welcome: please sign in

次の389語(ハイライト表示)は、1209語の辞書 1209語のLocalSpellingWordsを含む)中に見つかりませんでした。
able   Abuse   abuse   adapt   adding   against   allow   alternative   always   annoying   answer   answering   answers   antispam   approach   appropriate   args   ask   assumes   attachment   automatic   availability   available   avoid   Bad   bad   ban   because   between   block   blocked   Blocking   blocks   both   But   by   can   Careful   case   certain   Cha   changes   characters   chars   Chas   chmod   choice   clean   coming   common   community   compares   computable   conf   config   configuration   Configure   configure   configured   Configuring   console   contains   Contents   continue   contributions   count   creation   custom   daemon   day   days   decides   default   denied   depending   derived   details   digits   disabled   discovered   does   don   done   dport   each   echo   Editor   editor   edits   effective   empties   enable   enabled   engines   Enter   entered   ersten   etc   Events   every   example   executable   existing   expression   expressions   extracts   factors   fail2ban   failure   fallback   features   Features   few   Finally   find   finds   firewall   firewalling   Firewalling   following   for   from   Gegenteil   general   get   gets   getting   Gib   give   given   good   Group   group   guide   guy   hard   hashes   Hat   having   high   his   how   httpd   identifies   identify   Identifying   if   If   import   important   Improper   includes   increase   indicate   insensitive   inserted   instruct   into   ip   iptables   Iptables   its   keep   knowing   language   languages   large   larger   least   like   likely   limit   line   lines   linking   list   listing   Local   local   local0   lock   log   logged   logger   Logging   logging   logs   logsurfer   made   makes   Managing   manually   mass   match   matches   means   members   might   mod   modprobe   module   modules   monitor   monitors   more   much   multi   n0   nacht   name   need   night   nite   normal   Note   number   numbers   offending   often   On   on   only   opposite   options   or   out   outline   outlined   over   part   passed   period   permission   permissions   physical   Pi   place   point   Policy   port   presence   present   presented   prevent   preview   prime   probably   proc   process   profile   program   proven   provision   Ps   pure   puts   question   questions   random   ranking   ratings   rc   rcheck   reading   reboot   Rebooting   recent   recover   Red   regular   remember   remove   Remove   removed   Removing   required   requirements   restoring   Revert   revert   right   rules   save   saving   script   seconds   Security   security   see   Select   share   short   should   side   silly   simple   since   sites   so   some   something   sometimes   spamfound   spammer   Spammers   spammers   spamming   special   started   status   strong   Super   support   Swatch   swatch   sysconfig   system   systems   Table   Tag   tail   taking   target   tcp   technical   testing   text   textcha   textchas   than   that   their   then   These   these   They   this   This   those   though   threshold   time   times   Tips   to   To   too   Tools   tot   track   tracks   tries   Trusted   try   type   until   up   update   upload   ur   use   used   User   user   uses   usually   util   valuable   var   vary   very   via   warning   watchfor   webserver   what   What   which   who   wikiconfig   Wikispam   wikispam   will   with   within   Without   word   work   xt  

メッセージを消す
location: HelpOnSpam

Managing Spam

Wikispam is getting more and more annoying. Wiki pages get high ratings in search engines because of the strong linking between the pages (and each other via InterWiki links). This makes them a valuable target to increase the ranking of other pages.

But you can use a strong wiki community and also some technical means to avoid or remove spam on your wiki.

Blocking Spam

MoinMoin contains some technical features which block spam.

TextChas

What is a TextCHA?

It is a pure text alternative to CAPTCHAs. MoinMoin uses it to prevent wiki spamming and it has proven to be very effective.

Features:

Tips for answering:

TextCha Configuration

Tips for configuration:

In your wiki config, do something like this:

    textchas_disabled_group = u"TrustedEditorGroup" # members of this don't get textchas
    textchas = {
        'en': { # silly english example textchas (do not use them!)
            u"Enter the first 9 digits of Pi.": ur"3\.14159265",
            u"What is the opposite of 'day'?": ur"(night|nite)",
            # ...
        },
        'de': { # some german textchas
            u"Gib die ersten 9 Stellen von Pi ein.": ur"3\.14159265",
            u"Was ist das Gegenteil von 'Tag'?": ur"nacht",
            # ...
        },
        # you can add more languages if you like
    }

Note that TrustedEditorGroup from above example can have groups as members.

BadContent / LocalBadContent

You can ban certain content within contributions by listing regular expressions on the your 'BadContent' page.

If a user tries to save a page and its content matches any of these regular expressions, then saving that page will be denied (until the offending content is removed from the editor).

