* Ben Cooksley <bcooks...@kde.org>:
> Hi all,
> 
> We at KDE are currently experiencing attacks upon our Mailman
> installation, attempting to subscribe random email addresses (which
> more often than not are valid unfortunately). These attacks are
> conducted essentially through performing mass HTTP POST requests to
> /subscribe/listname with few proceeding GET requests.
> 
> It seems that the attackers are capitalizing on Mailman's lack of CSRF
> protection. Does anyone know if there are plans to add CSRF protection
> into Mailman 2?
> Alternately, is anyone aware of any form of CAPTCHA protection which
> can be applied to Mailman?
> 
> It has gotten to the point where we have had to disable web based
> subscriptions to our mailing lists due to this abuse.

Interestingly this could be the cause for the recent onslaught of fake
subscription attemps at mail.python.org

You definitely get a +1 for me on this one :)

-- 
Ralf Hildebrandt                   Charite Universitätsmedizin Berlin
ralf.hildebra...@charite.de        Campus Benjamin Franklin
http://www.charite.de              Hindenburgdamm 30, 12203 Berlin
Geschäftsbereich IT, Abt. Netzwerk fon: +49-30-450.570.155
------------------------------------------------------
Mailman-Users mailing list Mailman-Users@python.org
http://mail.python.org/mailman/listinfo/mailman-users
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/
Unsubscribe: 
http://mail.python.org/mailman/options/mailman-users/archive%40jab.org

Reply via email to