I guess you are saying that trying to have my php script send
the users browser html headers to stop caching is not
really going to solve my problem. I did put a block rule in
my firewall for the attackers ip address and that stopped
the attach from recurring.

But to make sure it don't happen again I am adding a
Captcha Security Code Random-Noisy-Images to the screen.
This uses a randomly generated graphic image to stymie
auto-submission scripts.

-----Original Message-----
From: gerald_clark [mailto:[EMAIL PROTECTED]
Sent: Monday, March 13, 2006 12:13 PM
To: [EMAIL PROTECTED]
Cc: Mysql
Subject: Re: users browser caching the screen


fbsd_user wrote:

>Now I know what I am going to talk about is not directly related to
>this mysql list, but I am in need of some concept ideas.
>
>To set the background. It’s a very common practice in the
>registration process of a new user to verify the users email
address
>is valid by sending a email to the entered email address with a
link
>in it to a screen that updates the users emailed verified flag in
>his table record. I have such a process.
>
>Once a week I review my apache activity log and I noticed a lot of
>log records for the file that process the link to update the users
>email verified flag, (over 1500 from same ip address).
>
>To me this looked like an attack to break into my web application.
>Research and testing indicates that the screen is Cached by the
>users browser and he is changing the passed link info repeatedly in
>effort to break in. This screen is the only one that does not have
>session security control because it’s launched from the verify
email
>I sent him.
>
>Now my registration sign up screen has a Captcha Security Code
>Random-Noisy-Image and part of that is a string of headers to the
>browser to stop caching. They look like this.
>
>// send several headers to make sure the image is not cached
>// taken directly from the PHP Manual
>
>// Date in the past
>header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
>
>// always modified
>header("Last-Modified: " . gmdate("D, d M Y H:i:s") . " GMT");
>
>// HTTP/1.1
>header("Cache-Control: no-store, no-cache, must-revalidate");
>header("Cache-Control: post-check=0, pre-check=0", false);
>
>// HTTP/1.0
>header("Pragma: no-cache");
>
>Now my desire is to somehow have the screen that is the target of
>the email link to issue these headers before displaying its html
>code so the user can not any longer run a script against this
screen
>trying to break in.
>
>Is this possible and if so how. Is this kind of attack happening to
>anyone else?
>
>Thanks for any help you can offer.
>
>
>
>
>
You have no way of knowing it the user is running a browser at all.
He
could have grabbed the page once, and
run a script that pretends to be a browser.

--
MySQL General Mailing List
For list archives: http://lists.mysql.com/mysql
To unsubscribe:
http://lists.mysql.com/[EMAIL PROTECTED]


-- 
MySQL General Mailing List
For list archives: http://lists.mysql.com/mysql
To unsubscribe:    http://lists.mysql.com/[EMAIL PROTECTED]

Reply via email to