<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Open proxy detector in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179618#M9475</link>
    <description>I get you.&lt;BR /&gt;&lt;BR /&gt;Make sure you have a robots.txt file in every document root directory, because he may be not only posting but using cgi scripts to relay mail off your mail servers.&lt;BR /&gt;&lt;BR /&gt;This is insidious problem. It got so bad on one of my servers that aol's mail server triggered an automatic block on my servers.&lt;BR /&gt;&lt;BR /&gt;If you are sure its an aol customer identify the customer and complain to aol.&lt;BR /&gt;&lt;BR /&gt;aol uses dynamic address assignment. All your enemy needs to do is dial a different aol dial up center to get a new ip addresss.&lt;BR /&gt;&lt;BR /&gt;ip blocking will not help you a bit. aol does track the time and ip address of their customer logins so if you gather enough information, the spammer will lose his account.&lt;BR /&gt;&lt;BR /&gt;You should be able to gather the information you need by going through your logs. start with access_log and go from there. You may want to enhance loggin on your iptables log so that you get maximum information on every login. That will require some space on the /var filesystem though.&lt;BR /&gt;&lt;BR /&gt;I'm attaching a robots.txt file for reference.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Sun, 01 Feb 2004 00:59:06 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2004-02-01T00:59:06Z</dc:date>
    <item>
      <title>Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179611#M9468</link>
      <description>My setup: Apache server running on HP 8500. I'm running three message boards and am being bugged by someone connecting via open proxy servers. The  MO is to attempt to post all kinds of trash, porn and every thing else. The subject line of the attempted posting always starts with the html tag OnClick Return='false'. So I know it is the same person even though the IP is different each time.&lt;BR /&gt;&lt;BR /&gt;I'm looking for an Open proxy detection method so that my server can detect and prevent the trashing attempts.&lt;BR /&gt;</description>
      <pubDate>Sat, 31 Jan 2004 21:46:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179611#M9468</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-01-31T21:46:57Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179612#M9469</link>
      <description>What you need to do is find out the IP address of the user.&lt;BR /&gt;&lt;BR /&gt;That is probably available in the access log for your webserver.&lt;BR /&gt;&lt;BR /&gt;Normal location is /etc/httpd/logs/access_log&lt;BR /&gt;&lt;BR /&gt;There will be an exact match between that log and the post time on your message board.&lt;BR /&gt;&lt;BR /&gt;If you get a hostname you can translate as follows:&lt;BR /&gt;&lt;BR /&gt;nslookup -sil hostname&lt;BR /&gt;&lt;BR /&gt;Once you have that, add the following line to your firewall configuration:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;-A INPUT -i eth0 -p ALL -s 217.40.55.73    -j DROP&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You will need to adjustthe IP address and the eth0 if you are not getting your web trafic on eth0.&lt;BR /&gt;&lt;BR /&gt;Then:&lt;BR /&gt;&lt;BR /&gt;service iptables restart&lt;BR /&gt;&lt;BR /&gt;The nasty person is gone, unable to reach your site. If the person has access to multiple IP addresses you may have to do this a number of times.&lt;BR /&gt;&lt;BR /&gt;Also make sure your home documenthome directory of the website has a robots.txt file  This prevents the person from trying to take advantage of cgi-bin scripts to relay mail through your mail server.&lt;BR /&gt;&lt;BR /&gt;Good Luck, &lt;BR /&gt;&lt;BR /&gt;post further details as needed.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Sat, 31 Jan 2004 22:45:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179612#M9469</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-01-31T22:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179613#M9470</link>
      <description>Thanks for your response Stephen !&lt;BR /&gt;&lt;BR /&gt;Since the person is coming in through proxy servers the logs only show the IP of the proxy. I have the log entries for each of the attempts; it is about a hundred a day; each with a different IP address.&lt;BR /&gt;&lt;BR /&gt;Messages go through an approval process before they make it to public viewing; the more the trash; the more time it takes in the approval process.&lt;BR /&gt;&lt;BR /&gt;I'm looking at BOPM but from what I see it looks like it is for chat rooms; not httpd.&lt;BR /&gt;&lt;BR /&gt;Any more ideas are welcome !!&lt;BR /&gt;</description>
      <pubDate>Sat, 31 Jan 2004 23:10:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179613#M9470</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-01-31T23:10:50Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179614#M9471</link>
      <description>Oops; I mean Steven !! Once knew a guy named Stephen :o)</description>
      <pubDate>Sat, 31 Jan 2004 23:13:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179614#M9471</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-01-31T23:13:07Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179615#M9472</link>
      <description>Vernon,&lt;BR /&gt;&lt;BR /&gt;Right as I was posting i noticed the IP address part of your post.&lt;BR /&gt;&lt;BR /&gt;There is probably a pattern to the IP addresses. If not, the person is using an anonymizer to get to you from different addresses each time.&lt;BR /&gt;&lt;BR /&gt;You could program the bulletin software to not accept the tags, but your person will simply change the tags once the message is rejected.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Sat, 31 Jan 2004 23:29:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179615#M9472</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-01-31T23:29:14Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179616#M9473</link>
      <description>An example; using dig -x on 172.149.129.158 shows it to be coming from AOL. But these are the only three from AOL. Looking at the log entries; first he opens the message board; message.html; then he looks at a message; 1975.html; then he posts a reply to that message. This is typical; it comes from a different IP each time.&lt;BR /&gt;&lt;BR /&gt;172.149.129.158 - - [28/Jan/2004:21:46:03 -0600] "GET /post/message.html HTTP/1.1" 200 8948 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"&lt;BR /&gt;172.149.129.158 - - [28/Jan/2004:21:46:25 -0600] "GET /post/messages/1975.html HTTP/1.1" 200 2205 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"&lt;BR /&gt;172.149.129.158 - - [28/Jan/2004:21:46:27 -0600] "POST /cgi-bin/open.cgi HTTP/1.1" 200 1964 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"&lt;BR /&gt;</description>
