View Issue Details

IDProjectCategoryView StatusLast Update
290Composrcorepublic2013-04-06 20:54
ReporterChris Graham Assigned ToChris Graham  
PrioritynormalSeverityfeature 
Status resolvedResolutionfixed 
Summary290: Spammer database
DescriptionLookup IPs/browsers in a spammer database and block from posting accordingly.
TagsNo tags attached.
Attach Tags
Attached Files
antispam.tar (1,157,120 bytes)
antispam.patch (93,486 bytes)   
diff --git a/adminzone/pages/modules/admin_actionlog.php b/adminzone/pages/modules/admin_actionlog.php
index a1b04e0..649bd67 100644
--- a/adminzone/pages/modules/admin_actionlog.php
+++ b/adminzone/pages/modules/admin_actionlog.php
@@ -59,7 +59,9 @@ class Module_admin_actionlog
 	function run()
 	{
 		require_all_lang();
-	
+
+		require_code('support2');
+
 		$type=get_param('type','misc');
 	
 		if ($type=='misc') return $this->search();
@@ -67,6 +69,7 @@ class Module_admin_actionlog
 		if ($type=='view') return $this->view_action();
 		if (addon_installed('securitylogging'))
 		{
+			if ($type=='syndicate_ip_ban') return $this->syndicate_ip_ban();
 			if ($type=='toggle_ip_ban') return $this->toggle_ip_ban();
 			if ($type=='toggle_submitter_ban') return $this->toggle_submitter_ban();
 			if ($type=='toggle_member_ban') return $this->toggle_member_ban();
@@ -294,10 +297,10 @@ class Module_admin_actionlog
 
 				if (addon_installed('securitylogging'))
 				{
-					$banned_test_1=array_key_exists('ip',$myrow)?$GLOBALS['SITE_DB']->query_value_null_ok('usersubmitban_ip','ip',array('ip'=>$myrow['ip'])):NULL;
-					$banned_test_2=$GLOBALS['SITE_DB']->query_value_null_ok('usersubmitban_member','the_member',array('the_member'=>$myrow['the_user']));
+					$banned_test_1=array_key_exists('ip',$myrow)?ip_banned($myrow['ip'],true):false;
+					$banned_test_2=!is_null($GLOBALS['SITE_DB']->query_value_null_ok('usersubmitban_member','the_member',array('the_member'=>$myrow['the_user'])));
 					$banned_test_3=$GLOBALS['FORUM_DRIVER']->is_banned($myrow['the_user']);
-					$banned=((is_null($banned_test_1)) && (is_null($banned_test_2)) && (!$banned_test_3))?do_lang_tempcode('NO'):do_lang_tempcode('YES');
+					$banned=(((!$banned_test_1)) && ((!$banned_test_2)) && (!$banned_test_3))?do_lang_tempcode('NO'):do_lang_tempcode('YES');
 					
 					$result_entry[]=$banned;
 				}
@@ -354,11 +357,16 @@ class Module_admin_actionlog
 		{
 			if (array_key_exists('ip',$row))
 			{
-				$banned_test_1=$GLOBALS['SITE_DB']->query_value_null_ok('usersubmitban_ip','ip',array('ip'=>$row['ip']));
-				$fields['IP_BANNED']=is_null($banned_test_1)?do_lang_tempcode('NO'):do_lang_tempcode('YES');
+				$banned_test_1=ip_banned($row['ip'],true);
+				$fields['IP_BANNED']=(!$banned_test_1)?do_lang_tempcode('NO'):do_lang_tempcode('YES');
 				if ($row['ip']!=get_ip_address())
 				{
 					$fields['IP_BANNED']->attach(do_template('ACTION_LOGS_TOGGLE_LINK',array('URL'=>build_url(array('page'=>'_SELF','type'=>'toggle_ip_ban','id'=>$row['ip']),'_SELF'))));
+					if (get_option('stopforumspam_api_key').get_option('tornevall_api_username')!='')
+					{
+						require_lang('security');
+						$fields['SYNDICATE_TO_STOPFORUMSPAM']=do_template('ACTION_LOGS_TOGGLE_LINK',array('LABEL'=>do_lang_tempcode('PROCEED'),'URL'=>build_url(array('page'=>'_SELF','type'=>'syndicate_ip_ban','ip'=>$row['ip'],'member_id'=>$row['the_user']),'_SELF')));
+					}
 				}
 			}
 			$banned_test_2=$GLOBALS['SITE_DB']->query_value_null_ok('usersubmitban_member','the_member',array('the_member'=>$row['the_user']));
@@ -501,6 +509,41 @@ class Module_admin_actionlog
 	}
 
 	/**
+	 * The actualiser to syndicate an IP ban.
+	 *
+	 * @return tempcode		The UI
+	 */
+	function syndicate_ip_ban()
+	{
+		$ip=either_param('ip');
+		$member_id=either_param('member_id');
+
+		$title=get_page_title('SYNDICATE_TO_STOPFORUMSPAM');
+
+		if (post_param_integer('confirm',0)==0)
+		{
+			$preview=do_lang_tempcode('DESCRIPTION_SYNDICATE_TO_STOPFORUMSPAM');
+			$url=get_self_url(false,false,NULL,true);
+			return do_template('CONFIRM_SCREEN',array('TITLE'=>$title,'PREVIEW'=>$preview,'FIELDS'=>form_input_hidden('confirm','1'),'URL'=>$url));
+		}
+
+		require_code('failure');
+		syndicate_spammer_report($ip,is_guest($member_id)?'':$GLOBALS['FORUM_DRIVER']->get_username($member_id),$GLOBALS['FORUM_DRIVER']->get_member_email_address($member_id),'',true);
+		log_it('SYNDICATED_IP_BAN',$ip);
+
+		// Show it worked / Refresh
+		$_url=get_param('redirect',NULL);
+		if (!is_null($_url))
+		{
+			$url=make_string_tempcode($_url);
+		} else
+		{
+			$url=build_url(array('page'=>'_SELF','type'=>'misc'),'_SELF');
+		}
+		return redirect_screen($title,$url,do_lang_tempcode('SUCCESS'));
+	}
+
+	/**
 	 * The actualiser to toggle an IP ban.
 	 *
 	 * @return tempcode		The UI
@@ -509,9 +552,7 @@ class Module_admin_actionlog
 	{
 		$ip=get_param('id');
 
-		$test=$GLOBALS['SITE_DB']->query_value_null_ok('usersubmitban_ip','ip',array('ip'=>$ip));
-
-		if (is_null($test))
+		if (!ip_banned($ip,true))
 		{
 			$title=get_page_title('IP_BANNED');
 
diff --git a/adminzone/pages/modules/admin_config.php b/adminzone/pages/modules/admin_config.php
index e42858d..3137dd7 100644
--- a/adminzone/pages/modules/admin_config.php
+++ b/adminzone/pages/modules/admin_config.php
@@ -36,7 +36,7 @@ class Module_admin_config
 		$info['organisation']='ocProducts';
 		$info['hacked_by']=NULL;
 		$info['hack_version']=NULL;
-		$info['version']=12;
+		$info['version']=13;
 		$info['locked']=true;
 		$info['update_require_upgrade']=1;
 		return $info;
@@ -72,6 +72,9 @@ class Module_admin_config
 										'check_broken_urls','advanced_admin_cache','collapse_user_zones','google_analytics','fixed_width','show_screen_actions','show_content_tagging','show_content_tagging_inline',
 										'long_google_cookies','remember_me_by_default','detect_javascript','mobile_support','mail_queue','mail_queue_debug',
 										'comments_to_show_in_thread','max_thread_depth',
+										'spam_check_level','stopforumspam_api_key','tornevall_api_username','tornevall_api_password','spam_block_lists','spam_cache_time','spam_check_exclusions',
+										'spam_stale_threshold','spam_ban_threshold','spam_block_threshold','spam_approval_threshold',
+										'spam_check_usernames','implied_spammer_confidence','spam_blackhole_detection','honeypot_url','honeypot_phrase',
 										);
 
 		foreach ($config_options as $option)
@@ -184,8 +187,8 @@ class Module_admin_config
 			add_config_option('USE_CUSTOM_ZONE_MENU','use_custom_zone_menu','tick','return \'1\';','THEME','GENERAL');
 			add_config_option('TRAY_SUPPORT','tray_support','tick','return \'1\';','THEME','GENERAL');
 			add_config_option('SHOW_DOCS','show_docs','tick','return \'1\';','SITE','ADVANCED');
-			add_config_option('CAPTCHA_NOISE','captcha_noise','tick','return addon_installed(\'captcha\')?\'1\':NULL;','SITE','ADVANCED');
-			add_config_option('CAPTCHA_ON_FEEDBACK','captcha_on_feedback','tick','return addon_installed(\'captcha\')?\'0\':NULL;','SITE','ADVANCED');
+			add_config_option('CAPTCHA_NOISE','captcha_noise','tick','return addon_installed(\'captcha\')?\'1\':NULL;','SECURITY','SPAMMER_DETECTION');
+			add_config_option('CAPTCHA_ON_FEEDBACK','captcha_on_feedback','tick','return addon_installed(\'captcha\')?\'0\':NULL;','SECURITY','SPAMMER_DETECTION');
 			add_config_option('SHOW_POST_VALIDATION','show_post_validation','tick','return \'1\';','SITE','ADVANCED');
 			add_config_option('IP_FORWARDING','ip_forwarding','tick','return \'0\';','SITE','ENVIRONMENT');
 			add_config_option('FORCE_META_REFRESH','force_meta_refresh','tick','return \'0\';','SITE','ENVIRONMENT');
@@ -255,6 +258,25 @@ class Module_admin_config
 			foreach (array('send_error_emails','ocf_show_personal_myhome_link','twitter_login','twitter_password','facebook_api','facebook_appid','facebook_secret_code','facebook_uid','facebook_target_ids') as $option_to_delete)
 				delete_config_option($option_to_delete);
 		}
+		if ((is_null($upgrade_from)) || ($upgrade_from<13))
+		{
+			add_config_option('SPAM_CHECK_LEVEL','spam_check_level','list','return \'NEVER\';','SECURITY','SPAMMER_DETECTION',0,'EVERYTHING|ACTIONS|GUESTACTIONS|JOINING|NEVER');
+			add_config_option('STOPFORUMSPAM_API_KEY','stopforumspam_api_key','line','return \'\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('TORNEVALL_API_USERNAME','tornevall_api_username','line','return class_exists(\'SoapClient\')?\'\':NULL;','SECURITY','SPAMMER_DETECTION');
+			add_config_option('TORNEVALL_API_PASSWORD','tornevall_api_password','line','return class_exists(\'SoapClient\')?\'\':NULL;','SECURITY','SPAMMER_DETECTION');
+			add_config_option('SPAM_BLOCK_LISTS','spam_block_lists','line','return \'*.opm.tornevall.org\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('SPAM_CACHE_TIME','spam_cache_time','integer','return \'60\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('SPAM_CHECK_EXCLUSIONS','spam_check_exclusions','line','return \'127.0.0.1,\'.ocp_srv(\'SERVER_ADDR\').\'\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('SPAM_STALE_THRESHOLD','spam_stale_threshold','integer','return \'31\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('SPAM_BAN_THRESHOLD','spam_ban_threshold','integer','return \'90\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('SPAM_BLOCK_THRESHOLD','spam_block_threshold','integer','return \'60\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('SPAM_APPROVAL_THRESHOLD','spam_approval_threshold','integer','return \'40\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('SPAM_CHECK_USERNAMES','spam_check_usernames','tick','return \'0\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('IMPLIED_SPAMMER_CONFIDENCE','implied_spammer_confidence','integer','return \'80\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('SPAM_BLACKHOLE_DETECTION','spam_blackhole_detection','tick','return \'1\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('HONEYPOT_URL','honeypot_url','line','return \'\';','SECURITY','SPAMMER_DETECTION');
+			add_config_option('HONEYPOT_PHRASE','honeypot_phrase','line','return \'\';','SECURITY','SPAMMER_DETECTION');
+		}
 
 		if ((!is_null($upgrade_from)) && ($upgrade_from<8))
 		{
diff --git a/adminzone/pages/modules/admin_ipban.php b/adminzone/pages/modules/admin_ipban.php
index fcc0668..510cdbb 100644
--- a/adminzone/pages/modules/admin_ipban.php
+++ b/adminzone/pages/modules/admin_ipban.php
@@ -36,7 +36,7 @@ class Module_admin_ipban
 		$info['organisation']='ocProducts';
 		$info['hacked_by']=NULL;
 		$info['hack_version']=NULL;
-		$info['version']=4;
+		$info['version']=5;
 		$info['locked']=true;
 		$info['update_require_upgrade']=1;
 		return $info;
@@ -78,6 +78,11 @@ class Module_admin_ipban
 		{
 			$GLOBALS['SITE_DB']->add_table_field('usersubmitban_ip','i_descrip','LONG_TEXT');
 		}
+		if ((!is_null($upgrade_from)) && ($upgrade_from<5))
+		{
+			$GLOBALS['SITE_DB']->add_table_field('usersubmitban_ip','i_ban_until','?TIME');
+			$GLOBALS['SITE_DB']->add_table_field('usersubmitban_ip','i_ban_positive','BINARY',1);
+		}
 	}
 	
