once I experienced similar problem with spammer looking for vulnerabilities
in my feedback form scripts. Of course he used proxies, so denying by IP
would have no sense.

So I hide the script behind a single shtml page, so that no one could ever
know what the real name of any script is. All cgi requests on that site
started to be handled by same shtml file, where conditional SSI instructions
distributed tasks to different scripts by "watermarks" in query string
(using regexps). So all forms had action="index.shtml".

Spammer started scanning cgi-bin folder looking for scripts named like mail,
formmail, friendmail, tellyourfriend, etc.. So the feedback script was
renamed to abdbxq.cgi. Still the remaining annoyance was to see the spammer
flooding my site with requests for nonexisting mail.cgi, formail.pl, and
simmilar combinations and hundreds of hits per day. Servers error log was
filled with "File does not exist". So I added this to my .htaccess:

RewriteEngine on
RewriteRule ^(.*)(mail|library|list|form|tell|friend)(.*) http://localhost
[nc]

Since then my server logs are clean :-)

But that's just security through obscurity. It only gets you so far. I've seen newer variations on this that don't look for common exploits - they spider the site (or maybe it's a human crawler; my bet's on a spider) and look for contact forms, either with common or uncommon names. Once they find a page with a form on it, they submit like crazy to find vulnerabilities. I've seen the same behavior on three different servers, so I know it's not an isolated attack. Often they'll start by submitting the same email address to all the fields on the form, then move on to injecting mail headers into the form input, sometimes with a single dot on a line (to fool sendmail into thinking it's a new message). There's often a common email address in all the bogus ones, usually an AOL address - I'll assume they're setting up free accounts, then abandoning them after they're done with an attack. The last time I saw one of these, they used the same IP until it was blocked, then moved on to another one. Our ultimate solution was to change the form scripts to strip out newline characters - it makes submitted comments look funny, but there's no chance of header injection attacks.

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: [EMAIL PROTECTED]
  "   from the digest: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to