      <pubDate>Sun, 01 Feb 2004 00:44:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179616#M9473</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-02-01T00:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179617#M9474</link>
      <description>Here's another example; same person; this time coming from bellsouth.net:&lt;BR /&gt;&lt;BR /&gt;What he posts is pure trash; every porn word in the dictionary all in one link to a free internet site that has been suspended.&lt;BR /&gt;&lt;BR /&gt;67.34.14.194 - - [28/Jan/2004:17:30:40 -0600] "GET /post/message.html HTTP/1.1" 200 8945 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"&lt;BR /&gt;67.34.14.194 - - [28/Jan/2004:17:30:41 -0600] "GET /post/messages/1977.html HTTP/1.1" 200 1938 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"&lt;BR /&gt;67.34.14.194 - - [28/Jan/2004:17:30:41 -0600] "POST /cgi-bin/open.cgi HTTP/1.1" 200 2016 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"&lt;BR /&gt;</description>
      <pubDate>Sun, 01 Feb 2004 00:52:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179617#M9474</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-02-01T00:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179618#M9475</link>
      <description>I get you.&lt;BR /&gt;&lt;BR /&gt;Make sure you have a robots.txt file in every document root directory, because he may be not only posting but using cgi scripts to relay mail off your mail servers.&lt;BR /&gt;&lt;BR /&gt;This is insidious problem. It got so bad on one of my servers that aol's mail server triggered an automatic block on my servers.&lt;BR /&gt;&lt;BR /&gt;If you are sure its an aol customer identify the customer and complain to aol.&lt;BR /&gt;&lt;BR /&gt;aol uses dynamic address assignment. All your enemy needs to do is dial a different aol dial up center to get a new ip addresss.&lt;BR /&gt;&lt;BR /&gt;ip blocking will not help you a bit. aol does track the time and ip address of their customer logins so if you gather enough information, the spammer will lose his account.&lt;BR /&gt;&lt;BR /&gt;You should be able to gather the information you need by going through your logs. start with access_log and go from there. You may want to enhance loggin on your iptables log so that you get maximum information on every login. That will require some space on the /var filesystem though.&lt;BR /&gt;&lt;BR /&gt;I'm attaching a robots.txt file for reference.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Sun, 01 Feb 2004 00:59:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179618#M9475</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-02-01T00:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179619#M9476</link>
      <description>Thanks again !!&lt;BR /&gt;&lt;BR /&gt;I'll keep working on this. Surely there is a way to determine if the connect request is coming through an open proxy and quietly drop it if it is.&lt;BR /&gt;&lt;BR /&gt;One method I see in my searches is to try to open a proxy connect through the requesting IP back to your own server. If the open is successful, drop the connect attempt.&lt;BR /&gt;&lt;BR /&gt;Maybe a little too much overhead ??</description>
      <pubDate>Sun, 01 Feb 2004 01:23:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179619#M9476</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-02-01T01:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179620#M9477</link>
      <description>I think you can gather enough information to do what you want.&lt;BR /&gt;&lt;BR /&gt;As far as overhead goes, I'm not sure.&lt;BR /&gt;&lt;BR /&gt;It might be easier to write a cron job that scans for nasty posts and gets rid of them.&lt;BR /&gt;&lt;BR /&gt;Assuming this does not screw up your database. I don't know what app you are using for running  your board.&lt;BR /&gt;&lt;BR /&gt;IF you go the cron delete route you can be flexible on your deleted or just wipe out anything that has http in it.&lt;BR /&gt;&lt;BR /&gt;Depends on how draconian you want to be.&lt;BR /&gt;&lt;BR /&gt;Please report back what you do and how it works. I have similar unauthorized use issues.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Sun, 01 Feb 2004 03:04:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179620#M9477</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-02-01T03:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179621#M9478</link>
      <description>Hi Steven; thanks for the robots.txt. I'll use it but probably modify it so as not to link back to the forum here.&lt;BR /&gt;&lt;BR /&gt;I may have some success. I made a bright red splash screen with the content: &lt;BR /&gt;___________________________________________&lt;BR /&gt;Open Proxy detected: Please wait: Tracing reverse route.&lt;BR /&gt;___________________________________________&lt;BR /&gt;&lt;BR /&gt;I replaced the normal "Message Accepted" splash screen with the bogus one during his peak times of activity. Then I watched the logs and after he had seen the bogus splash screen I changed it back to the normal one.&lt;BR /&gt;&lt;BR /&gt;It's been about 24 hours now with no abuse :o) &lt;BR /&gt;</description>
      <pubDate>Sun, 01 Feb 2004 09:25:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179621#M9478</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-02-01T09:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: Open proxy detector</title>
      <link>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179622#M9479</link>
      <description>Hello Vernon,&lt;BR /&gt;&lt;BR /&gt;the Univeristy of Oregon tracks open proxies in a list. So in case this intruder comes back you might want to check &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://darkwing.uoregon.edu/~joe/open-proxies-used-to-send-spam.html" target="_blank"&gt;http://darkwing.uoregon.edu/~joe/open-proxies-used-to-send-spam.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Greetings, Martin&lt;BR /&gt;&lt;BR /&gt;P.S. the site does discuss true open proxies, not simple open mail relais.</description>
      <pubDate>Sun, 01 Feb 2004 12:21:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/open-proxy-detector/m-p/3179622#M9479</guid>
      <dc:creator>Martin P.J. Zinser</dc:creator>
      <dc:date>2004-02-01T12:21:17Z</dc:date>
    </item>
  </channel>
</rss>