 	/**
@@ -124,10 +129,17 @@ class Module_admin_ipban
 		$GLOBALS['HELPER_PANEL_TEXT']=comcode_to_tempcode(do_lang('IP_BANNING_WILDCARDS',$lookup_url->evaluate()));
 
 		$bans='';
-		$rows=$GLOBALS['SITE_DB']->query_select('usersubmitban_ip',array('ip','i_descrip'));
+		$locked_bans='';
+		$rows=$GLOBALS['SITE_DB']->query('SELECT ip,i_descrip,i_ban_until FROM '.get_table_prefix().'usersubmitban_ip WHERE i_ban_positive=1 AND (i_ban_until IS NULL'.' OR i_ban_until>'.strval(time()).')');
 		foreach ($rows as $row)
 		{
-			$bans.=$row['ip'].' '.$row['i_descrip'].chr(10);
+			if (is_null($row['i_ban_until']))
+			{
+				$bans.=$row['ip'].' '.$row['i_descrip'].chr(10);
+			} else
+			{
+				$locked_bans.=do_lang('SPAM_AUTO_BAN_TIMEOUT',$row['ip'],$row['i_descrip'],get_timezoned_date($row['i_ban_until'])).chr(10);
+			}
 		}
 
 		$post_url=build_url(array('page'=>'_SELF','type'=>'actual'),'_SELF');
@@ -136,7 +148,7 @@ class Module_admin_ipban
 
 		list($warning_details,$ping_url)=handle_conflict_resolution();
 
-		return do_template('IPBAN_SCREEN',array('_GUID'=>'963d24852ba87e9aa84e588862bcfecb','PING_URL'=>$ping_url,'WARNING_DETAILS'=>$warning_details,'TITLE'=>$title,'BANS'=>$bans,'URL'=>$post_url));
+		return do_template('IPBAN_SCREEN',array('_GUID'=>'963d24852ba87e9aa84e588862bcfecb','PING_URL'=>$ping_url,'WARNING_DETAILS'=>$warning_details,'TITLE'=>$title,'LOCKED_BANS'=>$locked_bans,'BANS'=>$bans,'URL'=>$post_url));
 	}
 
 	/**
@@ -148,7 +160,8 @@ class Module_admin_ipban
 	{
 		require_code('failure');
 
-		$old_bans=collapse_1d_complexity('ip',$GLOBALS['SITE_DB']->query_select('usersubmitban_ip'));
+		$rows=$GLOBALS['SITE_DB']->query('SELECT ip,i_descrip FROM '.get_table_prefix().'usersubmitban_ip WHERE i_ban_until IS NULL'/*.' OR i_ban_until>'.strval(time())*/);
+		$old_bans=collapse_1d_complexity('ip',$rows);
 		$bans=post_param('bans');
 		$_bans=explode(chr(10),$bans);
 		foreach ($old_bans as $ban)
diff --git a/adminzone/pages/modules/admin_lookup.php b/adminzone/pages/modules/admin_lookup.php
index bb6b5c1..b8f3d0c 100644
--- a/adminzone/pages/modules/admin_lookup.php
+++ b/adminzone/pages/modules/admin_lookup.php
@@ -116,7 +116,7 @@ class Module_admin_lookup
 			if (is_null($id)) $id=$GLOBALS['FORUM_DRIVER']->get_guest_id();
 			if (is_null($ip)) $ip='';
 
-			$all_banned=collapse_1d_complexity('ip',$GLOBALS['SITE_DB']->query_select('usersubmitban_ip',array('ip')));
+			$all_banned=collapse_1d_complexity('ip',$GLOBALS['SITE_DB']->query('SELECT ip FROM '.get_table_prefix().'usersubmitban_ip WHERE i_ban_positive=1 AND (i_ban_until IS NULL OR i_ban_until>'.strval(time()).')'));
 
 			$ip_list=new ocp_tempcode();
 			$groups=array();
@@ -204,7 +204,15 @@ class Module_admin_lookup
 			$alerts=($ip=='')?new ocp_tempcode():find_security_alerts(array('ip'=>$ip));
 			
 			$member_banned=$GLOBALS['FORUM_DRIVER']->is_banned($id);
-			$ip_banned=($ip!='') && (!is_null($GLOBALS['SITE_DB']->query_value_null_ok('usersubmitban_ip','ip',array('ip'=>$ip))));
+			$ip_banned=false;
+			if ($ip!='')
+			{
+				$ban_until=$GLOBALS['SITE_DB']->query_select('usersubmitban_ip',array('i_ban_until'),array('i_ban_positive'=>1,'ip'=>$ip));
+				if (array_key_exists(0,$ban_until))
+				{
+					$ip_banned=is_null($ban_until[0]['i_ban_until']) || $ban_until[0]['i_ban_until']>time();
+				}
+			}
 			$banned_test_2=$GLOBALS['SITE_DB']->query_value_null_ok('usersubmitban_member','the_member',array('the_member'=>$id));
 			$submitter_banned=!is_null($banned_test_2);
 
@@ -230,7 +238,30 @@ class Module_admin_lookup
 			breadcrumb_set_parents(array(array('_SEARCH:admin_ocf_join:menu',do_lang_tempcode('MEMBERS')),array('_SELF:_SELF:misc',do_lang_tempcode('SEARCH'))));
 			breadcrumb_set_self(do_lang_tempcode('RESULT'));
 
-			return do_template('LOOKUP_SCREEN',array('_GUID'=>'dc6effaa043949940b809f6aa5a1f944','TITLE'=>$title,'ALERTS'=>$alerts,'STATS'=>$stats,'IP_LIST'=>$ip_list,'IP_BANNED'=>$ip_banned?do_lang_tempcode('YES'):do_lang_tempcode('NO'),'SUBMITTER_BANNED'=>$submitter_banned?do_lang_tempcode('YES'):do_lang_tempcode('NO'),'MEMBER_BANNED'=>$member_banned?do_lang_tempcode('YES'):do_lang_tempcode('NO'),'MEMBER_BAN_LINK'=>$member_ban_link,'SUBMITTER_BAN_LINK'=>$submitter_ban_link,'IP_BAN_LINK'=>$ip_ban_link,'ID'=>strval($id),'IP'=>$ip,'NAME'=>$name,'SEARCH_URL'=>$search_url,'AUTHOR_URL'=>$author_url,'POINTS_URL'=>$points_url,'PROFILE_URL'=>$profile_url,'ACTION_LOG_URL'=>$action_log_url));
+			return do_template(
+				'LOOKUP_SCREEN',
+				array(
+					'_GUID'=>'dc6effaa043949940b809f6aa5a1f944',
+					'TITLE'=>$title,
+					'ALERTS'=>$alerts,
+					'STATS'=>$stats,
+					'IP_LIST'=>$ip_list,
+					'IP_BANNED'=>$ip_banned?do_lang_tempcode('YES'):do_lang_tempcode('NO'),
+					'SUBMITTER_BANNED'=>$submitter_banned?do_lang_tempcode('YES'):do_lang_tempcode('NO'),
+					'MEMBER_BANNED'=>$member_banned?do_lang_tempcode('YES'):do_lang_tempcode('NO'),
+					'MEMBER_BAN_LINK'=>$member_ban_link,
+					'SUBMITTER_BAN_LINK'=>$submitter_ban_link,
+					'IP_BAN_LINK'=>$ip_ban_link,
+					'ID'=>strval($id),
+					'IP'=>$ip,
+					'NAME'=>$name,
+					'SEARCH_URL'=>$search_url,
+					'AUTHOR_URL'=>$author_url,
+					'POINTS_URL'=>$points_url,
+					'PROFILE_URL'=>$profile_url,
+					'ACTION_LOG_URL'=>$action_log_url
+				)
+			);
 		}
 	}
 
diff --git a/adminzone/pages/modules/admin_trackbacks.php b/adminzone/pages/modules/admin_trackbacks.php
index 0608568..3c3cd5a 100644
--- a/adminzone/pages/modules/admin_trackbacks.php
+++ b/adminzone/pages/modules/admin_trackbacks.php
@@ -116,6 +116,7 @@ class Module_admin_trackbacks
 							if (is_null($trackback_ip)) break;
 							require_code('failure');
 							add_ip_ban($trackback_ip,do_lang('TRACKBACK_SPAM'));
+							syndicate_spammer_report($trackback_ip,'','',do_lang('TRACKBACK_SPAM'),true);
 						}
 						// Intentionally no 'break' line below
 					case '1':
diff --git a/cms/pages/modules/cms_comcode_pages.php b/cms/pages/modules/cms_comcode_pages.php
index a250fa4..228cb26 100644
--- a/cms/pages/modules/cms_comcode_pages.php
+++ b/cms/pages/modules/cms_comcode_pages.php
@@ -922,6 +922,7 @@ class Module_cms_comcode_pages
 		}
 
