Beefy Boxes and Bandwidth Generously Provided by pair Networks
Don't ask to ask, just ask
 
PerlMonks  

Matt's scripts strike again

by zentara (Archbishop)
on Dec 09, 2003 at 15:32 UTC ( [id://313425]=perlmeditation: print w/replies, xml ) Need Help??

From the "it couldn't happen to us" department:

I just received this email from my ISP.

We are no longer allowing ANY of Matt Wright's scripts to be run on any of our servers. This includes semi-private servers, as well as all other hosting accounts. These scripts have been a huge security risk and, today, some of Matt Wright's scripts severely effected several of our servers. Today, a spammer had compromised security holes in these scripts and literally flooded our network with outgoing spam, meaning that almost all available bandwidth was being used to send spam for about 20 minutes (until we could find and shut them down).

I sent them the url for nms

Replies are listed 'Best First'.
Re: Matt's scripts strike again
by b10m (Vicar) on Dec 09, 2003 at 15:58 UTC

    Oh yeah, the lovely Matt Wright scripts. I get a lot of "formmail.[cgi|pl]" requests to my server. Spammers just love it. I redirect them to a trap-cgi that'll collect all POST data, IP, etc. so I can go complain to their ISP.

    Anyway, it's good to see your ISP has some clue ;)

    --
    B10m
      Anyway, it's good to see your ISP has some clue.
      I'd say, the ISP doesn't have a clue. They only outlawed Matt Wright *after* they relayed for a while. And they are still not getting it. The problem isn't Matt Wright, the problem is installing any random junk and praying it works fine. Today it was formmail, tomorrow it's something else. The fact that one buggy program installed on one host can "severely effect several of our servers", and consume almost all bandwidth is a serious design problem of ISP's setup.

      I'd be mighty pissed if I was using the ISP's hosting service, and connection to my site was seriously disrupted because of what happened with some other site.

      Abigail

        I didn't say they had much clue, but some ;) But yes, you are right. They should have looked at the issue before they implemented it. Especially since is known for ages that these scripts can be exploited by evil spammers.
        --
        B10m
Re: Matt's scripts strike again
by tadman (Prior) on Dec 09, 2003 at 20:09 UTC
    It's not just Matt's Scripts that have trouble. The popular Web-logging tool Movable Type has a SPAM-vulnerable script called mt-send-entry.cgi. Not as popular yet, but it pays to stay ahead of the curve and lock this one down.
Re: Matt's scripts strike again
by boo_radley (Parson) on Dec 09, 2003 at 21:23 UTC
    It sounds circumstantially like your isp just made slashdot, based on the securityfocus article they link to. (Coincidentally, the /. post is by St. Aardvark, who sent a story about one of my perl scripts into slashdot.)

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: perlmeditation [id://313425]
Approved by diotalevi
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others having a coffee break in the Monastery: (3)
As of 2024-04-25 17:56 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found