Jump to content
  • Checkout
  • Login
  • Get in touch

osCommerce

The e-commerce.

Spam through enquiry


Electroserver

Recommended Posts

Posted

How do I stop spammers from relaying though my osCommerce installation?

 

they are sending the relay via bcc;

 

from a spoofed source. I can not figure out how to stop this!

 

 

here is a copy of the header

 

Received: from surgemail02.dentals.info [65.61.206.22] by dpmail24.doteasy.com with ESMTP

(SMTPD32-8.05) id A97B143100A0; Sat, 06 May 2006 11:22:51 -0700

Received: from dprhensim26.doteasy.com (unverified [65.61.230.1])

by surgemail02.dentals.info (DEO) with ESMTP id 156330

for <petsupply%[email protected]>; Sat, 06 May 2006 11:28:43 -0700

Return-Path: <[email protected]>

Received: from valuepetsupply.com (localhost.localdomain [127.0.0.1])

by dprhensim26.doteasy.com (8.12.10/8.12.10) with ESMTP id k46IOr0J005911

for <petsupply%[email protected]>; Sat, 6 May 2006 11:24:53 -0700

Received: (from petsupply@localhost)

by valuepetsupply.com (8.12.10/8.12.10/Submit) id k46IOrqh005909;

Sat, 6 May 2006 11:24:53 -0700

Date: Sat, 6 May 2006 11:24:53 -0700

Message-Id: <[email protected]>

To: "Frank Nassida" <petsupply%[email protected]>

Subject: Enquiry from Value Pet Supply

From: "[email protected]" <[email protected]>

X-Mailer: osCommerce Mailer

X-Server: High Performance Mail Server - http://surgemail.com r=34189668

X-RCPT-TO: <petsupply%[email protected]>

Status: R

X-UIDL: 393506476

X-Antivirus: AVG for E-mail 7.1.392 [268.5.5/333]

Mime-Version: 1.0

Content-Transfer-Encoding: 7bit

Content-Type: text/plain; charset=iso-8859-1

 

 

 

My host is using surge mail

 

Thanks for any help!

Posted

Have you updated your shop with the latest patches?

 

http://www.oscommerce.com/ext/update-20051113.html

 

If not, that's the first thing to do - contains vital upgrades to protect against spamming & hacking.

 

Terra

My code for combining PayPal IPN with ** QTPro 4.25 ** osC Affiliate ** CCGV(trad)

and how to solve the invoice already paid error

General info: Allow customer to delete order comment ** FTP Programs & Text Editors ** Amending order email **

Posted
thanks for the info, i wanted to know whether it is needed to change all the codes mentioned on that page.

they wouldn't have released the package if it wasn't :thumbsup:

Posted

can you please tell me one more thing, in the info boxes there is a image in both sides, where do i find that, searched all info boxes but couldn't find anything, just visit: www.bhuratea.com and there near all the boxes you will see different coloured image other than blue, i want to remove that image.

Posted
Have you updated your shop with the latest patches?

 

http://www.oscommerce.com/ext/update-20051113.html

 

If not, that's the first thing to do - contains vital upgrades to protect against spamming & hacking.

 

Terra

 

Yes, I completely re-installed with the latest osCommerce 2.2-MS2,

 

I have an auto responder, and it fires back the spoofed email address plus the destination email, which is under the bcc:

 

If I could figure out how to block that, I bet they would stop!

Posted
Yes, I completely re-installed with the latest osCommerce 2.2-MS2.

I have an auto responder, and it fires back the spoofed email address plus the destination email, which is under the bcc:

Applying the latest fix should stop the problem as it filters out all malicious code, so that's a surprise. I have never worked with surgemail though (I'm using the SMTP of our own server). I'm also weary of auto-responders as our email system once got locked into auto-responder ping-pong (our auto-responder "talking" with their auto-responder) and have them disabled.

 

One certain fix is to remove the contact form and replace with a simple email. You can javascript protect the email to make sure it is not picked up by spambots like this:

<script type="text/javascript" language=javascript>
			<!--
			var username = "username";
			var hostname = "domain.com";
			var linktext = username + "@" + hostname;
			document.write("<a href=" + "mail" + "to:" + username +
			"@" + hostname + ">" + linktext + "<\/a>")
			//-->
			</script>
			<!-- js ends -->
			<noscript>username at domain.com</noscript>

 

Replace username and domain.com with your own details. And in the noscript part write something which will be visible to people who have javascript disabled. I'm using as simple "at" instead of @ - most users know how to send an email, but you can also tell them to replace "at" with @.

 

Above code is currently installed in language level file on my site - just go to contact_us.php to check how it works with javascript en- or disabled. (PS: my url is shown in personal profile)

 

not the most elegant solution but will stop any spam relay.

 

Alternatively - I'm also wondering if the spam is actually successful, as the latest osCom security patches definitely stop the spam injections. If your site is being exploited, then your hosting company should be well aware as they will see a huge surge of emails, plus probably a black-listing by SpamCop. Have you checked your mail logs and /or with your hosting company to see if your shop/mailserver is actually successfully used to send out spam? If not, you might just get the emails with spoofed details of unsuccessful attempts, if that makes sense. With the latest security patches, I really can't see how your site could be abused - the patch pretty much closes all lopeholes.

 

Might also be worth double-checking that your shop does indeed include the fix - some mirror sites or control panels do not include the latest version of osCom, so only versions directly downloaded from www.oscommere.org are the updated, safe version.

 

all the best, Terra

My code for combining PayPal IPN with ** QTPro 4.25 ** osC Affiliate ** CCGV(trad)

and how to solve the invoice already paid error

General info: Allow customer to delete order comment ** FTP Programs & Text Editors ** Amending order email **

  • 1 month later...
Posted
<script type="text/javascript" language=javascript>
			<!--
			var username = "username";
			var hostname = "domain.com";
			var linktext = username + "@" + hostname;
			document.write("<a href=" + "mail" + "to:" + username +
			"@" + hostname + ">" + linktext + "<\/a>")
			//-->
			</script>
			<!-- js ends -->
			<noscript>username at domain.com</noscript>

 

 

Above code is currently installed in language level file on my site -

 

Hi there... I was thinking of doing something like this to lessen the amount of spam I'm getting, just wondering if you can expand on the statement "above code is currently installed in language level file" --> I understand that I could add it everywhere that I wanted to display the email address, but is there somewhere I could set it up, and then just refer to STORE_EMAIL?

 

Hope you understand what I'm trying to ask...

 

Thanks :) ~bobsi18~

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...