You can also enable an automatic update of BadContent via your wikiconfig. This is enabled by this line:

    from MoinMoin.security.antispam import SecurityPolicy

see HelpOnConfiguration/SecurityPolicy

Abuse Logging

Moin 1.9.8 added abuse logging. Events that often indicate the presence of a wiki spammer are logged. Tools like fail2ban, swatch, logsurfer, or a custom script can be used to process the logs, identify the IP numbers from which spam is coming, and instruct the system firewall to block the spammers. Linux iptables and its "recent" module is often used on the firewall side.

Abuse Firewalling

The firewalling approach outlined here uses Linux iptables and it's xt_recent module to keep track of and block the IP numbers of discovered spammers. Swatch is used to monitor the abuse logs to identify spammers.

Note that the example presented here is only a guide. The details will vary depending on your requirements and your present firewall configuration. They may also vary depending on your OS version or other factors. Careful testing is required.

Improper firewall configuration can lock you out of your system. To recover physical access to the system console may be required.

As presented here, wikispam will be blocked only after system reboot.

The general outline of the example is as follows: The wiki logs user actions. The swatch program monitors the logs and decides which actions taking place over what time period indicate the presence of a spammer. When swatch finds a spammer it extracts the spammer's IP number from the log and puts it on a "block" list used by iptables' xt_recent module. Iptables uses xt_recent to block the spammer for a given period of time. After the time limit has passed the spammer's IP number is removed from the block list by iptables. The OS must configure xt_recent to allow for a large number of blocked IPs.

Configuring mod xt_recent

The xt_recent module only tracks 100 IP numbers by default. This is probably much too few. Configure the module to track a larger number of IP numbers.

On Red-Hat derived systems this is done by adding the following to /etc/sysconfig/modules/iptables.modules:

# ! / b i n / s h   <-- This needs to have the spaces removed
# This file is /etc/sysconfig/modules/iptables.modules
modprobe xt_recent ip_list_tot=1009

The above file should be made executable, chmod a+x /etc/sysconfig/modules/iptables.modules

On Debian derived systems create the file /etc/modprobe.d/xt_recent.conf:

# This file is /etc/modprobe.d/xt_recent.conf
options xt_recent ip_list_tot=1009

Without knowing the details, the choice of a prime number for ip_list_tot will always be good, since the module hashes the IP numbers.

Blocking Wiki Spammers

The following iptables rules blocks discovered spammers for 100 days. They are blocked from port 80, the http port, and so denied use of the webserver.

# Make chains to support spam blocking
# (Newer kernels will have --reap and rules can be reworked to omit the spamfound chain.)
iptables -N wikispam
iptables -N spamfound

# Drop if on the spam list within the last 100 days
iptables -A wikispam -m recent \
         --name wikispam --rcheck --seconds 8640000 -g spamfound

# Remove abuser from spam list after 100 days
iptables -A wikispam -m recent --name wikispam --remove -j RETURN

# Found spam, drop packet
iptables -A spamfound -j DROP

# Use the wikispam chain to check all http traffic
iptables -A INPUT -p tcp --dport 80 -j wikispam

These rules should be inserted at the appropriate point into the existing firewall rules.

Note that this example includes no provision for saving the list of discovered spammers (in /proc/net/xt_recent/wikispam) and restoring the list on reboot. Rebooting the system empties the list of discovered spammers.

Identifying Wiki Spammers

The following /etc/swatch.conf file identifies as spammers those who are denied edit permission from wiki pages with more than 100 characters in their page name, at least 3 times within 1 day.

# This file is /etc/swatch.conf

# 3 failed attempts to edit a page of more than 100 characters within 1 day
watchfor / WARNING MoinMoin\.util\.abuse:37 : edit\/no permissions: status failure: [^:]*: ip ([.0123456789]*): page .{100,}/
  threshold track_by=$1, type=both, count=3, seconds=86400
     # exec 'logger -t swatch-wikispam -p local0.info "denied $1: 3 edits of a page having a name of 100 chars or more, within 1 day"'
     exec 'echo +$1 >/proc/net/xt_recent/wikispam'
     continue

Note that the above assumes no special abuse logging configuration.

Finally, swatch must be started. The following lines can be added to /etc/rc.local:

# Start the swatch daemon
# (Adjust to watch your webserver's error log file.)
swatch --daemon --tail-args '-F -n0' -c /etc/swatch.conf -t /var/log/httpd/error_log

Removing Spam

If you are a SuperUser, you can use the "Remove Spam" action to mass-revert changes of some spammer (or some other bad guy).

  1. Select "Remove Spam" from the available actions.
  2. Select the user (usually part of the IP)
  3. Select "Revert All"
  4. You will see how moin tries to revert his edits. This does not work in every case, so you may have to clean up some of his edits manually.