 		$validated=post_param_integer('validated',0);
+		inject_action_spamcheck();
 		if (!has_specific_permission(get_member(),'bypass_validation_highrange_content')) $validated=0;
 		$parent_page=post_param('parent_page','');
 		$show_as_edit=post_param_integer('show_as_edit',0);
diff --git a/lang/EN/config.ini b/lang/EN/config.ini
index b0ea40d..be7e811 100644
--- a/lang/EN/config.ini
+++ b/lang/EN/config.ini
@@ -322,3 +322,41 @@ CONFIG_OPTION_max_thread_depth=The maximum depth of threaded topics. If people r
 CONFIG_OPTION_bottom_show_feedback_link=Show a feedback form link in the footer.
 CONFIG_OPTION_bottom_show_privacy_link=Show a privacy link in the footer.
 CONFIG_OPTION_bottom_show_sitemap_button=Show a sitemap link in the footer.
+SPAMMER_DETECTION=Spammer detection
+SPAM_CHECK_LEVEL=Spammer checking level
+CONFIG_OPTION_spam_check_level=The software has inbuilt support for integrating the <a target="_blank" title="Stop Forum Spam (this link will open in a new window)" href="http://www.stopforumspam.com/">Stop Forum Spam</a> web service, for the detection and blocking of known spammers, as well as <acronym title="Remote Block List">RBL</acronym>s. This option determines the level of checking performed. Note that the Stop Forum Spam service is intended to be non-commercial, so if you have a for-profit site you should negotiate an arrangement with them. Note that most checks only work if <acronym title="The inbuilt software forum">OCF</acronym> is being used.
+CONFIG_OPTION_spam_check_level_VALUE_EVERYTHING=Every page view (performs RBL checks always, and full check on actions)
+CONFIG_OPTION_spam_check_level_VALUE_ACTIONS=Actions (joining, posting, trackbacks)
+CONFIG_OPTION_spam_check_level_VALUE_GUESTACTIONS=Guest actions (joining, Guest posting, trackbacks)
+CONFIG_OPTION_spam_check_level_VALUE_JOINING=Joining
+CONFIG_OPTION_spam_check_level_VALUE_NEVER=Never
+STOPFORUMSPAM_API_KEY=Stop Forum Spam API key
+CONFIG_OPTION_stopforumspam_api_key=If a <a target="_blank" title="Stop Forum Spam API key (this link will open in a new window)" href="http://www.stopforumspam.com/signup">Stop Forum Spam API key</a> is filled in, automatic spammer reports will be syndicated (via the hack-attack system / flood-control system, when spammers are automatically detected). You will also be able to syndicate reports when you use the &ldquo;Investigate user&rdquo;, &ldquo;Action Log&rdquo;, &ldquo;Punish Member&rdquo; and &ldquo;Delete Trackbacks&rdquo; software features. You may manage your syndicated submissions on the <a target="_blank" title="Stop Forum Spam website (this link will open in a new window)" href="http://www.stopforumspam.com/myspammers">Stop Forum Spam website</a>.
+TORNEVALL_API_USERNAME=Tornevall API username
+CONFIG_OPTION_tornevall_api_username=If a <a target="_blank" title="tornevall API (this link will open in a new window)" href="http://www.stopforumspam.com/signup">tornevall key</a> is set up, enter the Username here. IPs will then be syndicated out like with the Stop Forum Spam service.
+TORNEVALL_API_PASSWORD=Tornevall API password
+CONFIG_OPTION_tornevall_api_password=If a <a target="_blank" title="tornevall API (this link will open in a new window)" href="http://www.stopforumspam.com/signup">tornevall key</a> is set up, enter the Password here. IPs will then be syndicated out like with the Stop Forum Spam service.
+SPAM_BLOCK_LISTS=<acronym title="Remote block list">RBL</acronym> servers
+CONFIG_OPTION_spam_block_lists=A comma-separated list of <acronym title="Remote Block List">RBL</acronym> servers designed for sharing spam blocking information. If you have an <a title="HTTP:BL key (this link will open in a new window)" href="http://www.projecthoneypot.org/httpbl_configure.php">HTTP:BL key</a>, you may set up HTTP:BL by putting in <kbd>&lt;key&gt;.*.dnsbl.httpbl.org</kbd> (put it first, as it is the best data for web systems and will be prioritised if given first). Only certain servers are supported fully (unrecognised servers will work, but without any settings granularity, due to a lack of any common <acronym title="Remote Block List">RBL</acronym> standard).
+SPAM_CACHE_TIME=Block list cache time
+CONFIG_OPTION_spam_cache_time=The number of minutes to cache spam block list requests.
+SPAM_CHECK_EXCLUSIONS=Spammer checking exclusions
+CONFIG_OPTION_spam_check_exclusions=A comma-separated list of IP addresses to never check. It will also be impossible for IP bans to be run against these addresses, even if they are configured.
+SPAM_STALE_THRESHOLD=Spammer staleness threshold
+CONFIG_OPTION_spam_stale_threshold=Only consider IP addresses that have been detected as malicious within this previous number of days.
+SPAM_BAN_THRESHOLD=Spammer ban threshold
+CONFIG_OPTION_spam_ban_threshold=If spammer confidence is above this percentage then the user will be given an error message then immediately put into the software IP ban list (for the configured period of time).
+SPAM_BLOCK_THRESHOLD=Spammer block threshold
+CONFIG_OPTION_spam_block_threshold=If spammer confidence is above this percentage then requests will be blocked with an error message. This only applies to requests that perform a content submission/join action.
+SPAM_APPROVAL_THRESHOLD=Spammer approval threshold
+CONFIG_OPTION_spam_approval_threshold=If spammer confidence is above this percentage then bypass-validation permissions will be removed for the user.
+IMPLIED_SPAMMER_CONFIDENCE=Implied spammer confidence
+CONFIG_OPTION_implied_spammer_confidence=<acronym title="Remote Block List">RBL</acronym> servers do not generally support confidence levels. A suspected spammer will be assigned this level, which will then be compared against your threshold settings. The exception is HTTP:BL, which always has a confidence level of 0 or 100 (as it is very precise).
+HONEYPOT_URL=Honeypot URL
+CONFIG_OPTION_honeypot_url=If you have set up a <a title="Project Honeypot script (this link will open in a new window)" target="_blank" href="http://www.projecthoneypot.org/add_honey_pot.php">Project Honeypot script</a>, enter the URL to it here. The default theme has a spot where it will automatically be inserted so that you don't need to do it manually yourself.
+HONEYPOT_PHRASE=Honeypot phrase
+CONFIG_OPTION_honeypot_phrase=When setting up a Project Honeypot script, Project Honeypot gives lots of code examples to use. There'll be a random phrase or word in most of them: enter that here, or make your own up.
+SPAM_CHECK_USERNAMES=Check usernames for known spammers
+CONFIG_OPTION_spam_check_usernames=Whether to check usernames during the Stop Forum Spam check. This may result in false-positives if spammers were using very generic usernames, and doesn't really work as a reliable filter (it is easy to use lots of different usernames).
+SPAM_BLACKHOLE_DETECTION=Blackhole detection
+CONFIG_OPTION_spam_blackhole_detection=If enabled, hidden inputs will be placed on all submittable forms. No human would fill these hidden inputs, but bots would. If filled in, spam hack-attack alerts will be generated. If there are enough, automatic banning will happen, and information will be relayed to the Stop Forum Spam project (if an API key was configured).
diff --git a/lang/EN/critical_error.ini b/lang/EN/critical_error.ini
index b9b4885..da48ccd 100644
--- a/lang/EN/critical_error.ini
+++ b/lang/EN/critical_error.ini
@@ -239,3 +239,17 @@ NOTIFICATION_TYPE_error_occurred_cron=Error during background scheduler
 NOTIFICATION_TYPE_error_occurred_missing_reference=Broken link in member Comcode
 NOTIFICATION_TYPE_error_occurred_missing_reference_important=Broken link in site Comcode
 ERRORS=Errors
+STOPPED_BY_ANTISPAM=Your IP address ({1}) has been detected in a ban list ({2}). To stop spam we check against external services that log malicious activity across the web. If your IP address has been flagged by accident we apologise &ndash; often IP addresses are shared or recycled so false-positives can occur, but we must protect our systems. If you are a genuine user please run a virus scan, secure your network, and try again in a few days.
+IPBAN_LOG_AUTOBAN_ANTISPAM=Auto-blocked by remote spam list checks ({1})
+ERROR_CHECKING_FOR_SPAMMERS=Could not run spam check using the [tt]{1}[/tt] service due to connection error. The action has been let through without a check.
+_ERROR_CHECKING_FOR_SPAMMERS=Could not run spam check using the [tt]{1}[/tt] service: {2}. The action has been let through without a check.
+NOTIFICATION_TYPE_spam_check_block=Perceived spammer blocked
+NOTIFICATION_SPAM_CHECK_BLOCK_SUBJECT_BAN=Perceived spammer banned ({1})
+NOTIFICATION_SPAM_CHECK_BLOCK_BODY_BAN=A possible spammer was detected by the {2} service (IP: {1}). They have been banned.
+NOTIFICATION_SPAM_CHECK_BLOCK_SUBJECT_BLOCK=Perceived spammer banned ({1})
+NOTIFICATION_SPAM_CHECK_BLOCK_BODY_BLOCK=A possible spammer was detected by the {2} service (IP: {1}). Their request has been blocked.
+NOTIFICATION_SPAM_CHECK_BLOCK_SUBJECT_APPROVE=Perceived spammer banned ({1})
+NOTIFICATION_SPAM_CHECK_BLOCK_BODY_APPROVE=A possible spammer was detected by the {2} service (IP: {1}). Validation has been forcibly enabled for their request.
+SPAM_REPORT_TRIGGERED_SPAM_HEURISTICS=Multiple triggers to spam heuristics (such as blackholes, or splatter-gun link injection)
+SPAM_REPORT_SITE_FLOODING=Flooding POST requests
+SPAM_REPORT_NO_EMAIL_OR_USERNAME=Sorry, we can't report this user because either there was no known username, or no known e-mail address. Stop Forum Spam requires full details.
diff --git a/lang/EN/global.ini b/lang/EN/global.ini
index aa624de..ef3339d 100644
--- a/lang/EN/global.ini
+++ b/lang/EN/global.ini
@@ -930,4 +930,5 @@ LIKED_BY=Liked by
 THREADED_REPLY_NOTICE=To reply to an existing post use the reply/quote button under it. Type fresh posts here when not replying to any existing post.\n\n{1}
 QUOTED_REPLY_MESSAGE=Click to type your reply to {1}'s message, which was:\n\n{2}
 READ_MORE=Read more
 POST_IN=Post in topic: {1}
+DO_NOT_FILL_ME_SPAMMER_BLACKHOLE=<span>D</span>on't <span>f</span>ill this field, it is here to <span>c</span>atch <span>s</span>pam-<span>b</span>ots that fill in forms <span>a</span>utomatically
diff --git a/lang/EN/security.ini b/lang/EN/security.ini
index 261c155..f390b9b 100644
--- a/lang/EN/security.ini
+++ b/lang/EN/security.ini
@@ -22,3 +22,6 @@ POST_DATA_EXPLANATION=Any web request can be classified as either a &lsquo;GET&r
 MODULE_TRANS_NAME_admin_security=Security logging
 MODULE_TRANS_NAME_admin_ssl=SSL/TLS (HTTPS) configuration
 HACKER_DETECTED=Hacker/evil-bot: {1}
+SYNDICATE_TO_STOPFORUMSPAM=Syndicate to Stop Forum Spam (and beyond)
+DESCRIPTION_SYNDICATE_TO_STOPFORUMSPAM=Send off this ban to the Stop Forum Spam service, and other similar services, to share the information with other sites just as they are sharing with yours. Use this with care, <strong>you really must have a water-tight reason</strong> for suggesting they are an out-and-out spammer, <strong>not</strong> just someone abusing your terms and conditions or being a general nuisance.
+SYNDICATED_IP_BAN=Syndicated IP ban
diff --git a/lang/EN/submitban.ini b/lang/EN/submitban.ini
index 548c1ba..25c2c08 100644
--- a/lang/EN/submitban.ini
+++ b/lang/EN/submitban.ini
@@ -5,13 +5,15 @@ VIEW_ACTION_LOGS=Action logs (audit trail)
 DOC_ACTION_LOG=The action log will allow you to trace what actions have been performed on the site; and where given, the reasons for doing them. This log gives a combined view of submission, administration, and moderation actions, and provides integration with the tracing and IP banning modules, as well as submitter banning of its own.
 DOC_IPBAN=Banning IP addresses is useful to totally remove a user's ability to access the site; unfortunately, users can very easily switch IP addresses. More information about IP addresses is given in the "IP addresses and tracking users" tutorial.
 BANNED_ADDRESSES=Banned IP addresses
+EXTERNALLY_BANNED_ADDRESSES=Externally banned addresses (will timeout according to &ldquo;Block list cache time&rdquo; setting)
 DESCRIPTION_BANNED_ADDRESSES_A=You may ban IP addresses from accessing this website using this tool.
 DESCRIPTION_BANNED_ADDRESSES_B=Each line of the text box below indicates an IP address that should be banned. Wildcards may be used. You may enter a note to the right of each address if you wish.
+SPAM_AUTO_BAN_TIMEOUT={1} {2} - until {3}
 IP_BANNING_WILDCARDS=IP address bans restrict access to the website on a low level. Be careful to [url="know an IP address"]{1}[/url] before you ban it to avoid inadvertently banning a shared computer/Internet-gateway. Please also be advised that [abbr="Internet Service Provider"]ISP[/abbr]-assigned addresses are often not fixed: a computer's IP address might vary substantially from one day to the next.\n\nAddresses may contain &lsquo;wildcards&rsquo; (asterisks) between dotted segments to symbolise that any number in that segment will match.\n\nIt is usual to have an asterisk as the final (fourth) part, as a user's IP address is very likely to change in that final component and at the same time it is very unlikely that wildcarding that last portion would result in any unintended bans. This said, extreme care is advised using wildcards at other points.
 IP_BANS=IP address bans
 IP_BANNED=IP banned
 MEMBER_BANNED=Member banned
-SUBMITTER_BANNED=Submitter banned
+SUBMITTER_BANNED=Future submissions banned
 IP_UNBANNED=IP unbanned
 MEMBER_UNBANNED=Member unbanned
 SUBMITTER_UNBANNED=Submitter unbanned
diff --git a/pages/comcode/EN/privacy.txt b/pages/comcode/EN/privacy.txt
index bab8008..5f8c20b 100755
--- a/pages/comcode/EN/privacy.txt
+++ b/pages/comcode/EN/privacy.txt
@@ -16,14 +16,11 @@ We will not share private details other than what can be seen in the forum profi
 The staff reserve the right to read any Private Topics and posts placed on this website. Any form of conversation made through this website should be considered viewable by staff. All private-posts and posts, whether 'deleted' or not, are stored on the server and may be reviewed if we feel we have cause for an investigation. If you do want to keep something private, do not use our services for transmitting it. Situations involving investigations can be anything at our discretion, for example, to investigate specific incidents of our services being used for racism or harassment.
 {+START,IF,{$ADDON_INSTALLED,shopping}}
 Use of the shopping cart may cause a non-logged-in-user's session to stick around for a longer than normal period of time, using a cookie, in order to keep the cart from being lost.
-{+END}
-{+START,IF,{$OCF}}
+{+END}{+START,IF,{$OCF}}
 [title="2"]Privacy settings[/title]
 
