Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 7 Nov 2002 18:46:03 -0800
From:      Kris Kennaway <kris@obsecurity.org>
To:        Jun Kuriyama <kuriyama@imgsrc.co.jp>
Cc:        developers@FreeBSD.org, www@FreeBSD.org
Subject:   Re: send-pr again
Message-ID:  <20021108024603.GA23540@rot13.obsecurity.org>
In-Reply-To: <7my985htpt.wl@black.imgsrc.co.jp>
References:  <20021107202918.GA21969@rot13.obsecurity.org> <20021107204243.GA22068@rot13.obsecurity.org> <20021107225607.GA22962@rot13.obsecurity.org> <7my985htpt.wl@black.imgsrc.co.jp>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Nov 08, 2002 at 07:59:26AM +0900, Jun Kuriyama wrote:
> At Thu, 7 Nov 2002 14:56:21 -0800,
> Kris Kennaway wrote:
> > > 2) Probe for an open proxy on the submitting host before accepting the
> > > PR (similar to what modern ircd servers do).
> > 
> > If anyone is interested in implementing this, someone gave me the
> > source code to a standalone binary that does this (checks an IP
> > address for an open proxy).  It should be an easy matter to integrate
> > this into dosendpr.cgi.
> 
> Openproxy checking is already integrated into dosendpr.cgi.

The current version appears to consult a third-party database of known
open proxies.  It apparently doesn't work very well in practice,
because today's attacker was also using an open proxy.

The code I have checks for an open proxy on the fly, so it would have
stopped today's attack.

Kris

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-www" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20021108024603.GA23540>