Re: [Mimedefang] OT: Don't let this happen to you

2006-02-22 Thread Atanas
Richard Laager said the following on 02/20/06 23:46: On Thu, 2006-02-16 at 11:50 -0800, Atanas wrote: a sendmail log monitoring script that shuts down web sites immediately (notifying both parties - the web site owner and the shared server administrator) in case a web site starts sending

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-21 Thread Richard Laager
On Thu, 2006-02-16 at 11:50 -0800, Atanas wrote: a sendmail log monitoring script that shuts down web sites immediately (notifying both parties - the web site owner and the shared server administrator) in case a web site starts sending suspicious amounts of outgoing emails for a given

[Mimedefang] OT: Don't let this happen to you

2006-02-19 Thread Atanas
In a large scale environment with lots of websites with untrusted content, trying to identify what exactly spammers can abuse and block it via mod_rewrite or mod_security rules seems to be just a waste of time. The best workaround I have found and already use for the past few years is a

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-16 Thread WBrown
[EMAIL PROTECTED] wrote on 02/15/2006 06:59:34 PM: I don't run PGP on this box... (laffin) It's fun to watch though.. Right up there with watching attempts to hack an IIS box when it's not even running Windows! Damn crap can fill up a log though.

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Kenneth Porter
--On Tuesday, February 14, 2006 1:26 PM -0600 Jim McCullars [EMAIL PROTECTED] wrote: I believe this exploit may be fairly new, in that I could find very little on the web about it. http://www.google.com/search?hl=enq=formmail+exploitbtnG=Google+Search It's an old and well-known exploit. You

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Jim McCullars
On Wed, 15 Feb 2006, Kenneth Porter wrote: It's an old and well-known exploit. You can find a secure replacement for the old Formmail here: I may not have been as clear about this as I should have been. This was not an exploit against the FormMail script from Matt's Script Archive. It

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Steffen Kaiser
On Wed, 15 Feb 2006, Jim McCullars wrote: You've wrote that you've disabled CGI -- Dunno, but I wouldn't weight PHP more secure than general CGI ?? Bye, -- Steffen Kaiser ___ NOTE: If there is a disclaimer or other legal boilerplate in the above

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Jan Pieter Cornet
On Wed, Feb 15, 2006 at 08:54:59AM -0600, Jim McCullars wrote: It's an old and well-known exploit. You can find a secure replacement for the old Formmail here: I may not have been as clear about this as I should have been. This was not an exploit against the FormMail script from

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread David F. Skoll
PHP's mail() function is completely broken. It is insecure, and it is *impossible* to make it secure unless you aggressively sanitize all your input. PHP is a truly horrible language (hey, I use it every day, so I should know...) and mail() stands out as one of the worst things about it. I

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Kris Deugau
David F. Skoll wrote: PHP's mail() function is completely broken. It is insecure, and it is *impossible* to make it secure unless you aggressively sanitize all your input. PHP is a truly horrible language (hey, I use it every day, so I should know...) and mail() stands out as one of the worst

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Kelson
Steffen Kaiser wrote: You've wrote that you've disabled CGI -- Dunno, but I wouldn't weight PHP more secure than general CGI ?? With header injection attacks, it doesn't really matter whether the target is PHP or CGI. It's a matter of how the message actually gets sent. With PHP's mail

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Oliver Schulze L.
Maybe this can help: http://pear.php.net/manual/en/package.networking.net-smtp.php HTH Oliver -- Oliver Schulze L. [EMAIL PROTECTED] ___ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Jan Pieter Cornet
On Wed, Feb 15, 2006 at 10:05:03AM -0800, Kelson wrote: One way you can test your own scripts for this is to create a copy of your form and replace all your input and select elements with textarea (even checkboxes and radio buttons). That way you can try Or install the TamperData firefox

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Ben Kamen
Speaking of which, I saw these in my logs today... POST /xmlrpc.php HTTP/1.1 500 256 POST /blog/xmlrpc.php HTTP/1.1 500 256 POST /blog/xmlsrv/xmlrpc.php HTTP/1.1 500 256 POST /blogs/xmlsrv/xmlrpc.php HTTP/1.1 500 256 POST /drupal/xmlrpc.php HTTP/1.1 500 256 POST /phpgroupware/xmlrpc.php HTTP/1.1

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread G. Roderick Singleton
On Wed, 2006-02-15 at 17:13 -0600, Ben Kamen wrote: Speaking of which, I saw these in my logs today... POST /xmlrpc.php HTTP/1.1 500 256 POST /blog/xmlrpc.php HTTP/1.1 500 256 POST /blog/xmlsrv/xmlrpc.php HTTP/1.1 500 256 POST /blogs/xmlsrv/xmlrpc.php HTTP/1.1 500 256 POST

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Jan Pieter Cornet
On Wed, Feb 15, 2006 at 05:13:27PM -0600, Ben Kamen wrote: Speaking of which, I saw these in my logs today... POST /xmlrpc.php HTTP/1.1 500 256 Likely looking for versions not patched against this: http://b2evolution.net/news/2005/08/31/fix_for_xml_rpc_vulnerability_again_1 I'll have to

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Ben Kamen
G. Roderick Singleton wrote: On Wed, 2006-02-15 at 17:13 -0600, Ben Kamen wrote: Speaking of which, I saw these in my logs today... POST /xmlrpc.php HTTP/1.1 500 256 POST /blog/xmlrpc.php HTTP/1.1 500 256 POST /blog/xmlsrv/xmlrpc.php HTTP/1.1 500 256 POST /blogs/xmlsrv/xmlrpc.php HTTP/1.1 500

Re: [Mimedefang] OT: Don't let this happen to you

2006-02-15 Thread Ben Kamen
Ben Kamen wrote: I don't run PGP on this box... (laffin) Er, that's PHP... (hey, I was one letter off... you all knew what I meant! :) ) -Ben ___ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND

[Mimedefang] OT: Don't let this happen to you

2006-02-14 Thread Jim McCullars
Maybe this is only semi-OT since we do sometimes discuss spam issues not strictly within the confines of MD/SA, but I wanted to share with the list what happened to me yesterday. I'm the administrator for, among other things, our campus web server. I thought I had taken all the right