On Fri, Mar 29, 2002 at 04:06:54PM -0800, Craig Hughes wrote: | Something like: | | POST /path/to/script HTTP/1.1\r\n | Host: foo.bar.com\r\n | scriptvar=value\r\n | scriptvar=value\r\n | \r\n
Ahh, part of the headers. I read somewhere that it was sent to CGI scripts on stdin, but maybe the webserver takes it out of the HTTP headers and puts it on the script's stdin. Hmm, maybe my other problem is that I wasn't setting a Host: header when I tried a programmatic technique. | I think. You can run netcat in listen mode: | | nc -l -p 9876 | | Then from another terminal run wget/curl against it | | curl -d 'scriptvar=test' http://localhost:9876/fake/path/script.cgi | | and then look at what netcat dumps out. Nice! I've often wanted to dump the output of a network connection to see what was going on. I suppose tcpdump could do it, but I haven't used it before and it sounds too low-level. This is precisely what I want sometimes. I have a mostly working shell script that uses curl and python. The python is just to urlencode the contents of the message. The curl is to make the request and dump the results. No programmatic error checking is done (watch stdout with your own eyes or pipe it somewhere). In making this script, I learned that formmail.pl (at least v1.6) truncates the values. The workaround is to insert a number of trailing spaces after the body of the message so that only whitespace is lost. Other than the cookie issue, it is ready for publication. http://dman.ddts.net/~dman/software/formmail.sh (Note: as of right now the recipient is an address at my site, not the address for automatically blacklisting a site. The proper addresses are included in a comment.) Use at your own risk :-). (whatever that means in this context) -D -- Reckless words pierce like a sword, but the tongue of the wise brings healing. Proverbs 12:18 _______________________________________________ Spamassassin-talk mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/spamassassin-talk