Many thanks for your explanation.

And here was I, thinking I had found a new spam-killer.   :-(

Allen C


On 25/10/16 00:35, Bill Cole wrote:
> On 24 Oct 2016, at 12:29, Allen Coates wrote:
>
>>
>> Over the weekend I had three spam messages get through to my in-box. Two
>> contained an "X-PHP-Script" header
>>
>> one was
>> X-PHP-Script:
>> folar.org/wp-content/plugins/the-events-calendar/src/Tribe/Aggregator/uploader.php
>>
>> for 110.83.63.152
>>
>> and the other
>> X-PHP-Script:
>> 118k.org/wp-content/plugins/formidable/classes/views/frm-entries/stats.php
>>
>> for 110.83.62.203
>>
>> I suppose I could block them using  header_checks, but first, does
>> anybody know what they (are supposed to) do?   I have not encountered
>> them before.
>
> They are added by the PHP mail() function (if the active PHP config
> has them turned on) as a weak but surprisingly useful way for web
> server admins to identify exactly where some spam-sending malware has
> been deployed. This is a weak tool in theory because a script can
> effectively clobber the pathname component, but apparently the folks
> writing that class of malware include examples of "any moron can write
> working PHP" because I still see these with apparently real values (as
> above) in spam at a substantial rate despite this feature existing for
> over a decade.
>
> I wouldn't advise using the existence of a X-PHP-Script header as an
> absolute reason to block mail. In my personal archives I have 30
> entirely legitimate, desired messages with that header and 173 spam.
> In a workplace account which gets essentially no spam I have no spam
> with it in the past 8 years, during which I've received dozens (maybe
> hundreds) of absolutely non-spam messages with X-PHP-Script headers
> generated by various tools that use PHP (e.g. MediaWiki page change
> notices) and from external sources. The content of a X-PHP-Script
> header can be useful in more complex filtering systems (e.g.
> SpamAssassin) because the spamware scripts often hide themselves in
> odd directories like /tmp, /images, and frequently claim to be
> triggered from IPs that bear no relationship to the source host (like
> the above: consumer broadband IPs in Fuqing, Fujian, China.) You can't
> do that sort of analysis in Postfix itself.
>
>

Reply via email to