[dokuwiki] Re: Plugin captcha -

  • From: "K. Peter" <kp@xxxxxxxx>
  • To: dokuwiki@xxxxxxxxxxxxx
  • Date: Fri, 03 Feb 2017 10:21:50 +0100


Anyway all this is how it should work, but for some reason you still
get spam through. So we have to figure out what goes wrong.
Thanks for explanation.

Here is what we should look into:

1. Your spammer always requests the image. Does he always request it
with the same secret? Or is it a new one each time?
It is new always. I couldn't find duplicate secrets in the log from the spammer. But I think it is possible to use the same secret multiple times.

2. You say you can supress the spam by adding a die() in img.php - is
this really all you do? Because as I said, the image wouldn't be
needed for an attack of the system itself. It would only be needed if
the spammer is actually solving the captcha - either manually or by
OCR.
Yes, a die() stops the processing. Well, it could be stopped by producing an error with e.g. a printf() too.

3. OCR seems unlikely as there should be at least some failures
visible in the log.
There is nothing in the log, at least most errors are produced by me controlled during investigation.

4. you said the spam does not correspondent to the log entries. how
much spam did you get? could it be that you only got one spam message
(per IP)?
This is a misunderstanding. Accidentally I deleted the spam post from the last log entries I sent. My fault. At the moment there are 2 small spam posts visible at my page. If needed I can send the corresponding log entries. The spam comes in in waves. Yesterday the attacks slows down a bit. Some numbers from today until round about 9:30am:

528 "GET img.php" from 46.161.9.2
581 "GET img.php" from 46.*
672 "GET img.php" overall (includes me)

During I write this there comes in a wave with 24 requests in one minute.

It could be that the spammer is using some browser
automation tool. He gets a new IP, enters one spam manually and
records it, then runs a replay attack which now fails. That way the
first manual spam would go through and all others would fail.
I don't think so. If I don't break the processing in img.php all spam comes through.

It's of course entirely possible that I'm missing some flaw in my
implementation.

I'll try to not point out senseless suggestions :). But I still think the issue is about the call of img.php. The spammer uses it by a way beside the usage through a browser. The cookie is a good idea, but not enough at the moment. Something else have to be checked before img.php runs. At the moment I have deactivated the decrypt() in img.php - so the website doesn't show a broken image. For sure, an entered captcha code is always wrong.

I wondering if I'm the only one with this issue.

regards
Kai


Andi


--
splitbrain.org


--
DokuWiki mailing list - more info at
http://www.dokuwiki.org/mailinglist

Other related posts: