Since then I have been noticing lots of entries in my error log by folks trying find a FormMail program. Nothing bad happens, they just don't find one.
I have thought it might be fun to install a special FormMail program that would respond like the real thing to querys but only capture the email addresses sent and not send out the emails. (To make it look real, it probably would be good if it sent out emails to the first couple of addresses submitted before shutting down.)
Has anyone done this?
<added>If anyone's using formmail, there's newer versions that address this exploit on their site</added>
As I understand it, the problem comes mostly when you include urls, especially in link form. But I'm sure one of the moderators will correct me if I'm wrong. ;)
Actually, I'm already using one of his scripts, I just wasn't sure if it was one of those you were referring to or not. My cgi/perl knowledge is rather limited at the moment, so I'm not really sure how to tell if I've got a newer version that are better protected, or one of the older versions. Guess I'll just double-check the dates....
I've pondered something similar myself, as I see it there are two problems with your plan;
1) You effectively say your formmail works - chances are they would be back soon and just throw as much traffic at that script as they could before you shut they down - obviously this is a bad thing if you have to pay for your bandwidth.
2) All the formmail scanners I've spotted in my logs rely on the return email rather than the status code. This means that you would have to send out at least one email, which in itself is exactly what they want as from here with enough time an patience they could trick your "spoof" formmail into doing exactly what the real one does...
My ponderings ran along these lines;
In order to scan they disclose an IP address (might be real, might be a proxy but either way it could then be blocked for a set period to slow repeat traffic).
More importantly they need to supply one or more working email addresses so that they can check the formmail isn't just some spoof script out to waste their time.
Since it's quite easy to spot formmail attempts going through a site so we could just add a little code to cycle through all the variables being passed for a formmail attack and extract the email addresses.
At this point the question of what to do with a file full of spammer email addresses raises its head :)
If you were a less ethically inclined individual you'd also realise that their scanning method only works if their reciept mailboxes aren't full of junkmail... (not that I'd suggest inserting that file on a site in an easy to harvest format, or even using them to subscribe to certain site "offers")
- Tony
Of course, you're right. Submitting them to a busy non-opt-in listserv would also be rather unethical. ;)
However, another thought that would be entirely ethical would be to notify their local governmental law enforement agency of the theft attempt. Depending on the country involved, the local police (or FBI or whoever) might be interested to know what these folks are up to.
After all, using your bandwidth and server programs to send out spam is essentially theft. Even the attempt would be illegal in some countries.
Depending on the country involved, the local police (or FBI or whoever) might be interested to know what these folks are up to.
Doubtful, unless its politically sensitive or you can establish a high price tag as the costs you incurred because of these actions law enforcement agencies don't generally care.
Their ISPs might care but if these formmail hunters have half a clue they would bounce the request off proxies or a compromised machine to mask themselves.
To make any real progress against these guys you'd need to see what they were sending out and then harass whomever they are promoting. If this is an affiliate scheme then normally spamming is against the TOS and so you could make them forfeit their account.
And anyhow who said anything about list-serv's? I was thinking more of asking for them to be "removed" from a dozen or so junk emails that I deleted over the last week :)
- Tony
For the earlier question about earlier unsafe formmail, just make sure you are running version 1.92 (or newer)
1) Limit the emails to something like 5 per ip address accessing it. After that, it would only pretend to send out spam.
I could come up with a list of *lots* of proxies in around five minutes.
Let's say I could find 100 (a very conservative figure, multiproxy has ~180 listed and there are lots of similar sites) that means I could spam 500 people using what was supposed to be a "detection" mechanism.
Realistically there is no reliable method to stop people abusing a formmail spoofer once you actually let it send out email, and once it works for one person I'm sure others will find out about it too - not to mention the complaints you and your host will get because you are the "source" of the spam.
- Tony
I like using a redirect to send such requests to a maps page at a portal. Once they reach the maps page, I assume they can find their own way home, and they're instantly off my site to boot. 8^)
The easiest method is just to let them find a 404 status or possibly a 403, redirects are overkill since people looking for the script arent really interested in the content of the site...
ggrot,
That might work but it would still require a lot of work with regards to how they interact with it - if they simply check it works and then throw as much traffic as they can at it then that's less good because its still going to be using server resources and bandwidth.
- Tony