 Logged in members may [page="_SEARCH:members:view#tab__edit__privacy"]choose which fields display publicly[/page].
-{+END}
-
-{+START,IF,{$COPPA_ON}}
+{+END}{+START,IF,{$COPPA_ON}}
 [title="2"]Children's Online Privacy Protection Act[/title]
 
 In order for children under the age of thirteen to join this website, a parent or guardian must approve it. This is in accordance with U.S. law, but is applied internationally as a civil standard.
@@ -34,5 +31,10 @@ The parent or guardian has the option to agree to the collection and use of the
 {$SITE_NAME} may not require a child to disclose more information than is reasonably necessary to participate in an activity as a condition of participation.
 
 The parent or guardian can review the child's personal information, ask to have it deleted and refuse to allow any further collection or use of the child's information. This may be done by contacting the staff in the same way as was done to approve the membership originally.
+{+END}{+START,IF,{$NEQ,{$CONFIG_OPTION,spam_check_level},NEVER}}
+[title="2"]Spam checking[/title]
 
-{+END}
+For the purpose of reducing spam:
+1) Your IP address, e-mail address, and username, may be checked against the [url="http://www.stopforumspam.com/"]Stop Forum Spam[/url] web service, which involves these details being transmitted within a service request.
+1) Your IP address may be checked against multiple block lists, which involves these details being transmitted within a service request.
+{+END}
\ No newline at end of file
diff --git a/pages/modules/join.php b/pages/modules/join.php
index 632b6ca..b607a0a 100644
--- a/pages/modules/join.php
+++ b/pages/modules/join.php
@@ -69,13 +69,15 @@ class Module_join
 
 		require_code('ocf_join');
 		
-		check_joining_allowed();
-		
 		ocf_require_all_forum_stuff();
 
 		$type=get_param('type','misc');
 	
-		if ($type=='misc') return (get_option('show_first_join_page')!='1')?$this->step2():$this->step1();
+		if ($type=='misc')
+		{
+			check_joining_allowed();
+			return (get_option('show_first_join_page')!='1')?$this->step2():$this->step1();
+		}
 		if ($type=='step2') return $this->step2();
 		if ($type=='step3') return $this->step3();
 		if ($type=='step4') return $this->step4();
diff --git a/site/pages/modules/cedi.php b/site/pages/modules/cedi.php
index 03c6487..4e96c2e 100644
--- a/site/pages/modules/cedi.php
+++ b/site/pages/modules/cedi.php
@@ -1006,6 +1006,7 @@ class Module_cedi
 		// Do it
 		if ($mode=='post')
 		{
+			inject_action_spamcheck();
 			if (!has_specific_permission(get_member(),'bypass_validation_lowrange_content','cms_cedi',array('seedy_page',$id)))
 				$validated=0;
 			if (!has_category_access(get_member(),'seedy_page',strval($id))) access_denied('CATEGORY_ACCESS');
@@ -1014,6 +1015,13 @@ class Module_cedi
 
 			$post_id=cedi_add_post($id,$message,$validated);
 
+			if ($validated==0)
+			{
+				require_code('submit');
+				$edit_url=build_url(array('page'=>'cedi','type'=>'post','post_id'=>$post_id,'validated'=>1),'_SELF',NULL,false,false,true);
+				if (addon_installed('unvalidated'))
+					send_validation_request('CEDI_MAKE_POST','seedy_posts',false,strval($post_id),$edit_url);
+			}
 		} else
 		{
 			$rows=$GLOBALS['SITE_DB']->query_select('seedy_posts',array('*'),array('id'=>$post_id),'',1);
diff --git a/site/pages/modules/warnings.php b/site/pages/modules/warnings.php
index 3fbeb58..582ef90 100644
--- a/site/pages/modules/warnings.php
+++ b/site/pages/modules/warnings.php
@@ -371,6 +371,11 @@ class Module_warnings extends standard_aed_module
 					$fields->attach(form_input_tick(do_lang_tempcode('WHETHER_BANNED_IP'),do_lang_tempcode('DESCRIPTION_WHETHER_BANNED_IP'),'banned_ip',false));
 				}
 			}
+			if (get_option('stopforumspam_api_key').get_option('tornevall_api_username')!='')
+			{
+				require_lang('security');
+				$fields->attach(form_input_tick(do_lang_tempcode('SYNDICATE_TO_STOPFORUMSPAM'),do_lang_tempcode('DESCRIPTION_SYNDICATE_TO_STOPFORUMSPAM'),'stopforumspam',false));
+			}
 			if (addon_installed('points'))
 			{
 				if (has_actual_page_access(get_member(),'admin_points'))
@@ -680,6 +685,15 @@ class Module_warnings extends standard_aed_module
 			}
 		}
 
+		// Stop Forum Spam report
+		$stopforumspam=post_param_integer('stopforumspam',0);
+		if ($stopforumspam==1)
+		{
+			$banned_ip=$GLOBALS['FORUM_DRIVER']->get_member_row_field($member_id,'m_ip_address');
+			require_code('failure');
+			syndicate_spammer_report($banned_ip,$GLOBALS['FORUM_DRIVER']->get_username($member_id),$GLOBALS['FORUM_DRIVER']->get_member_email_address($member_id),$explanation,true);
+		}
+
 		// Change group
 		$changed_usergroup_from=NULL;
 		if (has_specific_permission(get_member(),'member_maintenance'))
diff --git a/sources/aed_module.php b/sources/aed_module.php
index c2c62fb..f2279a6 100644
--- a/sources/aed_module.php
+++ b/sources/aed_module.php
@@ -627,6 +627,7 @@ class standard_aed_module
 
