just anoying, with users receiving many forms with this 
garbage. Since the requests seem to come in rapid succession, I've thought 
about an IP cache, and limiting the number of times an IP can submit the 
form per unit time. It hasn't gone past the idea stage.


==
Chris Candreva  -- [EMAIL PROTECTED] -- (914) 967-7816
WestNet Internet Services of Westchester
http://www.westnet.com/


Re: OT Spam sources

2005-09-14 Thread Mike Jackson

the robots are just not smart enough to know that our forms
don't work the way they suspect.


Maybe rename the script? Could be there's a script of that name which is 
vulnerable...


All our forms have odd names, we did that when the first Formmail.pl 
attacks showed up years ago.


This sounds a lot like the spamming attempts I've been seeing. They seem to 
go something like this:


* Attacker finds a form. I'm not sure if they use either a search engine or 
just random crawls of some sort. I'm thinking the latter; when I first saw 
it, it was on the servers at work (I'm the admin for a small web 
development/hosting firm) and the attempts came on sites on the same IP 
address (consecutive IPs at that, on two different servers; other sites on 
other IPs in another subnet were unaffected). Later, I saw a similar attempt 
on my personal site, hosted on my own server somewhere else entirely. I 
should note than not all of these forms had common mail form names; the one 
on my personal site was feedback.php, which could've just as easily 
submitted to the recipient via some other method, not just email. When I 
looked at the Apache logs for how they got to feedback form, they hit the 
index of the site first and followed a path almost directly to the feedback 
form, leading me to think they're crawling and looking for a wider variety 
of form name possibilities than you might think.


* Attacker submits the form with all the fields filled in with random 
addresses (gibberish usernames followed by the domain of the site), and some 
fields (that seem to indicate they'd be inserted into From:, To:, or 
Subject: lines) with additional header lines and MIME message separators. 
They don't seem to do much with this at first; from what I saw, they supply 
a drop account email somewhere in there to test if it worked...


* If the attacker received one of the messages to the drop account, they 
start using the form in a more direct spam-like way, supplying Bcc: 
addresses in the headers that do go to legitimate addresses. The messages 
still look like crap, depending on the original form and what it does.


That's as far as it escalated when I observed it. It was at that point that 
we caught the vulnerability in the form script used on the sites at work and 
plugged the holes. (I didn't write it, BTW; the one on my personal site only 
got a message to me.)


Here's a couple things I did from the server side as a first line of defense 
to stop this:


* All the attempts came from proxy servers. Well, I'll assume they were 
proxy servers and not individuals all around the world collaborating on the 
attacks! I installed an Apache module that would do RBL lookups 
(configurable, I use opn.blitzed.org) and deny based on a positive match. 
I'm sure the attacker's (or attackers') proxy list is fresher than the RBLs, 
but I just wanted to add enough stumbling blocks to deter the current and 
future attackers.


* All the attempts came in with blank user agent strings. This is more of a 
stretch (as I discovered), but I started denying requests with blank user 
agents. PHP's functions that open URLs as files don't send user agent 
strings either, so be careful with this one if anything on your server will 
be accessed that way. Attackers could just as easily extend their tools to 
use random user agent strings.


Hope this helps. I'd really love to track down the tool these attackers are 
using, but my hat isn't black enough for that. 



Re: OT Spam sources

2005-09-14 Thread DAve

Michael Monnerie wrote:

On Mittwoch, 14. September 2005 16:03 DAve wrote:


the robots are just not smart enough to know that our forms
don't work the way they suspect.



Maybe rename the script? Could be there's a script of that name which is 
vulnerable...


mfg zmi


All our forms have odd names, we did that when the first Formmail.pl 
attacks showed up years ago.


I could come up with a rule or two to stop the message from being 
delivered, but I much prefer the image verification test in the form so 
the message never gets sent.


Thanks,

DAve



Re: OT Spam sources

2005-09-14 Thread Michael Monnerie
On Mittwoch, 14. September 2005 16:03 DAve wrote:
>  the robots are just not smart enough to know that our forms
> don't work the way they suspect.

Maybe rename the script? Could be there's a script of that name which is 
vulnerable...

mfg zmi
-- 
// Michael Monnerie, Ing.BSc  ---   it-management Michael Monnerie
// http://zmi.at   Tel: 0660/4156531  Linux 2.6.11
// PGP Key:   "lynx -source http://zmi.at/zmi2.asc | gpg --import"
// Fingerprint: EB93 ED8A 1DCD BB6C F952  F7F4 3911 B933 7054 5879
// Keyserver: www.keyserver.net Key-ID: 0x70545879


pgpKFelgLxme3.pgp
Description: PGP signature


OT Spam sources

2005-09-14 Thread DAve
Pardon the off topic post. I have noticed a sudden rash of robots 
hitting our users web forms and sending spam.


Now, we replaced the normal web forms a long time ago and now have a 
home grown solution that cannot be used to send spam to third parties. 
This is what makes the current situation so strange. The spam can only 
go to the one recipient, yet the robots keep coming back. Are these 
people stupid?


We are working up a solution, the usual image verification trick like 
most whois lookups. We will roll it into our standard web form processor.


Just curious if anyone else was seeing this besides me. I suspect the 
spammers are making a new attempt to find web forms they can abuse and 
possibly the robots are just not smart enough to know that our forms 
don't work the way they suspect.


DAve