Search Results for 'spam'
-
AuthorSearch Results
-
May 7, 2010 at 10:08 pm #77130
In reply to: Spam despite disabled registrations and Askimet
jwordsmith
MemberAnyone know how to turn off registrations in Buddypress forums, as recommended here? Can’t find a way…
May 7, 2010 at 9:55 pm #77129In reply to: Here come the spammers!!!
jwordsmith
Member@foxly I love this. It’s what I’ve been looking for and I am really looking forward to Part II. Wait, did that sound like a spam comment. Damn, they’ve getting to me!
May 7, 2010 at 8:39 pm #77122In reply to: fyi: WP-reCAPTCHA works fine with BuddyPress
r-a-y
KeymasterHey Peter, didn’t see your post until just now.
You’re right that documentation is sparse, but that’s up to users like you and me to add it to the BuddyPress codex.
BuddyPress uses a different method to validate that’s why you can’t just hook in the WPMU validation function that WP-reCAPTCHA uses.
Like I stated above, look for clues in /buddypress/bp-core-signup.php. Check out the global $bp variable, especially $bp->signup->errors. This is what you have to use in place of what the check_recaptcha_wpmu() function uses.
FYI, I’m not using WP-reCAPTCHA.
Might I suggest using a math challenge plugin? It’s more user-friendly than a captcha plugin.
https://wordpress.org/extend/plugins/wpmu-block-spam-by-math/[EDIT]
Here’s another captcha plugin that supports BP:
https://wordpress.org/extend/plugins/super-capcha/May 7, 2010 at 1:27 pm #77074In reply to: Get Rid of Spammers Please
Jeff Sayre
ParticipantWe are all aware of this issue. Please see this thread: https://buddypress.org/community/groups/requests-feedback/forum/topic/here-come-the-spammers/
May 7, 2010 at 7:29 am #77044In reply to: Email Activation not being sent in upgraded BP 1.2.2
Brad Edwards
ParticipantI’m having the same thing happen… just tried twice. Used gmail addresses… emails never arrived to either account (yes, I checked SPAM).
Frustrating, don’t think I can launch until this is fixed now.
May 7, 2010 at 6:59 am #77043In reply to: Here come the spammers!!!
Hugo Ashmore
ParticipantAs Jeff mentioned we ought not to derail foxlies thread any further. Perhaps we ought to start that thread suggested re-hashing all the approaches tried, implemented, proven or not and maybe a mod could extract a set of definitive steps that ought to be implemented by anyone setting up a new install.
May 7, 2010 at 6:04 am #77038In reply to: Here come the spammers!!!
modemlooper
ModeratorI change my slug, have at least one new required profile filed as a drop down and added WP Super captcha plugin and have never had a spam sign up ever.
May 7, 2010 at 4:16 am #77032In reply to: Here come the spammers!!!
stwc
ParticipantExample: http://www.google.ca/search?hl=en&q=%2B”is+proudly+powered+by+WordPress+and+BuddyPress”; (front page of every BP site on the net)
Example: http://www.google.ca/search?hl=en&q=inurl:%22/community/members/%22+%2Bbuddypress (members page of every BP site on the net)Very much behind this, but I will mention that changing those two things are the first thing I’ve done with my BP installs (along with other stuff I mentioned in the article I did for the I-guess-it’s-not-coming-back bp-tricks.org). Agree that an install routine that forces the user to customize their slugs (explaining possibly consequences if they don’t) would be a great idea.
May 7, 2010 at 2:13 am #77018In reply to: Here come the spammers!!!
5887735
InactiveMy BP site is fairly new. I had one PM spammer and I changed my register slug and added birth day to the required fields and so far no return spammers (about 1000 new members per month, 4,000 current). I’m sure this won’t end attacks, but hopefully it with stave off many of the BOTS.
May 6, 2010 at 11:42 pm #77004In reply to: Here come the spammers!!!
xspringe
ParticipantAllowing users to report spam would be a very useful feature. There’s only so much you can do in terms of technical spam prevention, and technical spam prevention always gets cracked eventually.
If the amount of spam reports for a certain account exceeds x, then freeze the account until an admin can review the account. The admin should then have the option to do an IP based ban of the account if it appears to be a spammer. Some very basic IP based messaging/commenting/posting rate limitation would help too.
May 6, 2010 at 10:50 pm #77001In reply to: Here come the spammers!!!
5887735
InactiveMaybe BP should require that you choose your own register slug after activating the plugin. Perhaps also require you name your required fields fields, instead of the default “name” or “base.” The less default settings BP has the harder it is for BOTS.
May 6, 2010 at 10:02 pm #76998In reply to: Here come the spammers!!!
Jeff Sayre
Participant@foxly-
This is a very nice summary of the problem. Thank you for providing the introduction to the various attack vectors spammers currently use.
