Re: [nyphp-talk] form spoofing

2007-05-01 Thread Alvaro P.
I had the same problem, I used a random session variable, but they still got through. I devised a way of avoiding several types of spam bots with some scripts I made. First of all, the form has no action="" when it is loaded, and therefore the simplest spam bots won't know where to send the in

Re: [nyphp-talk] form spoofing

2007-05-01 Thread inforequest
Hi Michael. Can you think of any good reason to accept a submission via a known open proxy? You can grab a maintained open proxy list and use it for a while Rolan-style... to tag potential spam as an experiment. Every market is different, but in the tech world I see no valid reason to accept

RE: [nyphp-talk] form spoofing

2007-05-01 Thread Mark Armendariz
] On Behalf Of Michael Southwell > Sent: Tuesday, May 01, 2007 11:34 AM > To: talk@lists.nyphp.org > Subject: [nyphp-talk] form spoofing > > I thought I was following best practices ( > http://www.nyphp.org/phundamentals/spoofed_submission.php ) > in creating a comment form

Re: [nyphp-talk] form spoofing

2007-05-01 Thread Rob Marscher
But this hasn't helped much; I still get a few of them, though I can't figure out how they can be generated. Any advice? Yeah... you could add a spam/bayesian filter to your form processing or use a web service like Akismet to see if it may be spam. Another option would be to log the user-

Re: [nyphp-talk] form spoofing

2007-05-01 Thread Rolan Yang
Michael Southwell wrote: I thought I was following best practices ( http://www.nyphp.org/phundamentals/spoofed_submission.php ) in creating a comment form for a restaurant client (There is no security issue here; the comments are emailed): snip But this hasn't helped much; I still get a few

[nyphp-talk] form spoofing

2007-05-01 Thread Michael Southwell
I thought I was following best practices ( http://www.nyphp.org/phundamentals/spoofed_submission.php ) in creating a comment form for a restaurant client (There is no security issue here; the comments are emailed): I stored a random token in the session: session_start(); if ( ! isset( $_SESSI