OK.. so what im wondering is what people are doing to protect themselves from the PHP mail command from an ISP's point of view. We run a small hosting company that deals mainly with corporate customers and also wholesales to web developers. We run debian stable for our web servers (apache/php) and a dedicated outgoing mail server (postfix) so we can review log files etc. SOME customers are, how do we say it, less than perfect when using form to mail solutions.. leaving the way open for header injection attacks. Now we know how to put measures in place to stop it on the sites that we build and manage, which is all good, but what im trying to think of is a way to track usage of the outgoing mail command usage..
PHP 5.3 gives me some really good ways of doing this, but debian does not have php 5.3 and there are some things that people need to do to their websites before we upgrade. (in fact we will prob setup a new server and migrate people over rather than just upgrade). Any input is much appreciated! Simon -- NZ PHP Users Group: http://groups.google.com/group/nzphpug To post, send email to [email protected] To unsubscribe, send email to [email protected]
