Recent Topics

1 Jun 10, 2005 00:18    

I'm new here, and please forgive me if I might have overlooked an answer to this question in my searches.

I know that I can block IP addresses from accessing the web site of my b2evolution-based blog by means of appropriate Apache configuration settings. I'm glad to do that, but I'm wondering if b2evolution itself also might offer some sort of IP-based blocking?

If not, is there a plug-in that offers this functionality, perhaps?

By the way, I want to add that I am very impressed and quite happy with the high-quality b2evolution software. Keep up the good work!

2 Jun 10, 2005 03:20

b2evolution doesn't have an easy way to block specific ip addresses. Most abuse comes through proxy servers, so blocking ips can get to be useless or even counterproductive. A well made .htaccess file is the best way to deny traffic from specific ips. It's stops the abuse before it even reaches the scripts and begins taxing your server and eating up bandwidth. There are some good tips for fighting spam, including .htaccess code in [url=http://forums.b2evolution.net/viewtopic.php?t=3764]this thread[/url].

4 Apr 06, 2006 14:27

@ KWA

this is the most useful hack at the moment. I got over 2000 spam attacks from one IP.

two clicks and everything was deleteted!!! WOW gerat hack :p

Anyway, I will continue my fight against spam!

Thanx KWA

6 Apr 06, 2006 19:38

kwa may have a different view, but to me the key difference is that YAASH hack is reactive to your specific blog and BlockUntrustedVisitor uses some external resources to block theoretical spammers up front. In other words YAASH requires that you get spam to know which IPs to block. Having once been banned from a site that relied on a dsbl type of thing I decided they weren't a good way to go - false positives are too probable. That's just me though.

7 Apr 08, 2006 04:28

You're right, EdB, using DNSBLs creates some false positives, especially on dynamically allowed IPs with users' computers hijacked by some trojans. However (and you're right we disagree on that point), I believe the false positive (legitime visitors) are few enough compared to the true positives (real spammers) to still using DNSBLs on my site.

In fact, I do not know any anti-spam technique garanteed 100% perfect. Either you agree to have some false positives (and some legitime visitors cannot access to your site), either you agree to have some spam.

Anyway, I use external resources like the one implemented in [url=http://forums.b2evolution.net/viewtopic.php?p=23228#23228]BlockUntrustedVisitors()[/url] to block spam in order to reduce the cost of the anti-spam battle. I really cannot afford spending my time continuously updating antispam blacklists... So I trust others to do so.

8 Apr 08, 2006 05:01

That's a great way to sum it up: false positives or positive spam.

I will disagree vehemently on one point though: being blocked by a list has NOTHING to do with a compromised computer!!! Given that IPs are, for the most part, shared all you have to do is get an IP from your ISP that was once used by a spammer and happened to be reported to the third party and ended up on their 'bad IP' list. It has NOTHING to do with a hijacked PC! In my case I used a major-mongo dialup ISP in the US. I shared my IP with a billion other dialup losers, and we all would have been banned from a site that asked for help in these forums.

I'm on a cable connection now, but still suffer a similar fate on a site I like to download videos from. The site owner thinks IP = individual user, and therefore allows X megs per IP. I have to visit at 3am local time to be the first in line for the daily limit. The US market is such that everyone in my area on cable has my ISP, which means they're probably on the same IP that I get. Such is life eh?

For me I've started over with the antispam keyword list. I tweaked a file to allow keywords with 4 characters so I can ban .to/ and .cn/ for example. Am I blocking good guys as well as bad? YUP!!! Is that another version of false positive? YUP!!! Guess I decided those FPs are okay :roll:

9 Apr 08, 2006 12:24

My sister's computer has been hijacked by a trojan program and its IP has been blacklisted by several DNSBLs. I believe there are more unprotected zombie computers than spammers on the Net.

I was using b2evolution's standard blacklist and another referrers blacklist in a .htaccess file as well, and a few other antispam solutions. After my host complained about my site's CPU usage, I discovered all my antispam solutions took about 80% of the server's CPU time when displaying a web page. I tried to externalize my antispam protection since then...


Form is loading...