everyone, thanks for the in put.  The cc validation is a you get what
you pay for.  So for complete validation, e.g. billing address, phone,
etc. you pay a lot more for each transaction.  My customer gets very
little fraud so the cost is too great for the benefit.

He is not getting much fraud, but he thinks they are using his site to
figure out which cards will work and which will not.  they are not even
bothering to put in a shipable address most of the time so they don't
expect to get product shipped.  He believes they are just sifting
through cards looking for ones they can use.

I believe most of the vendors do almost no validation on the cc, just
the 3/4 digit code plus your name. 
thanks
Ann

Chris Penn wrote:
> Better credit card validation, I would think, with billing address and
> 3 digit code on back of card, would be the best bet.  It might also be
> a good idea to match the billing zip code with the IP address
> location, at least to the country.  It is easy to use an open wifi,
> tor, and/or a http proxy to hide one's IP address.  It is also easy to
> use tor and a dns to get an exit node in the same region as the
> billing address.  If you are lucky you might get a stupid user making
> the transaction from a real IP; give the information to the
> authorities when you report the crime.
>
> You could block tor and many known proxies in iptables which would
> likely avoid a considerable amount of fraud imo, though this is not
> friendly to those who enjoy their privacy.
>
> Chris...
>
> On Thu, Jul 5, 2012 at 9:20 PM, Todd Lyons <tly...@ivenue.com> wrote:
>   
>> On Thu, Jul 5, 2012 at 6:39 PM, Randall Whitman <909li...@whizman.com> wrote:
>>     
>>>>    Any way to "capture" the ip address from the http request or something
>>>>    like that?  It is a java application running under tomcat with apache as
>>>>    the web server.
>>>>         
>>> By default, the client IP address is the first field of the Apache
>>> access log file.  A clever attacker will spoof it, else use a
>>> compromised botnet rather than one's own machines.
>>>       
>> I'll nitpick a little here.  You can't spoof the endpoint of a valid
>> TCP connection.  They may proxy it through some open proxy, but it
>> will be the IP of the proxy, and most proxies, even open proxies, will
>> add a HTTP header that indicates what IP it's proxying for.
>>
>> ...Todd
>> --
>> The total budget at all receivers for solving senders' problems is $0.
>>  If you want them to accept your mail and manage it the way you want,
>> send it the way the spec says to. --John Levine
>> _______________________________________________
>> LinuxUsers mailing list
>> LinuxUsers@socallinux.org
>> http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers
>>     
>
>
>
>   

-- 
Ann Richmond
----------------
Randr Inc
951-369-3427
951-787-8683 Fax
www.randrinc.com

_______________________________________________
LinuxUsers mailing list
LinuxUsers@socallinux.org
http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers

Reply via email to