 		if (($this->user_facing) && (!is_null($this->permissions_require)))
 		{
+			inject_action_spamcheck();
 			if (!has_specific_permission(get_member(),'bypass_validation_'.$this->permissions_require.'range_content',NULL,array($this->permissions_cat_require,is_null($this->permissions_cat_name)?'':post_param($this->permissions_cat_name),$this->permissions_cat_require_b,is_null($this->permissions_cat_name_b)?'':post_param($this->permissions_cat_name_b))))
 				$_POST['validated']='0';
 		}
diff --git a/sources/antispam.php b/sources/antispam.php
new file mode 100644
index 0000000..f6af095
--- /dev/null
+++ b/sources/antispam.php
@@ -0,0 +1,396 @@
+<?php /*
+
+ ocPortal
+ Copyright (c) ocProducts, 2004-2012
+
+ See text/EN/licence.txt for full licencing information.
+
+
+ NOTE TO PROGRAMMERS:
+   Do not edit this file. If you need to make changes, save your changed file to the appropriate *_custom folder
+   **** If you ignore this advice, then your website upgrades (e.g. for bug fixes) will likely kill your changes ****
+
+*/
+
+/**
+ * @license		http://opensource.org/licenses/cpal_1.0 Common Public Attribution License
+ * @copyright	ocProducts Ltd
+ * @package		core
+ */
+
+/**
+ * Check RBLs to see if we need to block this user.
+ *
+ * @param boolean		Whether this is a page level check (i.e. we won't consider blocks or approval, just ban setting)
+ */
+function check_rbls($page_level=false)
+{
+	$user_ip=get_ip_address();
+
+	// Check ocPortal bans / caching
+	require_code('support2');
+	$is_already_ip_banned=ip_banned($user_ip,true,true);
+	if ($is_already_ip_banned===true) critical_error('BANNED');
+	if ($is_already_ip_banned===false) return; // Cached that we're not banned
+
+	// Check exclusions
+	$exclusions=explode(',',get_option('spam_check_exclusions'));
+	foreach ($exclusions as $e)
+	{
+		if (trim($e)==$user_ip) return;
+	}
+
+	// What are we blocking? Hard-coded settings for the particular supported block lists
+	$block=array(
+		'tornevall_abuse'=>true,			// TornevallRBL: Block on 'abuse'
+		'tornevall_anonymous'=>true,		// TornevallRBL: Block on anonymous access (anonymizers, TOR, etc)
+		'tornevall_blitzed'=>true,			// TornevallRBL: Block if host are found in the Blitzed RBL (R.I.P)
+		'tornevall_checked'=>false,		// TornevallRBL: Block anything that has been checked
+		'tornevall_elite'=>true,			// TornevallRBL: Block elite proxies (proxies with high anonymity)
+		'tornevall_error'=>false,			// TornevallRBL: Block proxies that has been tested but failed
+		'tornevall_timeout'=>false,		// TornevallRBL: Block proxies that has been tested but timed out
+		'tornevall_working'=>true,			// TornevallRBL: Block proxies that has been tested and works
+		'efnet_openproxy'=>true,			// EFNet: Block open proxies registered at rbl.efnet.org
+		'efnet_spamtrap50'=>false,			// EFNet: Block trojan spreading client (IRC-based)
+		'efnet_spamtrap666'=>false,		// EFNet: Block known trojan infected/spreading client (IRC-based)
+		'efnet_tor'=>true,					// EFNet: Block TOR Proxies
+		'efnet_drones'=>false,				// EFNet: Drones/Flooding (IRC-based)
+		'njabl_dialup'=>false,				// Njabl: Block dialups/dynamic ip-ranges (Be careful!)
+		'njabl_formmail'=>true,				// Njabl: Block systems with insecure scripts that make them into open relays
+		'njabl_multi'=>false,				// Njabl: Block multi-stage open relays (Don't know what this is? Leave it alone)
+		'njabl_openproxy'=>true,			// Njabl: Block open proxy servers
+		'njabl_passive'=>false,				// Njabl: Block passively detected 'bad hosts' (Don't know what this is? Leave it alone)
+		'njabl_relay'=>false,				// Njabl: Block open relays (as in e-mail-open-relays - be careful)
+		'njabl_spam'=>false					// Njabl: lock spam sources (Again, as in e-mail
+	);
+
+	// Handle the return data for the different RBLs
+	$blockdetails=mixed();
+	$blockedby=mixed();
+	$confidencelevel=mixed();
+	$rbllist=explode(',',get_option('spam_block_lists'));
+	foreach ($rbllist as $rbl)
+	{
+		// Blocking based on opm.tornevall.org settings (used by default because stopforumspam syndicates to this and ask us to check this first, for performance)
+		// http://dnsbl.tornevall.org/?do=usage
+		$rtornevall=array(
+			'tornevall_checked'=>1,
+			'tornevall_working'=>2,
+			'tornevall_blitzed'=>4,
+			'tornevall_timeout'=>8,
+			'tornevall_error'=>16,
+			'tornevall_elite'=>32,
+			'tornevall_abuse'=>64,
+			'tornevall_anonymous'=>128
+		);
+		if (strpos($rbl,'tornevall.org')!==false)
+		{
+			if (!is_null($confidencelevel)) continue; // We know better than this RBL can tell us, so stick with what we know
+			$rblresponse=rblresolve($user_ip,$rbl,$page_level);
+			if (is_null($rblresponse)) continue; // Error
+
+			foreach ($rtornevall as $rbl_t=>$rbl_tc)
+			{
+				if ((($rblresponse[3] & $rbl_tc)!=0) && ($block[$rbl_t]))
+				{
+					$blockdetails=$rblresponse[3];
+					$blockedby=preg_replace('#^\*\.#','',$rbl);
+					break;
+				}
+			}
+			continue;
+		}
+
+		// Blocking based on njabl.org settings (not used by default)
+		// http://njabl.org/use.html
+		$rnjabl=array(
+			'njabl_relay'=>2,
+			'njabl_dialup'=>3,
+			'njabl_spam'=>4,
+			'njabl_multi'=>5,
+			'njabl_passive'=>6,
+			'njabl_formmail'=>8,
+			'njabl_openproxy'=>9
+		);
+		if (strpos($rbl,'njabl.org')!==false)
+		{
+			if (!is_null($confidencelevel)) continue; // We know better than this RBL can tell us, so stick with what we know
+			$rblresponse=rblresolve($user_ip,$rbl,$page_level);
+			if (is_null($rblresponse)) continue; // Error
+
+			foreach ($rnjabl as $njcheck=>$value)
+			{
+				if (($rblresponse[3]==$value) && ($block[$njcheck]))
+				{
+					$blockdetails=$rblresponse[3];
+					$blockedby=preg_replace('#^\*\.#','',$rbl);
+					break;
+				}
+			}
+			continue;
+		}
+
+		// Blocking based on efnet.org settings (not used by default)
+		// http://efnetrbl.org/
+		$refnet=array(
+			'efnet_openproxy'=>1,
+			'efnet_spamtrap666'=>2,
+			'efnet_spamtrap50'=>3,
+			'efnet_tor'=>4,
+			'efnet_drones'=>5
+		);
+		if (strpos($rbl,'efnet.org')!==false)
+		{
+			if (!is_null($confidencelevel)) continue; // We know better than this RBL can tell us, so stick with what we know
+			$rblresponse=rblresolve($user_ip,$rbl,$page_level);
+			if (is_null($rblresponse)) continue; // Error
+
+			foreach ($refnet as $efcheck=>$value) 
+			{
+				if (($rblresponse[3]==$value) && ($block[$njcheck]))
+				{
+					$blockdetails=$rblresponse[3];
+					$blockedby=preg_replace('#^\*\.#','',$rbl);
+					break;
+				}
+			}
+			continue;
+		}
+
+		// Blocking based on HTTP:BL settings (not used by default, because it requires getting a key)
+		// http://www.projecthoneypot.org/httpbl_api.php
+		if (strpos($rbl,'dnsbl.httpbl.org')!==false)
+		{
+			if (strpos($rbl,'*')===false) // Fix a misconfiguration based on the admin copy and pasting the given HTTP:BL setup example
+			{
+				$rbl=str_replace('7.1.1.127','*',$rbl);
+			}
+
+			$rblresponse=rblresolve($user_ip,$rbl,$page_level);
+			if (is_null($rblresponse)) continue; // Error
+
+			$_confidencelevel=floatval($rblresponse[2])/255.0;
+			if ($_confidencelevel!=0.0)
+			{
+				$spam_stale_threshold=intval(get_option('spam_stale_threshold'));
+
+				if (intval($rblresponse[1])>$spam_stale_threshold) break; // We know this IP is stale now so don't check other RBLs as no others support stale checks
+
+				if (($confidencelevel===NULL) || ($_confidencelevel>$confidencelevel))
+				{
+					//$confidencelevel=$_confidencelevel;	Actually, this is a threat level, not a confidence level. If it's not zero, it is 100% confidence.
+					$confidencelevel=1.0;
+					$blockdetails=$rblresponse[3];
+					$blockedby='dnsbl.httpbl.org';
+				}
+				break;
+			}
+			continue;
+		}
+
+		// Unknown RBL, basic support only
+		if ($rblresponse[3]!=0)
+		{
+			if (!is_null($confidencelevel)) continue; // We know better than this RBL can tell us, so stick with what we know
+			$rblresponse=rblresolve($user_ip,$rbl,$page_level);
+			if (is_null($rblresponse)) continue; // Error
+
+			$blockdetails=$rblresponse[3];
+			$blockedby=preg_replace('#^\*\.#','',$rbl);
+			break;
+		}
+	}
+
+	// Now deal with it
+	if ($blockdetails!==NULL) // If there's a block
+	{
+		if ($confidencelevel===NULL) $confidencelevel=floatval(get_option('implied_spammer_confidence'))/100.0;
+		handle_perceived_spammer($user_ip,$confidencelevel,$blockedby,$page_level);
+	} else
+	{
+		require_code('failure');
+		add_ip_ban($user_ip,'',time()+60*intval(get_option('spam_cache_time')),false); // Mark a negative ban (i.e. cache)
+	}
+}
+
+/**
+ * Do an RBL lookup.
+ *
+ * @param  IP			The IP address to lookup
+ * @param  ID_TEXT	The RBL domain
+ * @param boolean		Whether this is a page level check (i.e. we won't consider blocks or approval, just ban setting)
+ * @return ?array		Return result (NULL: error)
+ */
+function rblresolve($ip,$rbldomain,$page_level)
+{
+	if (strpos($ip,'.')!==false) // ipv4
+	{
+		$arpa=implode('.',array_reverse(explode('.',$ip)));
+	} else // ipv6
+	{
+		$_ip=explode(':',$ip);
+		$normalised_ip='';
+		$normalised_ip.=str_pad('',(4*(8-count($_ip))),'0000',STR_PAD_LEFT); // Fill out trimmed 0's on left
+		foreach ($_ip as $seg) // Copy rest in
+			$normalised_ip.=str_pad($seg,4,'0',STR_PAD_LEFT); // Pad out each component in full, building up $normalised_ip
+		$arpa=implode('.',array_reverse(preg_split('//',$normalised_ip,NULL,PREG_SPLIT_NO_EMPTY)));
+	}
+
+	$lookup=str_replace('*',$arpa,$rbldomain);
+
+	$_result=gethostbyname($lookup);
+	$result=explode('.',$_result);
+
+	if (implode('.',$result)==$lookup) // This is how gethostbyname indicates an error happened; however it likely actually means no block happened (as the RBL returned no data on the IP)
+	{
+		return NULL;
+	}
+
+	if ($result[0]!='127') // This is how the RBL indicates an error happened
+	{
+		if (!$page_level)
+		{
+			require_code('failure');
+			$error=do_lang('_ERROR_CHECKING_FOR_SPAMMERS',$rbldomain,$_result);
+			relay_error_notification($error,false,'error_occurred');
+		}
+		return NULL;
+	}
+
+	// Some kind of response
+	return $result;
+} 
+
+/**
+ * Deal with a perceived spammer.
+ *
+ * @param IP			IP address
+ * @param float		Confidence level (0.0 to 1.0)
+ * @param ID_TEXT		Identifier for whatever did the blocking
+ * @param boolean		Whether this is a page level check (i.e. we won't consider blocks or approval, just ban setting)
+ */
+function handle_perceived_spammer($user_ip,$confidencelevel,$blockedby,$page_level)
+{
+	// Ban
+	$spam_ban_threshold=intval(get_option('spam_ban_threshold'));
+	if (intval($confidencelevel*100.0)>=$spam_ban_threshold)
+	{
+		require_code('failure');
+		add_ip_ban($user_ip,do_lang('IPBAN_LOG_AUTOBAN_ANTISPAM',$blockedby),time()+60*intval(get_option('spam_cache_time')));
+
+		require_code('notifications');
+		$subject=do_lang('NOTIFICATION_SPAM_CHECK_BLOCK_SUBJECT_BAN',$user_ip,$blockedby,NULL,get_site_default_lang());
+		$message=do_lang('NOTIFICATION_SPAM_CHECK_BLOCK_MESSAGE_BAN',$user_ip,$blockedby,NULL,get_site_default_lang());
+		dispatch_notification('spam_check_block',NULL,$subject,$message,NULL,A_FROM_SYSTEM_PRIVILEGED);
+
+		warn_exit(do_lang_tempcode('STOPPED_BY_ANTISPAM',escape_html($user_ip),escape_html($blockedby)));
+	}
+
+	// Block
+	if (!$page_level)
+	{
+		$spam_block_threshold=intval(get_option('spam_block_threshold'));
+		if (intval($confidencelevel*100.0)>=$spam_block_threshold)
+		{
+			require_code('notifications');
+			$subject=do_lang('NOTIFICATION_SPAM_CHECK_BLOCK_SUBJECT_BLOCK',$user_ip,$blockedby,NULL,get_site_default_lang());
+			$message=do_lang('NOTIFICATION_SPAM_CHECK_BLOCK_MESSAGE_BLOCK',$user_ip,$blockedby,NULL,get_site_default_lang());
+			dispatch_notification('spam_check_block',NULL,$subject,$message,NULL,A_FROM_SYSTEM_PRIVILEGED);
+
+			warn_exit(do_lang_tempcode('STOPPED_BY_ANTISPAM',escape_html($user_ip),escape_html($blockedby)));
+		}
+	}
+
+	// Require approval
+	$spam_approval_threshold=intval(get_option('spam_approval_threshold'));
+	if (intval($confidencelevel*100.0)>=$spam_approval_threshold)
+	{
+		global $SPAM_REMOVE_VALIDATION;
+		$SPAM_REMOVE_VALIDATION=true;
+
+		require_code('notifications');
+		$subject=do_lang('NOTIFICATION_SPAM_CHECK_BLOCK_SUBJECT_APPROVE',$user_ip,$blockedby,NULL,get_site_default_lang());
+		$message=do_lang('NOTIFICATION_SPAM_CHECK_BLOCK_MESSAGE_APPROVE',$user_ip,$blockedby,NULL,get_site_default_lang());
+		dispatch_notification('spam_check_block',NULL,$subject,$message,NULL,A_FROM_SYSTEM_PRIVILEGED);
+	}
+}
+
+/**
+ * Check RBLs to see if we need to block this user.
+ *
+ * @param ?string		Check this particular username that has just been supplied (NULL: none)
+ * @param ?string		Check this particular email address that has just been supplied (NULL: none)
+ */
+function check_stopforumspam($username=NULL,$email=NULL)
+{
+	// http://www.stopforumspam.com/usage
+
+	if (get_option('spam_block_lists')=='') return;
+
+	// Check exclusions
+	$user_ip=get_ip_address();
+	$exclusions=explode(',',get_option('spam_check_exclusions'));
+	foreach ($exclusions as $e)
+	{
+		if (trim($e)==$user_ip) return;
+	}
+
+	// Are we really going to check that username?
+	if (get_option('spam_check_usernames')=='0') $username=NULL;
+	$confidencelevel=mixed();
+
+	// Do the query with every detail we have
+	require_code('files');
+	require_code('character_sets');
+	$key=get_option('stopforumspam_api_key');
+	$url='http://www.stopforumspam.com/api?f=serial&unix&confidence&ip='.urlencode($user_ip);
+	if (!is_null($username)) $url.='&username='.urlencode(convert_to_internal_encoding($username,get_charset(),'utf-8'));
+	if (!is_null($email)) $url.='&email='.urlencode(convert_to_internal_encoding($email,get_charset(),'utf-8'));
+	if ($key!='') $url.='&api_key='.urlencode($key); // Key not needed for read requests, but give it as a courtesy
+	$_result=http_download_file($url,NULL,false);
+
+	$result=@unserialize($_result);
+	if ($result!==false)
+	{
+		if ($result['success'])
+		{
+			foreach (array('username','email','ip') as $criterion)
+			{
+				if (array_key_exists($criterion,$result))
+				{
+					$c=$result[$criterion];
+					if ($c['appears']==1)
+					{
+						$spam_stale_threshold=intval(get_option('spam_stale_threshold'));
+						$days_ago=floatval(time()-intval($c['lastseen']))/(24.0*60.0*60.0);
+						if ($days_ago<=floatval($spam_stale_threshold))
+						{
+							$_confidencelevel=$c['confidence']/100.0;
+							if (($confidencelevel===NULL) || ($_confidencelevel>$confidencelevel))
+							{
+								$confidencelevel=$_confidencelevel;
+							}
+						}
+
+						// NB: frequency figure is ignored, not used in our algorithm
+					}
+				}
+			}
+		} else
+		{
+			require_code('failure');
+			$error=do_lang('_ERROR_CHECKING_FOR_SPAMMERS','stopforumspam.com',$result['error']);
+			relay_error_notification($error,false,'error_occurred');
+		}
+	} else
+	{
+		require_code('failure');
+		$error=do_lang('ERROR_CHECKING_FOR_SPAMMERS','stopforumspam.com');
+		relay_error_notification($error,false,'error_occurred');
+	}
+
+	if ($confidencelevel!==NULL)
+	{
+		handle_perceived_spammer($user_ip,$confidencelevel,'stopforumspam.com',false);
+	}
+}
diff --git a/sources/banners2.php b/sources/banners2.php
index 01bfc0e..c3089e3 100644
--- a/sources/banners2.php
+++ b/sources/banners2.php
@@ -261,8 +261,6 @@ function edit_banner($old_name,$name,$imgurl,$title_text,$caption,$campaignremai
 
