You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In a related software project I recently got hit with a big spam wave (3,000 spam sign ups) simply because I included the "First Name" field in the welcome e-mail. The attack works like this: the spammer writes a script to input a database of emails into your sign-up form, and in the "First Name" field it inserts whatever crap it wants. For example, First Name: Free pharmaceuticals now visit xyz.biz. Even for double-opt in, it means that 3,000 people will get emails with that bit of text in the email body. Even if the HTML is stripped out they can still abuse it.
Before activating ListMonk on my server I'd like to make sure this attack isn't possible. I can think of two solutions:
Remove "First Name" or other user generated field from the very first welcome email, until the user double-opts in. This means that spammers can still abuse it, but it would be pretty worthless since it doesn't give them a bit of customization or benefit at all.
(In addition to 1 probably) - add a server-to-server authorization callback pre-step before adding the user or sending out the initial opt-in email. For example, I can define an HTTPS endpoint on my own server with information about the HTTP request to approve or deny it. For example, list-monk would POST to myserver.xyz/validate with body email=XYZ&name=XYZ&ip_address=XYZ&user_agent=abc and I can implement my own IP geolocation, rate limit, spam checks as needed. I wouldn't need to modify the ListMonk code itself.
Is there an easy way to achieve this with ListMonk?
The text was updated successfully, but these errors were encountered:
This is precisely what the APIs are for. You can disable listmonk's default signup form and create your own signup form that does any validation you want before POSTing the subscription to listmonk.
Thank you very much for the response @knadh ! both answers will be adequate (Using the custom API with my own sign up form is more advanced for sure, but doable!) I'll close this thread now.
In a related software project I recently got hit with a big spam wave (3,000 spam sign ups) simply because I included the "First Name" field in the welcome e-mail. The attack works like this: the spammer writes a script to input a database of emails into your sign-up form, and in the "First Name" field it inserts whatever crap it wants. For example,
First Name: Free pharmaceuticals now visit xyz.biz
. Even for double-opt in, it means that 3,000 people will get emails with that bit of text in the email body. Even if the HTML is stripped out they can still abuse it.Before activating ListMonk on my server I'd like to make sure this attack isn't possible. I can think of two solutions:
myserver.xyz/validate
with bodyemail=XYZ&name=XYZ&ip_address=XYZ&user_agent=abc
and I can implement my own IP geolocation, rate limit, spam checks as needed. I wouldn't need to modify the ListMonk code itself.Is there an easy way to achieve this with ListMonk?
The text was updated successfully, but these errors were encountered: