[thelist] Perl script as root

Chris Ditty CDitty at email.usps.gov
Thu Feb 14 11:52:46 CST 2002

     The cron method was going to be my next step if I couldn't resolve
     this one.

     Actually, I am not even using formmail.pl.  I just get tired of seeing
     it in my error logs and then moments later seeing every other
     variation of it from the same ip.  If I can cause just 1 spammer a
     minor incovienence, then I am a happy camper.  :)

     Thanks for the tips.


______________________________ Reply Separator _________________________________
Subject: Re: [thelist] Perl script as root
Author:  thelist-admin at lists.evolt.org at INTERNET
Date:    2/14/2002 12:28 PM


The usual way to handle a situation where a browser initiated script
needs to write to a file that is owned by *root* is to have the script
write to a temp file. Then run a cron on a second *root* owned
script that moves the entries from the temp file to the *root* owned
file. Cron jobs run as the owner of the script and therefore scripts
run that way are not limited by the web server to run as *nobody*.

That said, if you are trying to limit access to formmail.pl by IP
address you'll not succeed in keeping spammers from using
formmail.pl as a spam relay. IP addresses are easily faked. In fact
any commercial spammer will be routinely faking the IP address.

For unsubscribe and other options, including
the Tip Harvester and archive of thelist go to:
http://lists.evolt.org Workers of the Web, evolt !

More information about the thelist mailing list