 	$_caption=$GLOBALS['SITE_DB']->query_value('banners','caption',array('name'=>$old_name));
 
-	if (!has_specific_permission(get_member(),'bypass_validation_midrange_content','cms_banners')) $validated=0;
-
 	require_code('files2');
 	delete_upload('uploads/banners','banners','img_url','name',$old_name,$imgurl);
 
diff --git a/sources/failure.php b/sources/failure.php
index 2dcc31f..7fd6549 100644
--- a/sources/failure.php
+++ b/sources/failure.php
@@ -11,6 +11,7 @@
    **** If you ignore this advice, then your website upgrades (e.g. for bug fixes) will likely kill your changes ****
 
 */
+/*EXTRA FUNCTIONS: TornUserinfoClass|SoapClient*/
 
 /**
  * @license		http://opensource.org/licenses/cpal_1.0 Common Public Attribution License
@@ -421,11 +422,17 @@ function _log_hack_attack_and_exit($reason,$reason_param_a='',$reason_param_b=''
 			$rows=$GLOBALS['SITE_DB']->query_select('hackattack',array('*'),array('ip'=>$alt_ip?$ip2:$ip));
 			$rows[]=$new_row;
 			$summary='';
+			$is_spammer=false;
 			foreach ($rows as $row)
 			{
+				if ($row['reason']=='LAME_SPAM_HACK') $is_spammer=true;
 				$full_reason=do_lang($row['reason'],$row['reason_param_a'],$row['reason_param_b'],NULL,get_site_default_lang());
 				$summary.="\n".' - '.$full_reason.' ['.$row['url'].']';
 			}
+			if ($is_spammer)
+			{
+				syndicate_spammer_report($alt_ip?$ip2:$ip,is_guest()?'':$GLOBALS['FORUM_DRIVER']->get_username(get_member()),$GLOBALS['FORUM_DRIVER']->get_member_email_address(get_member()),do_lang('SPAM_REPORT_TRIGGERED_SPAM_HEURISTICS'));
+			}
 			add_ip_ban($alt_ip?$ip2:$ip,$full_reason);
 			$_ip_ban_url=build_url(array('page'=>'admin_ipban','type'=>'misc'),get_module_zone('admin_ipban'),NULL,false,false,true);
 			$ip_ban_url=$_ip_ban_url->evaluate();
@@ -468,15 +475,20 @@ function _log_hack_attack_and_exit($reason,$reason_param_a='',$reason_param_b=''
  *
  * @param  IP				The IP address to ban
  * @param  LONG_TEXT		Explanation for ban
+ * @param  ?TIME			When to ban until (NULL: no limit)
+ * @param  boolean		Whether this is a positive ban (as opposed to a cached negative)
  */
-function add_ip_ban($ip,$descrip='')
+function add_ip_ban($ip,$descrip='',$ban_until=NULL,$ban_positive=true)
 {
 	if (!addon_installed('securitylogging')) return;
 
+	require_code('support2');
+	if ((!is_null($ban_until)) && (ip_banned($ip,true))) return; // Don't allow shortening ban period automatically, or having a negative ban negating a positive one!
+
 	$GLOBALS['SITE_DB']->query_delete('usersubmitban_ip',array('ip'=>$ip),'',1);
-	$GLOBALS['SITE_DB']->query_insert('usersubmitban_ip',array('ip'=>$ip,'i_descrip'=>$descrip),false,true); // To stop weird race-like conditions
+	$GLOBALS['SITE_DB']->query_insert('usersubmitban_ip',array('ip'=>$ip,'i_descrip'=>$descrip,'i_ban_until'=>$ban_until,'i_ban_positive'=>$ban_positive?1:0),false,true); // To stop weird race-like conditions
 	persistant_cache_delete('IP_BANS');
-	if (is_writable_wrap(get_file_base().'/.htaccess'))
+	if ((is_writable_wrap(get_file_base().'/.htaccess')) && (is_null($ban_until)))
 	{
 		$original_contents=file_get_contents(get_file_base().'/.htaccess',FILE_TEXT);
 		$ip_cleaned=str_replace('*','',$ip);
@@ -934,7 +946,7 @@ function get_html_trace()
  * Show a helpful access-denied page. Has a login ability if it senses that logging in could curtail the error.
  *
  * @param  ID_TEXT		The class of error (e.g. SPECIFIC_PERMISSION)
- * @param  string			The parameteter given to the error message
+ * @param  string			The parameter given to the error message
  * @param  boolean		Force the user to login (even if perhaps they are logged in already)
  */
 function _access_denied($class,$param,$force_login)
@@ -1009,3 +1021,96 @@ function _access_denied($class,$param,$force_login)
 	warn_exit($message);
 }
 
+/**
+ * Syndicate a spammer report out to wherever we can.
+ *
+ * @param  IP				IP address to report
+ * @param  ID_TEXT		Username address to report
+ * @param  EMAIL			Email address to report
+ * @param  string			The reason for the report (blank: none)
+ * @param  boolean		Whether to throw an ocPortal error, on error. Should not be 'true' for automatic spammer reports, as the spammer should not see the submission process in action!
+ */
+function syndicate_spammer_report($ip_addr,$username,$email,$reason='',$trigger_error=false)
+{
+	$did_something=false;
+
+	// Syndicate to dnsbl.tornevall.org
+	// ================================
+
+	$can_do_torn=(class_exists('SoapClient')) && (get_option('tornevall_api_username')!='');
+
+	if ($can_do_torn)
+	{
+		$torn_url='http://dnsbl.tornevall.org/soap/soapsubmit.php';
+
+		if (!class_exists('TornUserinfoClass'))
+		{
+			class TornUserinfoClass
+			{
+				var $Username;
+				var $Password;
+			}
+		}
+
+		$soapconf=array(
+			'location'=>$torn_url,
+			'uri'=>$torn_url,
+			'trace'=>0,
+			'exceptions'=>0,
+			'connection_timeout'=>0
+		);
+
+		$userinfo=new TornUserinfoClass();
+		$userinfo->Username=get_option('tornevall_api_username');
+		$userinfo->Password=get_option('tornevall_api_password');
+
+		$add=array();
+		$add['ip']=$ip_addr;
+		if ($username!='') $add['username']=$username;
+		if ($email!='') $add['mail']=$email;
+
+		$client=new SoapClient(null,$soapconf);
+		$udata=array('userinfo'=>$userinfo);
+		$result=$client->submit($udata,array('add'=>$add));
+		if ($trigger_error)
+		{
+			if (isset($result['error']))
+			{
+				attach_message('dnsbl.tornevall.org: '.$result['error']['message'],'warn');
+			}
+		}
+
+		$did_something=true;
+	}
+
+	// Syndicate to Stop Forum Spam
+	// ============================
+
+	$stopforumspam_key=get_option('stopforumspam_api_key');
+	$can_do_stopforumspam=($stopforumspam_key!='') && ($username!='') && ($email!='');
+
+	if ($can_do_stopforumspam)
+	{
+		require_code('files');
+		require_code('character_sets');
+		$url='http://www.stopforumspam.com/add.php?api_key='.urlencode($stopforumspam_key).'&ip_addr='.urlencode($ip_addr);
+		if ($username!='') $url.='&username='.urlencode(convert_to_internal_encoding($username,get_charset(),'utf-8'));
+		if ($email!='') $url.='&email='.urlencode(convert_to_internal_encoding($email,get_charset(),'utf-8'));
+		if ($reason!='') $url.='&evidence='.urlencode(convert_to_internal_encoding($reason,get_charset(),'utf-8'));
+		$result=http_download_file($url,NULL,$trigger_error);
+		if (($trigger_error) && ($result!=''))
+		{
+			attach_message($result.' [ '.$url.' ]','warn');
+		}
+
+		$did_something=true;
+	}
+
+	// ---
+
+	// Did we get anything done?
+	if (($trigger_error) && (!$did_something))
+	{
+		attach_message(do_lang('SPAM_REPORT_NO_EMAIL_OR_USERNAME'),'warn');
+	}
+}
diff --git a/sources/feedback.php b/sources/feedback.php
index 6761596..3e7b48d 100644
--- a/sources/feedback.php
+++ b/sources/feedback.php
@@ -928,6 +928,8 @@ function actualise_post_trackback($allow_trackbacks,$content_type,$content_id)
 {
 	if ((get_option('is_on_trackbacks')=='0') || (!$allow_trackbacks)) return false;
 
