On 24 Oct 2016, at 12:29, Allen Coates wrote:
Over the weekend I had three spam messages get through to my in-box.
Two
contained an "X-PHP-Script" header
one was
X-PHP-Script:
folar.org/wp-content/plugins/the-events-calendar/src/Tribe/Aggregator/uploader.php
for 110.83.63.152
and the other
X-PHP-Script:
118k.org/wp-content/plugins/formidable/classes/views/frm-entries/stats.php
for 110.83.62.203
I suppose I could block them using header_checks, but first, does
anybody know what they (are supposed to) do? I have not encountered
them before.
They are added by the PHP mail() function (if the active PHP config has
them turned on) as a weak but surprisingly useful way for web server
admins to identify exactly where some spam-sending malware has been
deployed. This is a weak tool in theory because a script can effectively
clobber the pathname component, but apparently the folks writing that
class of malware include examples of "any moron can write working PHP"
because I still see these with apparently real values (as above) in spam
at a substantial rate despite this feature existing for over a decade.
I wouldn't advise using the existence of a X-PHP-Script header as an
absolute reason to block mail. In my personal archives I have 30
entirely legitimate, desired messages with that header and 173 spam. In
a workplace account which gets essentially no spam I have no spam with
it in the past 8 years, during which I've received dozens (maybe
hundreds) of absolutely non-spam messages with X-PHP-Script headers
generated by various tools that use PHP (e.g. MediaWiki page change
notices) and from external sources. The content of a X-PHP-Script header
can be useful in more complex filtering systems (e.g. SpamAssassin)
because the spamware scripts often hide themselves in odd directories
like /tmp, /images, and frequently claim to be triggered from IPs that
bear no relationship to the source host (like the above: consumer
broadband IPs in Fuqing, Fujian, China.) You can't do that sort of
analysis in Postfix itself.