I would argue, as you know, that WP / BP also needs to combat registration spam–even though it is the hardest issue to address. There area a number of BP.org members that are looking for a solution, however imperfect, that will noticeably reduce spam signups. If a person is infected with a small viral load, the resulting illness often will not be as severe as if they had received a large dose of invading organisms. The same can be said with website spam signups. Any reduction is better than none.
But, as this is your thread and I do not want to take your thread off topic (or have others do what I just did
), I will ask that we table that discussion for another thread at another time and focus in this thread on solutions to combating spam once a spam account has successfully registered.Once again, this is a great start to the conversation.
May 6, 2010 at 7:26 pm #76972In reply to: Here come the spammers!!!
Hugo Ashmore
ParticipantWhile you’re preparing part 2 I’ll make the comment (probably unpopular) that too an extent this is an issue that BP, WP, Automatic must accept some responsibility for in that WP has always followed the course of making it as easy as possible for inexperienced people to set up a blog/blogs the principle of ‘Out Of The Box’ and ‘5 Minute Install’ all designed to promote the app/s to those users who otherwise might be put off, it’s a marketing ploy to ensure that the app gains widespread and popular use (that is being deliberately cynical to make a point) It is due to that that I say there is a duty of care that falls on the App not on the user or community. I know how to get down and dirty with htaccess files, to read logs, enable various methods to deal with an issue – as do many others here – but lets not forget most don’t! I would suggest that it’s time to pull together all the various approaches to dealing with spam in one clear stickied post, make the steps as clear as possible but emphasize that these steps are of paramount importance to follow (thinking about it that may already exist?) Until such time as Foxly or the dev team comes up with the core improvements.
For the record I have enabled most of the steps found in various threads here and elsewhere and also disabled sub blog registration and receive no more than around 6 -8 spam sign ups a day, which we can deal with quite quickly and effectively, I’m still slightly puzzled as to why some appear to have such ongoing issues though, very sympathetic but puzzled nonetheless.
May 6, 2010 at 6:00 pm #76958In reply to: Here come the spammers!!!
foxly
ParticipantAll About BuddyPress Spam
From what I’ve seen over the past few days, the range of knowledge about spam in the BP community ranges from zero to PhD research project. So, to get this thread off to a productive start, I’m going to give everyone some background info on why spammers target our installations, how they do it, and what we can do to reduce or eliminate these kinds of attacks.
1) Why do spammers attack BP communities?
-> Spam is 100% economically motivated. Spammers do what they do because it’s very profitable. Even if only 1 out of a million messages the spammer sends actually reaches somebody, if it cost $2 to send out those million messages and the spammer makes $50 by tricking one person into giving them a credit card number, the spammer is going to throw every resource they have into sending out more messages …because they’re getting a 2500% return on their investment.
-> Given the choice between multiple sites, a spammer will pick the one that gives the largest payout.
Gmail is a “hard” target, with users that are experienced with spam. If a spammer sent a billion spam messages to accounts on Gmail, 99.9% of them would be probably be deleted by automated filters at other ISP’s along the way before even arriving at Gmail. The first thousand messages that arrived at gmail would likely be delivered but would be put in user’s spam folders; and the remaining 999,000 messages would be flat-out refused by Gmail’s servers.
Because anyone with an email account is familiar with spam, probably 999 of those 1000 users would ignore the spam message and 1 user might act on it. So if it cost $20 to send those billion messages and the spammer made $50 by tricking the one person into giving them a credit card number, they’ve only made $30 for all that work.
BP communities are usually “soft” targets that are inexperienced with spam.
Once a spammer gets into a BP community, every single message they send is delivered to a member, and most members are NOT expecting to be attacked by other users on the site.
If a user called “site_news” sends everyone a message that says: “Our site just got featured on Oprah! check out the video! http://www.youtube.com/watch/dQw4w9WgXcQ.cn” every single member is going to get that message, and probably half of them are going to click on the link. (did anyone notice what’s wrong with that “YouTube video” …
)Then, assuming there are 50,000 members on the BP site, half of them click on the link, half of those people are using Internet Explorer, and the attack site the link points to installs a backdoor on computers running IE …at $2 / install the spammer has just made $25,000!
Now, if *you* were a spammer, which site would you attack?
2) How do spammers find BP communities?
Using Google.
Example: http://www.google.ca/search?hl=en&q=%2B”is+proudly+powered+by+WordPress+and+BuddyPress” (front page of every BP site on the net)
Example: http://www.google.ca/search?hl=en&q=inurl:%22/community/members/%22+%2Bbuddypress (members page of every BP site on the net)3) How do spammers attack websites?
-> Most spam attacks are done using robots, because sheer volume of posts is usually the winning factor. In situations where there is a “captcha wall” or other defense blocking registration to a “high value” site (hint: yours), spammers will use people in low-wage countries to break the captcha and sign up on the site. The going rate is about $2 per 1000 captchas.
http://www.decaptcher.com/client/
Once inside the site, they will then use bots to post spam to all the members on the site.