+	inject_action_spamcheck();
+
 	$url=either_param('url',NULL);
 	if (is_null($url)) return false;
 	$title=either_param('title',$url);
diff --git a/sources/forum/ocf.php b/sources/forum/ocf.php
index aeb17e8..eca5d8d 100644
--- a/sources/forum/ocf.php
+++ b/sources/forum/ocf.php
@@ -1559,9 +1559,10 @@ class forum_driver_ocf extends forum_driver_base
 			{
 				$ip=get_ip_address();
 				require_code('failure');
-				add_ip_ban($ip);
+				add_ip_ban($ip,do_lang('SPAM_REPORT_SITE_FLOODING'));
 				require_code('notifications');
 				dispatch_notification('auto_ban',NULL,do_lang('AUTO_BAN_SUBJECT',$ip,NULL,NULL,get_site_default_lang()),do_lang('AUTO_BAN_DOS_MESSAGE',$ip,integer_format($count_threshold),integer_format($time_threshold),get_site_default_lang()),NULL,A_FROM_SYSTEM_PRIVILEGED);
+				syndicate_spammer_report($ip,is_guest()?'':$GLOBALS['FORUM_DRIVER']->get_username(get_member()),$GLOBALS['FORUM_DRIVER']->get_member_email_address(get_member()),do_lang('SPAM_REPORT_SITE_FLOODING'));
 			}
 			if (!function_exists('require_lang')) require_code('lang');
 			if (!function_exists('do_lang_tempcode')) require_code('tempcode');
diff --git a/sources/global2.php b/sources/global2.php
index 87ec841..c7478b3 100644
--- a/sources/global2.php
+++ b/sources/global2.php
@@ -332,6 +332,7 @@ function init__global2()
 	}
 	require_code('zones'); // Zone is needed because zones are where all ocPortal pages reside
 	require_code('config'); // Config is needed for much active stuff
+
 	if ((get_option('collapse_user_zones',true)==='1') && ($RELATIVE_PATH=='site'))
 	{
 		get_base_url();/*force calculation first*/
@@ -389,6 +390,17 @@ function init__global2()
 
 	@header('Content-type: text/html; charset='.get_charset());
 
+	// Check RBL's
+	$spam_check_level=get_option('spam_check_level',true);
+	if ($spam_check_level==='EVERYTHING')
+	{
+		if (get_option('spam_block_lists')!='')
+		{
+			require_code('antispam');
+			check_rbls(true);
+		}
+	}
+
 	if (($MICRO_AJAX_BOOTUP==0) && ($MICRO_BOOTUP==0))
 	{
 		// Before anything gets outputted
@@ -554,6 +566,15 @@ function init__global2()
 		enter_chat_lobby();
 	}
 
+	// Detect and deal with spammers that triggered the spam blackhole
+	if (get_option('spam_blackhole_detection')=='1')
+	{
+		if (post_param(md5(get_site_name().': antispam'),'')!='')
+		{
+			log_hack_attack_and_exit('LAME_SPAM_HACK','<blackhole>'.post_param(md5(get_site_name().': antispam'),'').'</blackhole>');
+		}
+	}
+
 	// Startup hooks
 	if (!running_script('upgrader'))
 	{
@@ -2141,3 +2162,21 @@ function will_be_unicode_neutered($data)
 	}
 	return true;
 }
+
+/**
+ * Should be called when an action happens that results in content submission. Does a spammer check.
+ *
+ * @param ?string		Check this particular username that has just been supplied (NULL: none)
+ * @param ?string		Check this particular email address that has just been supplied (NULL: none)
+ */
+function inject_action_spamcheck($username=NULL,$email=NULL)
+{
+	// Check RBL's/stopforumspam
+	$spam_check_level=get_option('spam_check_level',true);
+	if (($spam_check_level==='EVERYTHING') || ($spam_check_level==='ACTIONS') || ($spam_check_level==='GUESTACTIONS') && (is_guest()))
+	{
+		require_code('antispam');
+		check_rbls();
+		check_stopforumspam($username,$email);
+	}
+}
diff --git a/sources/hooks/modules/admin_import/ocp_merge.php b/sources/hooks/modules/admin_import/ocp_merge.php
index a58a0e8..fe94352 100644
--- a/sources/hooks/modules/admin_import/ocp_merge.php
+++ b/sources/hooks/modules/admin_import/ocp_merge.php
@@ -1408,7 +1408,7 @@ class Hook_ocp_merge
 		$rows=$db->query('SELECT * FROM '.$table_prefix.'usersubmitban_ip');
 		foreach ($rows as $row)
 		{
-			add_ip_ban($row['ip'],array_key_exists('i_descrip',$row)?$row['i_descrip']:'');
+			add_ip_ban($row['ip'],array_key_exists('i_descrip',$row)?$row['i_descrip']:'',array_key_exists('i_ban_until',$row)?$row['i_ban_until']:NULL,array_key_exists('i_ban_positive',$row)?($row['i_ban_positive']==1):1);
 		}
 		$rows=$db->query('SELECT * FROM '.$table_prefix.'usersubmitban_member');
 		$on_same_msn=($this->on_same_msn($file_base));
diff --git a/sources/hooks/systems/addon_registry/core.php b/sources/hooks/systems/addon_registry/core.php
index f3184e4..ecf6985 100644
--- a/sources/hooks/systems/addon_registry/core.php
+++ b/sources/hooks/systems/addon_registry/core.php
@@ -74,6 +74,8 @@ class Hook_addon_registry_core
 	{
 		return array(
 
+			'sources/antispam.php',
+			'sources/hooks/systems/notifications/spam_check_block.php',
 			'sources/hooks/systems/notifications/low_disk_space.php',
 			'sources/hooks/systems/notifications/hack_attack.php',
 			'sources/hooks/systems/notifications/auto_ban.php',
@@ -860,7 +862,6 @@ class Hook_addon_registry_core
 		return array(
 				'ACTION_LOGS_SCREEN.tpl'=>'administrative__action_logs_screen',
 				'ACTION_LOGS_TOGGLE_LINK.tpl'=>'administrative__action_logs_toggle_link',
-				'IPBAN_SCREEN.tpl'=>'ipban_screen',
 				'LOOKUP_IP_LIST_ENTRY.tpl'=>'administrative__lookup_screen',
 				'LOOKUP_IP_LIST_GROUP.tpl'=>'administrative__lookup_screen',
 				'LOOKUP_SCREEN.tpl'=>'administrative__lookup_screen',
@@ -1015,29 +1016,6 @@ class Hook_addon_registry_core
 	 *
 	 * @return array			Array of previews, each is Tempcode. Normally we have just one preview, but occasionally it is good to test templates are flexible (e.g. if they use IF_EMPTY, we can test with and without blank data).
 	 */
-	function tpl_preview__ipban_screen()
-	{
-		return array(
-			lorem_globalise(
-				do_lorem_template('IPBAN_SCREEN',array(
-					'PING_URL'=>placeholder_url(),
-					'WARNING_DETAILS'=>'',
-					'TITLE'=>lorem_title(),
-					'BANS'=>placeholder_ip(),
-					'URL'=>placeholder_url(),
-						)
-			),NULL,'',true),
-		);
-	}
-
-
-	/**
-	 * Get a preview(s) of a (group of) template(s), as a full standalone piece of HTML in Tempcode format.
-	 * Uses sources/lorem.php functions to place appropriate stock-text. Should not hard-code things, as the code is intended to be declaritive.
-	 * Assumptions: You can assume all Lang/CSS/Javascript files in this addon have been pre-required.
-	 *
-	 * @return array			Array of previews, each is Tempcode. Normally we have just one preview, but occasionally it is good to test templates are flexible (e.g. if they use IF_EMPTY, we can test with and without blank data).
-	 */
 	function tpl_preview__administrative__lookup_screen()
 	{
 		$inner_ip_list	=	new ocp_tempcode();
diff --git a/sources/hooks/systems/addon_registry/securitylogging.php b/sources/hooks/systems/addon_registry/securitylogging.php
index 32f367d..e512eab 100644
--- a/sources/hooks/systems/addon_registry/securitylogging.php
+++ b/sources/hooks/systems/addon_registry/securitylogging.php
@@ -100,6 +100,7 @@ class Hook_addon_registry_securitylogging
 				'SECURITY_SCREEN.tpl'=>'administrative__security_screen',
 				'SECURITY_ALERT_SCREEN.tpl'=>'administrative__security_alert_screen',
 				'HACK_ATTEMPT_MAIL.tpl'=>'administrative__hack_attempt_mail',
+				'IPBAN_SCREEN.tpl'=>'ipban_screen',
 				);
 	}
 
@@ -110,6 +111,29 @@ class Hook_addon_registry_securitylogging
 	 *
 	 * @return array			Array of previews, each is Tempcode. Normally we have just one preview, but occasionally it is good to test templates are flexible (e.g. if they use IF_EMPTY, we can test with and without blank data).
 	 */
+	function tpl_preview__ipban_screen()
+	{
+		return array(
+			lorem_globalise(
+				do_lorem_template('IPBAN_SCREEN',array(
+					'PING_URL'=>placeholder_url(),
+					'WARNING_DETAILS'=>'',
+					'TITLE'=>lorem_title(),
+					'BANS'=>placeholder_ip(),
+					'LOCKED_BANS'=>placeholder_ip(),
+					'URL'=>placeholder_url(),
+						)
+			),NULL,'',true),
+		);
+	}
+
+	/**
+	 * Get a preview(s) of a (group of) template(s), as a full standalone piece of HTML in Tempcode format.
+	 * Uses sources/lorem.php functions to place appropriate stock-text. Should not hard-code things, as the code is intended to be declaritive.
+	 * Assumptions: You can assume all Lang/CSS/Javascript files in this addon have been pre-required.
+	 *
+	 * @return array			Array of previews, each is Tempcode. Normally we have just one preview, but occasionally it is good to test templates are flexible (e.g. if they use IF_EMPTY, we can test with and without blank data).
+	 */
 	function tpl_preview__administrative__hack_attempt_mail()
 	{
 		return array(
diff --git a/sources/hooks/systems/notifications/spam_check_block.php b/sources/hooks/systems/notifications/spam_check_block.php
new file mode 100644
index 0000000..f6116bf
--- /dev/null
+++ b/sources/hooks/systems/notifications/spam_check_block.php
@@ -0,0 +1,42 @@
+<?php /*
+
+ ocPortal
+ Copyright (c) ocProducts, 2004-2012
+
+ See text/EN/licence.txt for full licencing information.
+
+*/
+
+/**
+ * @license		http://opensource.org/licenses/cpal_1.0 Common Public Attribution License
+ * @copyright	ocProducts Ltd
+ * @package		core
+ */
+
+class Hook_Notification_spam_check_block extends Hook_Notification__Staff
+{
+	/**
+	 * Find the initial setting that members have for a notification code (only applies to the member_could_potentially_enable members).
+	 *
+	 * @param  ID_TEXT		Notification code
+	 * @param  ?SHORT_TEXT	The category within the notification code (NULL: none)
+	 * @return integer		Initial setting
+	 */
+	function get_initial_setting($notification_code,$category=NULL)
+	{
+		return A_NA;
+	}
+
+	/**
+	 * Get a list of all the notification codes this hook can handle.
+	 * (Addons can define hooks that handle whole sets of codes, so hooks are written so they can take wide authority)
+	 *
+	 * @return array			List of codes (mapping between code names, and a pair: section and labelling for those codes)
+	 */
+	function list_handled_codes()
+	{
+		$list=array();
+		$list['spam_check_block']=array(do_lang('security:SECURITY'),do_lang('NOTIFICATION_TYPE_spam_check_block'));
+		return $list;
+	}
+}
diff --git a/sources/ocf_join.php b/sources/ocf_join.php
index 879e6a7..aa6e893 100644
--- a/sources/ocf_join.php
+++ b/sources/ocf_join.php
@@ -25,6 +25,15 @@ function check_joining_allowed()
 {
 	if (get_forum_type()!='ocf') warn_exit(do_lang_tempcode('NO_OCF'));
 
