In searching through previous postings on this subject, the words used in every case are:
FormMail (or variations of it) and
cgi-bin/formmail.pl
and all the possible solutions seem to only apply to this specific script.
I know very little about script programming, but these would not seem to apply in my case.
My site uses a vDeck control panel scritp "forms.cgi" and the word "FormMail" or "formmail.pl" is not to be found anywhere.
A typical server log entry for a spamming incident looks like:
200.30.79.126 - - [26/Jan/2006:10:15:06 -0800] "POST /v-cgi/forms.cgi HTTP/1.1" 302 5 "http://www.example.com/pages/interactive.html" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
Can someone please advise me (in simple terms please) how I can go about solving this problem?
Thank You very much
Tom Woodruff
[edited by: coopster at 8:40 pm (utc) on Feb. 4, 2006]
[edit reason] generalized url [/edit]
If you install and configure formail correctly (Matts Script) it can work fine (rename the file and place it in a different directory/folder under your cgi-bin). Do not use autoresponders and configure referers down to the page. I would also encrypt the entire form (search in Google for "html encoder") within your page. All of the above will stop 99.9% of your problems.
You can also roll-your-own PHP script, but make sure you block from injection attacks.
Thanks again
Tom
Another option with perl formmail scripts is to modify the script itself, perhaps even going as far as copying and using a different script for each form and changing the "action" attribute in the form to point to the specific processing script for each.
Another advantage is to bypass the whole hidden form value portion of these scripts and putting the values right into the configuration variables in the perl processing script itself.
There are a number of ways to make this more dynamic but these few tips should get you off the spam rotation.
I am looking at your suggestions.
I know little about perl script programming but having said that, can look at and follow the logic of a script. (I am learning fast)
My problem here is, this script - "forms.cgi" - looks nothing like the classic "FormMail.pl" script that everyone seems to refer to or reference.
"forms.cgi" is a vDeck control panel form processor for forms created though admin panel in the vDeck form mail program.
As such, seems like most everything in the script is referencing various vdeck functions, most of them seemingly in a vdeck database somewhere else on the server.
The individual forms are created within the vdeck program, assigned a unique form_ID number and stored within vdeck. It would then appear the data pertaining to each specific form is stored in this database.
Having contacted my host - iPowerWeb inc. - all they will say is to make the script more secure would require a programming effort they are not willing to undertake but would not object to any modifications made by myself.
Problem is, I don't have a clue where to start or what to do given the things you guys talk about do not appear in this script.
This will explain my difficulty in making any script modifications suggested.
I however welcome anything you guys have to offer, you are the experts and are the only ones who seem willing to communicate on the subject for which I am grateful.
Tom
Tom
Matt does provide a solution: if you like his form, then switch to NMS. It's a lot like Matt's and a ton more secure.
HTH!