ramprage said:
Well if you suspect a spammer then you can temporarily add a few rules to your mod_security ruleset for additional logging so you can later investigate.
EG:
HTML:
# Find the source of scripts ending email
SecFilterSelective POST_PAYLOAD "@" "pass,log"
Hi Yah,
Added this into my mod_sec to see how it would perform and I can see the actual output reading the raw log files i.e
Content-Type: application/x-www-form-urlencoded
Host: xxxxxxxx.org.nz
Max-Forwards: 10
Pragma: no-cache
User-Agent: Opera/6.04 (Windows 98; U) [en]
Via: 1.1 xxxxxxxx.org.nz
mod_security-message: Warning. Pattern match "@" at POST_PAYLOAD
329
url=http%3A%2F%2Fclik.to%2Ftapki&author=viagra&title=order%20viagra&blog_name=cheap%20viagra&e-mail=chris%40freemail.com&excerpt=viagra%2C%0D%0Abuy%20viagra%2C%0D%0A%3Ca%20href%3D%22http%3A%2F%2Fclik.to%2Ftapki%22%3Eorder%20viagra%3C%2Fa%3E%2C%0D%0Abuy%20viagra%20online%2C%0D%0Acheap%20viagra%2C%0D%0Ageneric%20viagra&action=add
============================
==bf9b7d46==============================
Request:
www.xxxxxxx.org.nz 168.176.146.95 - - [19/Jun/2006:06:49:49 -0400] "POST /cgi-bin/movabletype/mt-tb.cgi/321 HTTP/1.1" 403 179 "-" "Opera/6.02 (Windows 2000; U) [en]" - "-"
Handler: cgi-script
----------------------------------------
POST /cgi-bin/movabletype/mt-tb.cgi/321 HTTP/1.1
Accept: */*
Connection: close
Content-Length: 333
Content-Type: application/x-www-form-urlencoded
Date: Mon, 19 Jun 2006 05:59:56 GMT
Forwarded: by
http://unprueba.unal.edu.co:8080 (iPlanet-Web-Proxy-Server/3.6-SP9)
Host: xxxxxx.org.nz
Pragma: no-cache
User-Agent: Opera/6.02 (Windows 2000; U) [en]
Via: 1.1 S1PS
mod_security-message: Warning. Pattern match "@" at POST_PAYLOAD
333
url=http%3A%2F%2Fclik.to%2Ftapki&author=buy%20viagra%20online&title=buy%20viagra&blog_name=viagra&e-mail=tommy%40hotmail.com&excerpt=viagra%2C%0D%0Abuy%20viagra%2C%0D%0A%3Ca%20href%3D%22http%3A%2F%2Fclik.to%2Ftapki%22%3Eorder%20viagra%3C%2Fa%3E%2C%0D%0Abuy%20viagra%20online%2C%0D%0Acheap%20viagra%2C%0D%0Ageneric%20viagra&action=add
HTTP/1.1 403 Throttled
Pragma: no-cache
Cache-Control: max-age=-25602239
Expires: Sat, 27 Aug 2005 03:05:47 GMT
Connection: close
Transfer-Encoding: chunked
Content-Type: text/xml; charset=utf-8
--bf9b7d46--
Can you explain how to read this data...is this someone actually sending out spam from one my users web site forms? Someone trying to send out spam through the form? I would suspect that one now checks exim logs to see if they were actually sent ? Seems I've only 2 or 3 sites that actually log enough details to question whether they're being used for sending out SPAM.
Thanks in advance
Chae