Forum Moderators: coopster
I've read lots of messages on how to catch a spammer, but not much on what to do with him afterwards. I've usually read that he's "tossed." What does that mean specifically? HOW do you toss him?
Right now I'm sending him a 503 Service Unavailable error (after I let the page sleep for a few seconds to slow him down a bit). Any thoughts on this?
Other options I've read about (but haven't implemented) are:
1. Giving him a "message sent" response so he actually thinks his spam worked. My problem with this is that it does nothing to deter him.
2. Telling him you know he's a spammer and his spam has been deleted. Isn't this like showing your hand to everyone in poker? The spammer's just going to change his tactics and keep trying.
3. Sending him a 404 (or error of choice).
4. Blocking the spammer by IP (used with other methods). This may catch some, but the sneaky ones will just use proxies etc.
5. Redirecting him to another website (his own domain?).
Any comments or suggestions?
My form is in PHP, but I'm a bit of a hack (and newbie) and don't know PHP inside and out. I'm slowly learning more each day, but it's a long process. :(
My "problem" (if you want to call it that) isn't form security. My form is fairly secure -- and I'll adjust it if needed.
I'm just curious as to where do I send the spammer/bot once I discover him/it? Should the form just DIE? Should I redirect to my home page? An error page? Should I let them think they succeded?
What do you do with YOUR found spammer/bots?
[edited by: Mobi_Mobbi at 2:21 pm (utc) on April 17, 2009]
I'm sure you will be able to google for those, maybe worth doing that exercise on a Linux box.
YES YES I am bitter and twisted
Don't get me wrong, spammers are a personal vendetta of mine. But when you begin to take it personally, you begin to think irrationally.
I log everything. This is different than server logging, which doesn't tell the whole story. Log your raw input, before doing any cleansing.
Pore over the logs frequently. Guess what happens? You learn more about your enemy.
Play their game; collect information silently, don't be a smart a** and try to do something cool or they will call all their spam-buddies on you and maybe even DDOS you, and trust me, that's not something you want to take on.
IP banning works, but it's an endless task with a constantly growing .htaccess. You also run the risk of eliminating legitimate contacts. Personally, see point 1 - it cuts off the amount of intel I can collect on spammers.
So when a spammer gets caught in my trap, what do I do with them?
"Malicious input detected. Action logged, no email was sent."
That is all. Enough for their bots to log that there's no love here and not worth their effort.
>That is all. Enough for their bots to log that there's no
>love here and not worth their effort.
that'd imply their bots actually compare responses. I mean, I'm under the impression that most of these bots don't even target specific languages, just dumping their message into forms. They wouldn't know if the message succeeded or not, unless maybe, the same form was shown as an indicator that something is wrong. Unless you send a http-error, how would they know you didn't send the message?
I've heard rumors that some mail-spammers actually stop trying to bomb you if your server denies taking their emails directly, but from my experience on my systems, that's either not true or at least not true for all of them.
I guess like in every business, there are professionals and beginners. the beginner has a couple of scripts he found or wrote himself, but he won't do sophisticated checks wether it works or not, he play for quantitiy. Haven't you all looked at spam (or the requests they send) and thought "wow, I could build a better bot than this on a weekend"? That's why I think there are mostly non-pros in that segment. I'm pretty sure the pros are much harder to discover and thus rarely seen.
For example, the general process is input->(usually) error check/filter->send mail-> respond to browser. In a perl script, you can generate a 500 by simply not returning a response to the browser. All a spammer would care about is step 3. So if it 500's, it may be no deterrent.
You have any clue how much they're making on the different approaches?
Nope. Just based on what I see in the logs, and what seems to work. Generally I see them come in , hit a form 3 or 4 times, come back in a week or two, then never return. New ones come up all the time, with the same pattern.
Generally, what seems to work, make it just difficult enough to make it not worth their effort, there are plenty of slower sheep in the herd. :-)