[Mailman-Users] Malicious web subscription requests

2025-06-23 Thread Jayson Smith

Hi,


Earlier this evening I received a Yahoo! spam/abuse report, and I'm glad 
I did since it let me know there was a problem. I quickly discovered 
that somebody (or maybe more than one somebody) was using the Mailman 
subscribe form to request subscription for many Email addresses. 
According to my outgoing Sendmail logs, many of these addresses were 
being rejected, unknown user. This of course suggests that these 
particular malicious actors probably bought/acquired/harvested an 
out-of-date mailing list. Anyway I wanted to stop this immediately, as 
sending this type of Email is undesirable in any event. Needing a quick 
fix, what I did was to rename the subscribe executable in 
/usr/lib/mailman/cgi-bin to something nonsensical, then write a shell 
script as /usr/lib/mailman/cgi-bin/subscribe which cats an HTML document 
explaining that web subscriptions are currently unavailable and why.



I know there's been lots of discussion about the topic of malicious web 
subscribes in the past. However, with the two lists I run, there's a 
special situation. Almost all people subscribing to these lists are 
blind, so a visual CAPTCHA is entirely inappropriate. Are there any 
other countermeasures I can take?



Thanks,


Jayson


--
Mailman-Users mailing list -- mailman-users@python.org
To unsubscribe send an email to mailman-users-le...@python.org
https://mail.python.org/mailman3/lists/mailman-users.python.org/
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: https://www.mail-archive.com/mailman-users@python.org/
   https://mail.python.org/archives/list/mailman-users@python.org/
Member address: arch...@mail-archive.com


[Mailman-Users] Re: Malicious web subscription requests

2025-06-23 Thread Mark Sapiro

On 6/23/25 19:19, Jayson Smith wrote:


I know there's been lots of discussion about the topic of malicious web 
subscribes in the past. However, with the two lists I run, there's a 
special situation. Almost all people subscribing to these lists are 
blind, so a visual CAPTCHA is entirely inappropriate. Are there any 
other countermeasures I can take?


Mailman >= 2.1.30 has the ability to add text based captchas to the 
subscribe form. If your Mailman 2.1 version is 2.1.30 or later, see the 
section beginning with the line

```
# Use a custom question-answer CAPTCHA to protect against subscription spam.
```
in Defaults.py.

--
Mark Sapiro The highway is for gamblers,
San Francisco Bay Area, Californiabetter use your sense - B. Dylan

--
Mailman-Users mailing list -- mailman-users@python.org
To unsubscribe send an email to mailman-users-le...@python.org
https://mail.python.org/mailman3/lists/mailman-users.python.org/
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: https://www.mail-archive.com/mailman-users@python.org/
   https://mail.python.org/archives/list/mailman-users@python.org/
Member address: arch...@mail-archive.com


[Mailman-Users] Re: Malicious web subscription requests

2025-06-23 Thread Jayson Smith

Hi again,

Thanks for this information. However, I'm not sure this type of CAPTCHA 
is very effective any more. The problem is that LLM's can, in my 
experience, effortlessly answer the types of self-referencing questions 
that have been quite popular with these types of challenges in the past 
(What is Virgil's first name? What color is a red dress? If today is 
Friday, what is tomorrow? Piano, toothbrush, garbage truck—which of 
these do you put in your mouth?). Knowledge-based questions present some 
problems as well. Something like "What is the name of this list?" would 
be easy for any spammer to answer, since they're subscribing to that 
very list. "Who runs this list?" is problematic if someone genuinely 
doesn't know. What seems to be getting more popular is proof of work 
based CAPTCHAs where your computer has to solve some type of 
mathematical problem which takes a certain amount of time, then prove to 
the web server that it found the correct solution, or CAPTCHAs based on 
heuristics that try to determine if someone is more likely to be a real 
human or a bot. I totally get that Mailman version 2 is end of life at 
this point, so nothing like this will be implemented, it's just some 
thoughts.


I also don't quite understand the motivation for subscribe form 
flooding. What does the bad actor gain from sending out tons of 
subscribe requests to seemingly random people? Or are they just being 
malicious for no reason than that they can?


Thanks,

Jayson

On 6/23/2025 9:47 PM, Mark Sapiro wrote:

On 6/23/25 19:19, Jayson Smith wrote:


I know there's been lots of discussion about the topic of malicious 
web subscribes in the past. However, with the two lists I run, 
there's a special situation. Almost all people subscribing to these 
lists are blind, so a visual CAPTCHA is entirely inappropriate. Are 
there any other countermeasures I can take?


Mailman >= 2.1.30 has the ability to add text based captchas to the 
subscribe form. If your Mailman 2.1 version is 2.1.30 or later, see 
the section beginning with the line

```
# Use a custom question-answer CAPTCHA to protect against subscription 
spam.

```
in Defaults.py.



--
Mailman-Users mailing list -- mailman-users@python.org
To unsubscribe send an email to mailman-users-le...@python.org
https://mail.python.org/mailman3/lists/mailman-users.python.org/
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: https://www.mail-archive.com/mailman-users@python.org/
   https://mail.python.org/archives/list/mailman-users@python.org/
Member address: arch...@mail-archive.com


[Mailman-Users] Re: Malicious web subscription requests

2025-06-23 Thread Stephen J. Turnbull
Jayson Smith writes:

 > Thanks for this information. However, I'm not sure this type of
 > CAPTCHA is very effective any more.

All CAPTCHAs are effective to some degree.  Whether a "dumb" text
captcha would be effective depends on the sophistication of the
attacker.  I don't know about the subscription flooders.

I have recently seen captchas that produce audio.  Perhaps services
like Recaptcha can do that.

 > What seems to be getting more popular is proof of
 > work based CAPTCHAs where your computer has to solve some type of
 > mathematical problem which takes a certain amount of time, then
 > prove to the web server that it found the correct solution, or
 > CAPTCHAs based on heuristics that try to determine if someone is
 > more likely to be a real human or a bot.

Hashcash is rude to your legit users, and wasteful if Team Malice is
not attacking.  The heuristic approach is also annoying to real users
because it does make mistakes and they typically persist.  If they
work you can use them, of course, 

 > I also don't quite understand the motivation for subscribe form 
 > flooding. What does the bad actor gain from sending out tons of 
 > subscribe requests to seemingly random people?

I don't think we know.


-- 
GNU Mailman consultant (installation, migration, customization)
Sirius Open Sourcehttps://www.siriusopensource.com/
Software systems consulting in Europe, North America, and Japan
--
Mailman-Users mailing list -- mailman-users@python.org
To unsubscribe send an email to mailman-users-le...@python.org
https://mail.python.org/mailman3/lists/mailman-users.python.org/
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: https://www.mail-archive.com/mailman-users@python.org/
https://mail.python.org/archives/list/mailman-users@python.org/
Member address: arch...@jab.org