-
-
Notifications
You must be signed in to change notification settings - Fork 213
Increasing spam despite spam protection / security question #8874
Comments
According to forum reports this also affects the honeypot captcha in Contao 4.4. Despite the honeypot being present, a lot of spam goes through. Though I have not yet witnessed that myself. |
@birdmedia which version of Contao do you use? |
The problem mainly occurs in Contao 3.5.3X |
We observe the same in a few contact forms (3.5.3x) since about 2 months. I don't think there is a reliable general solution. For some cases, we have specific anti-spam code added via the prepareFormData hook - for example see https://wiki.fleckwerk.de/doku.php/contao/schnipsel/form_spam_russian |
using madeyourday/contao-rocksolid-antispam will help to reduce the spammails |
@birdmedia Can you provide an affected installation where we can analyze the log files? |
Unfortunately, we removed every existing log file and disabled the creation of new log files (via chmod) due to GDPR compliance. |
Since no-one can provide log files, I'm closing this ticket for now. Feel free to create a new ticket if you have the required log files. |
Sorry, Fehler meinerseits. Das ist die normale Sicherheitsfrage. |
@contao/developers what do you need to check the problem? Which information in access.log? |
I think for the honeypot it would be great to have the full POST request (headers, body, everything) so we can actually check if the bot really sends the correct data. |
If you are using Contao 4.6, you can register a $data = [
'post' => $_POST,
'server' => $_SERVER,
];
$captchaKey = array_values(array_filter(array_keys($_POST), function($key) {
return preg_match('/^captcha_[0-9]+$/', $key);
}))[0] ?? null;
if ($captchaKey) {
$data['captchaKey'] = $captchaKey;
$generateHashes = (new \ReflectionClass('Contao\FormCaptcha'))->getMethod('generateHashes');
$generateHashes->setAccessible(true);
$data['hashes'] = $generateHashes->invoke(new \Contao\FormCaptcha, $_POST[$captchaKey]);
}
file_put_contents(TL_ROOT.'/var/spam-log.txt', print_r($data, true), FILE_APPEND); After you received some spam, you can send me the /var/spam-log.txt file via email. |
EDIT: no it’s not :(
|
It seems like the standard spam protection "security question" can easily be solved by current (mainly russian) spam bots. The standard captcha function should therefore be replaced or at least the currently used operations should be modified.
The text was updated successfully, but these errors were encountered: