[Mimedefang] OT: Email web form exploits

David F. Skoll dfs at roaringpenguin.com
Thu Sep 8 21:47:01 EDT 2005


James Ebright wrote:

> Nothing is 100% but you can make it difficult enough or unlikely
> enough that they will go look for easier targets... Our experience
> was that simply checking the webserver env URI referrer variable was
> often good enough in this scenario.

True; I *was* a little harsh, and checking the referrer will probably stop
most of the current crop of attacks.  It's a cheap test that's probably
worthwhile.

Setting a cookie is another good idea.

But ultimately, this becomes the usual arms-race that can only end
with some kind of prove-you're-human test, and we all know how horrible
those are. :-(  (Think Challenge-Response in the e-mail realm.)

Regards,

David.



More information about the MIMEDefang mailing list