Forum Moderators: open

Message Too Old, No Replies

Formmail script - how to fix.

watch for spamming

         

txbakers

12:48 am on Oct 6, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



We all know that matt's popular Formmail perl script is very vulnerable to spam attacks.

I found a site that gives a detailed instruction on how to fix it.

mailvalley.com/formmail/

tedster

2:43 am on Oct 6, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Thanks for the tip. With spammers getting wilder and more desparate by the week (or so it seems to me) this kind of precaution is wise.

john316

2:58 am on Oct 6, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Another simple way to deal with it is just change the name of the script, it won't "fix" the code, but the likliehood of a spammer finding and using it is lessened.

jatar_k

3:17 am on Oct 6, 2002 (gmt 0)

WebmasterWorld Administrator 10+ Year Member



another good idea is to have someone write you a new one. :)

I haven't looked through the formmail script actually, I have just heard all of these problems. I guess I should really take a look.

austtr

10:48 pm on Oct 8, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Just make sure you use the latest version. 1.9 I think.

I had a customer who got hit by an email spammer and just updating the ver fixed the problem.

keyplyr

11:21 pm on Oct 8, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



My FormMail script resides one directory level above my root level pages making it unavailable for any hacker that may get by other defences at my domain.

Purple Martin

9:27 am on Oct 9, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



keyplyr, this is probably a stupid question, but how do you put it one level above root?

keyplyr

7:17 pm on Oct 9, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month




Purple_Martin - well, actually I can't take credit for this ingenuity, my host keeps a security updated, generic copy installed there. I had a customized copy in a cgi-bin at my domain level but it was continuiously abused by spammers. My host eventually offered a shared script at the server tier level, which solved the problem.

Birdman

8:15 pm on Oct 9, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



How do you know when your script has been abused? Are they using it to send mass emails?

txbakers

8:17 pm on Oct 9, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Exactly. If you look a the sendmail logs, you'll see who the emails were sent (or not sent) to. My log shows the attempt, but also shows the error message the sender received.