13 Jun 2018, at 11:52pm, Bob Friesenhahn <bfrie...@simple.dallas.tx.us> wrote:

> The problem is knowing what "one" means.  The subscription request is likely 
> submitted via http/https into the web form and using a bogus email 
> subscription address (of the "victim").  A botnet is able to submit these 
> requests from hundreds of IP addresses.

First you accept only one request per IP address for every twentyfour hours.  
You might as well just wipe your address list at midnight rather than do the 
tricky programming to implement a rolling 12 hour window.

Second you have the form page generate a random number every time it shows the 
form.  The submission has to include the number sent to that IP address, and it 
has to be done at least five seconds after the number was generated.  This ties 
up that bot (though not the whole botnet) for five seconds.  One assumes that 
humans take more than 5 seconds to type their password twice and hit 'submit' 
so they won't even notice the difference.  People who copy-and-paste their 
email address into the 'verify' field deserve what they get.

Third you accept only one request per email address per week.

The second of the above defeats a lot of bots.  They submit the request without 
ever downloading the form in the first place.

For all the above you need two tables of data and some python programming.  
Unfortunately I don't know Python.

Simon.
_______________________________________________
sqlite-users mailing list
sqlite-users@mailinglists.sqlite.org
http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to