Our largest issue with these web form mail exploits is not really
spam-related (in terms of scripts causing our web servers to become spam
relays); our clients are receiving these fake forms (obviously generated by
a kiddie script) constantly throughout the day, and the script writer isn't
accomplishing the intended task (which is to spam some random AOL account).
The AOL account shows up in the form as the BCC, but shows up *only* as
text, as if it were part of the form.      

Here's another example of a fake form that one of our clients received:

<snip>
City:  [EMAIL PROTECTED]
Fax:  [EMAIL PROTECTED]
Company:  [EMAIL PROTECTED]
Zip:  [EMAIL PROTECTED]
Title:  [EMAIL PROTECTED]
Address1:  [EMAIL PROTECTED]
Address2:  [EMAIL PROTECTED]
Submit:  [EMAIL PROTECTED]
LName:  [EMAIL PROTECTED]
Phone:  [EMAIL PROTECTED]
FName:  [EMAIL PROTECTED]
Content-Type: multipart/mixed; boundary="===============1128226633=="
MIME-Version: 1.0
Subject: 1e9c11ce
To: [EMAIL PROTECTED]
bcc: [EMAIL PROTECTED]
From: [EMAIL PROTECTED]
This is a multi-part message in MIME format.
--===============1128226633==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
zecyjmgc
--===============1128226633==--

How_Heard:  [EMAIL PROTECTED]
Email:  [EMAIL PROTECTED]

End of form information
</snip>

Now, what is emailed out is exactly as shown above, but since the recipients
of the form are actually hard-coded in the formmail script, this message
does NOT go out to [EMAIL PROTECTED] (shown in the bcc field), rather this
is just a stupid text field that the script writer thought would go out to
that AOL address somehow.  

The main problem is the annoyance to our clients -- they complain to us when
they receive this stuff, and we just host their website, we have nothing to
do with the implementation or scripts that are running (yes, we do enforce
guidelines to an extent, but tell a client they can't run their mail script
to send out contact forms, and you start losing business).  This has been
very difficult for us to trace as we are fairly confident that these scripts
are interacting with the HTML forms themselves, and NOT the scripts.  So,
the question is how can we really stop someone from using an HTML form (and
the NUMBER verification technique is not an acceptable solution for our
clients)?

- Chris

------------------------------------------
Chris Gauch
Systems Administrator
Digicon Communications, Inc.
http://www.digiconcommunications.com
[EMAIL PROTECTED]


_______________________________________________
Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list
[email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to