-> There are literally *thousands* of different programs available that spam websites, and they all have *different* venerabilities.
For example, this program: http://forums.digitalpoint.com/showthread.php?t=1124949
a) Will DEFEAT a “hidden fields” challenge,
b) Will DEFEAT a “javascript proof of work” challenge,
c) Will FAIL a “captcha” challenge
d) Will FAIL an “Akismet” challenge
e) Will FAIL a “Hashed Form Field ID” challengeBut this program: http://www.botmasternet.com/more1/ , wikipedia: http://en.wikipedia.org/wiki/XRumer , video of it running: http://www.youtube.com/watch?v=AL2i4SNPJmg
a) Will DEFEAT a “hidden fields” challenge,
b) Will DEFEAT a “javascript proof of work” challenge,
c) Will DEFEAT a “captcha” challenge
d) Will DEFEAT an “Akismet” challenge (uses proxy networks, never sends the same message twice)
e) Will DEFEAT a “Hashed Form Field ID” challenge
f) Will FAIL a “enter the numbers with a triangle over them” challenge (as used by PlentyOfFish.com)
g) Will FAIL a “click on the photos of cats but not the photos of dogs” challenge4) How do we stop spammers from attacking BP communities?
-> By making it frustrating and unprofitable (but not necessarily impossible) for spammers to target us; while making these tactics invisible to normal users.
I will cover how I propose to do this in the next post.
^F^
May 6, 2010 at 4:44 pm #76948In reply to: Here come the spammers!!!
modemlooper
ModeratorYou rock!
May 6, 2010 at 4:06 pm #76942In reply to: Here come the spammers!!!
foxly
ParticipantThe goal is to limit:
1) Spam PM’s
2) Spam friend requests
3) Spam comments
4) Spam group creation
5) Spam group postsOnce a spammer / troll / hostile has created a member account on the system.
The goal is NOT to stop:
6) Spam comments on blog posts from non-members.
-> Already handled by dozens of plugins7) Spam in profile fields
-> Limited damage. Will be handled by @francescolaffi ‘s GSoC project8 ) Spam blog creation
-> Limited damage. Will be handled by @francescolaffi ‘s GSoC project9) Spam sign-ups
-> Impossibly hard target. The only effective countermeasure is phone verification + geo IP + proxy blacklist; as implemented by Craigslist, eBay, PayPal, Elance, and many others.Full background on all this stuff in about an hour.
Thanks!
^F^
May 6, 2010 at 2:15 pm #76931In reply to: Here come the spammers!!!
Andrea Rennick
ParticipantAnd this would specifically deal with spam from actual users who have managed to sign up and and now using the internal messaging system to spam, correct?
And not spam signups, spam blog. Just to clarify.
May 6, 2010 at 3:37 am #76868In reply to: fyi: WP-reCAPTCHA works fine with BuddyPress
Peter Kirn
ParticipantHi r-a-y — would you be interested in posting your validation function code? (pastebin it perhaps?)
Just want to avoid reinventing the wheel. I also found a plugin in bpdev that appears to be doing this, as well, even down to adapting the existing WPMU recaptcha plugin, but it doesn’t seem to work / was never finished. I haven’t worked out just why yet, however.

http://bp-dev.org/download/You active bpdev-core and then bpdev-nospam.
May 5, 2010 at 8:49 pm #76820In reply to: Here come the spammers!!!
foxly
ParticipantSounds good to me. Give me a day or so to put some thought into it, then I’ll post a more structured proposal.
^F^
May 5, 2010 at 8:39 pm #76819In reply to: Here come the spammers!!!
Jeff Sayre
ParticipantOkay, per IRC dev chat, let’s use this thread for discussions on ideas to combat registration spam and other types of spam.
May 5, 2010 at 7:01 pm #76810In reply to: Private Message Spam and Abuse
xspringe
ParticipantEven more spam now, coming from this user: https://buddypress.org/community/members/joymab/
May 5, 2010 at 6:48 pm #76807In reply to: Here come the spammers!!!
Paul Wong-Gibbs
KeymasterInitial reaction from Jeff & I is that you detail what you have in mind before you dash off in one direction etc
May 5, 2010 at 6:46 pm #76806In reply to: Here come the spammers!!!
r-a-y
Keymaster@foxly – Come into the #buddypress-dev irc room on Freenode and let the team know what you have in mind!
You can also use a java web version of IRC if you don’t have a client:
http://java.freenode.net/?channel=buddypress-devMay 5, 2010 at 3:16 pm #76765Tosh
ParticipantI did actually, still shows the spammer as spam free.
May 5, 2010 at 2:54 pm #76762thekmen
Participantdid you try
if( $bp->loggedin_user->id == '59' ){
just to see if it works without the get_option(‘bp_spammer_cp_bp’) bit? -
AuthorSearch Results