+	// Check RBL's/stopforumspam
+	$spam_check_level=get_option('spam_check_level',true);
+	if (($spam_check_level==='EVERYTHING') || ($spam_check_level==='ACTIONS') || ($spam_check_level==='GUESTACTIONS') || ($spam_check_level==='JOINING'))
+	{
+		require_code('antispam');
+		check_rbls();
+		check_stopforumspam();
+	}
+
 	global $LDAP_CONNECTION;
 	if ((!is_null($LDAP_CONNECTION)) && (get_option('ldap_allow_joining',true)==='0'))
 		warn_exit(do_lang_tempcode('JOIN_DISALLOW'));
@@ -280,6 +289,15 @@ function ocf_join_actual($captcha_if_enabled=true,$intro_message_if_enabled=true
 		}
 	}
 
+	// Check RBL's/stopforumspam
+	$spam_check_level=get_option('spam_check_level',true);
+	if (($spam_check_level==='EVERYTHING') || ($spam_check_level==='ACTIONS') || ($spam_check_level==='GUESTACTIONS') || ($spam_check_level==='JOINING'))
+	{
+		require_code('antispam');
+		check_rbls();
+		check_stopforumspam($username,$email_address);
+	}
+
 	if ($captcha_if_enabled)
 	{
 		if (addon_installed('captcha'))
diff --git a/sources/ocf_posts_action.php b/sources/ocf_posts_action.php
index aa9defa..b83fe96 100644
--- a/sources/ocf_posts_action.php
+++ b/sources/ocf_posts_action.php
@@ -105,6 +105,8 @@ function ocf_make_post($topic_id,$title,$post,$skip_sig=0,$is_starter=false,$val
 {
 	if (is_null($poster)) $poster=get_member();
 
+	inject_action_spamcheck($poster_name_if_guest,get_param('email',NULL));
+
 	if ($check_permissions)
 	{
 		if (strlen($title)>120)
diff --git a/sources/permissions.php b/sources/permissions.php
index fbf192a..4d4522e 100644
--- a/sources/permissions.php
+++ b/sources/permissions.php
@@ -48,6 +48,9 @@ function init__permissions()
 	global $PERMISSION_CHECK_LOGGER,$PERMISSIONS_ALREADY_LOGGED;
 	$PERMISSION_CHECK_LOGGER=NULL;
 	$PERMISSIONS_ALREADY_LOGGED=array();
+
+	global $SPAM_REMOVE_VALIDATION;
+	$SPAM_REMOVE_VALIDATION=false;
 }
 
 /**
@@ -518,6 +521,12 @@ function has_specific_permission($member,$permission,$page=NULL,$cats=NULL)
 
 	if ($page===NULL) $page=get_page_name();
 
+	global $SPAM_REMOVE_VALIDATION;
+	if (($SPAM_REMOVE_VALIDATION) && ($member==get_member()) && (($permission=='bypass_validation_highrange_content') || ($permission=='bypass_validation_midrange_content') || ($permission=='bypass_validation_lowrange_content')))
+	{
+		return false;
+	}
+
 	$groups=_get_where_clause_groups($member);
 	if ($groups===NULL) return true;
 
diff --git a/sources/support.php b/sources/support.php
index edf715c..f42fc45 100644
--- a/sources/support.php
+++ b/sources/support.php
@@ -862,10 +862,10 @@ function get_ip_address($amount=4)
 {
 //	return strval(mt_rand(0,255)).'.'.strval(mt_rand(0,255)).'.'.strval(mt_rand(0,255)).'.'.strval(mt_rand(0,255)); // Nice little test for if sessions break
 	
-	$fw=ocp_srv('HTTP_X_FORWARDED_FOR');
+	/*$fw=ocp_srv('HTTP_X_FORWARDED_FOR');	Presents too many security and maintenance problems. Can easily be faked, or changed.
 	if (ocp_srv('HTTP_CLIENT_IP')!='') $fw=ocp_srv('HTTP_CLIENT_IP');
 	if (($fw!='') && ($fw!='127.0.0.1') && (substr($fw,0,8)!='192.168.') && (substr($fw,0,3)!='10.') && (is_valid_ip($fw)) && ($fw!=ocp_srv('SERVER_ADDR'))) $ip=$fw;
-	else $ip=ocp_srv('REMOTE_ADDR');
+	else */$ip=ocp_srv('REMOTE_ADDR');
 	
 	if (!is_valid_ip($ip)) return '';
 
diff --git a/sources/support2.php b/sources/support2.php
index 50e74f2..bc8949f 100644
--- a/sources/support2.php
+++ b/sources/support2.php
@@ -114,12 +114,31 @@ function shuffle_for($by,$in)
  * Check to see if an IP address is banned.
  *
  * @param  string			The IP address to check for banning (potentially encoded with *'s)
- * @return boolean		Whether the IP address is banned
+ * @param  boolean		Force check via database
+ * @param  boolean		Handle uncertainities (used for the external bans - if true, we may return NULL, showing we need to do an external check). Only works with $force_db.
+ * @return ?boolean		Whether the IP address is banned (NULL: unknown)
  */
-function ip_banned($ip) // This is the very first query called, so we will be a bit smarter, checking for errors
+function ip_banned($ip,$force_db=false,$handle_uncertainties=false) // This is the very first query called, so we will be a bit smarter, checking for errors
 {
+	static $cache=array();
+	if ($handle_uncertainties)
+	{
+		if (array_key_exists($ip,$cache)) return $cache[$ip];
+	}
+
 	if (!addon_installed('securitylogging')) return false;
-	
+
+	// Check exclusions first
+	$_exclusions=get_option('spam_check_exclusions',true);
+	if (!is_null($_exclusions))
+	{
+		$exclusions=explode(',',$_exclusions);
+		foreach ($exclusions as $exclusion)
+		{
+			if (trim($ip)==$exclusion) return false;
+		}
+	}
+
 	$ip4=(strpos($ip,'.')!==false);
 	if ($ip4)
 	{
@@ -130,7 +149,7 @@ function ip_banned($ip) // This is the very first query called, so we will be a
 	}
 
 	global $SITE_INFO;
-	if (((isset($SITE_INFO['known_suexec'])) && ($SITE_INFO['known_suexec']=='1')) || (is_writable_wrap(get_file_base().'/.htaccess')))
+	if ((!$force_db) && (((isset($SITE_INFO['known_suexec'])) && ($SITE_INFO['known_suexec']=='1')) || (is_writable_wrap(get_file_base().'/.htaccess'))))
 	{
 		$bans=array();
 		$ban_count=preg_match_all('#\ndeny from (.*)#',file_get_contents(get_file_base().'/.htaccess'),$bans);
@@ -144,7 +163,7 @@ function ip_banned($ip) // This is the very first query called, so we will be a
 		$ip_bans=persistant_cache_get('IP_BANS');
 		if (is_null($ip_bans))
 		{
-			$ip_bans=$GLOBALS['SITE_DB']->query('SELECT ip FROM '.get_table_prefix().'usersubmitban_ip',NULL,NULL,true);
+			$ip_bans=$GLOBALS['SITE_DB']->query('SELECT * FROM '.get_table_prefix().'usersubmitban_ip',NULL,NULL,true);
 			if (!is_null($ip_bans))
 			{
 				persistant_cache_set('IP_BANS',$ip_bans);
@@ -155,6 +174,12 @@ function ip_banned($ip) // This is the very first query called, so we will be a
 	$self_ip=NULL;
 	foreach ($ip_bans as $ban)
 	{
+		if ((!is_null($ban['i_ban_until'])) && ($ban['i_ban_until']<time()))
+		{
+			$GLOBALS['SITE_DB']->query('DELETE FROM '.get_table_prefix().'usersubmitban_ip WHERE i_ban_until IS NOT NULL AND i_ban_until<'.strval(time()));
+			continue;
+		}
+
 		if ((($ip4) && (compare_ip_address_ip4($ban['ip'],$ip_parts))) || ((!$ip4) && (compare_ip_address_ip6($ban['ip'],$ip_parts))))
 		{
 			if (is_null($self_ip))
@@ -173,13 +198,32 @@ function ip_banned($ip) // This is the very first query called, so we will be a
 				}
 			}
 
 			if (($self_ip!='') && (!compare_ip_address($ban['ip'],$self_ip))) continue;
 			if (compare_ip_address($ban['ip'],'127.0.0.1')) continue;
 			if (compare_ip_address($ban['ip'],'fe00:0000:0000:0000:0000:0000:0000:0000')) continue;
-			return true;
+
+			if (array_key_exists('i_ban_positive',$ban))
+			{
+				$ret=($ban['i_ban_positive']==1);
+			} else
+			{
+				$ret=true;
+			}
+
+			if ($handle_uncertainties)
+			{
+				$cache[$ip]=$ret;
+			}
+			return $ret;
 		}
 	}
-	return false;
+
+	$ret=$handle_uncertainties?NULL:false;
+	if ($handle_uncertainties)
+	{
+		$cache[$ip]=$ret;
+	}
+	return $ret;
 }
 
 /**
diff --git a/sources/symbols.php b/sources/symbols.php
index b5f4522..d52de19 100644
--- a/sources/symbols.php
+++ b/sources/symbols.php
@@ -1818,6 +1818,62 @@ function ecv($lang,$escaped,$type,$name,$param)
 				}
 				break;
 
+			case 'INSERT_SPAMMER_BLACKHOLE':
+				if (get_option('spam_blackhole_detection')=='1')
+				{
+					$field_name=md5(get_site_name().': antispam');
+					$value='<div id="'.escape_html($field_name).'_wrap" style="display:none"><label for="'.escape_html($field_name).'">'.do_lang('DO_NOT_FILL_ME_SPAMMER_BLACKHOLE').'</label><input id="'.escape_html($field_name).'" name="'.escape_html($field_name).'" value="" type="text" /></div>';
+					if (!$GLOBALS['SEMI_DEBUG_MODE'])
+						$value.='<script type="text/javascript">// <![CDATA['.chr(10).'var wrap=document.getElementById(\''.escape_html($field_name).'_wrap\'); wrap.parentNode.removeChild(wrap);'.chr(10).'//]]></script>';
+				}
+				break;
+
+			case 'HONEYPOT_LINK':
+				$honeypot_url=get_option('honeypot_url',true);
+				if ($honeypot_url!=='')
+				{
+					$first_char=substr(md5(get_page_name()),0,1);
+					$bot_phrase=get_option('honeypot_phrase');
+					switch ($first_char)
+					{
+						case '0':
+						case '1':
+							$value='<a rel="nofollow" href="'.escape_html($honeypot_url).'"><!-- '.escape_html($bot_phrase).' --></a>';
+							break;
+						case '2':
+						case '3':
+							$value='<a rel="nofollow" href="'.escape_html($honeypot_url).'"><img alt="'.escape_html($bot_phrase).'" src="'.escape_html(find_theme_image('blank')).'" height="1" width="1" border="0"></a>';
+							break;
+						case '4':
+						case '5':
+							$value='<a rel="nofollow" href="'.escape_html($honeypot_url).'" style="display: none;">'.escape_html($bot_phrase).'</a>';
+							break;
+						case '6':
+						case '7':
+							$value='<div style="display: none;"><a rel="nofollow" href="'.escape_html($honeypot_url).'">'.escape_html($bot_phrase).'</a></div>';
+							break;
+						case '8':
+						case '9':
+							$value='<a rel="nofollow" href="'.escape_html($honeypot_url).'"></a>';
+							break;
+						case 'a':
+						case 'b':
+							$value='<!-- <a rel="nofollow" href="'.escape_html($honeypot_url).'">'.escape_html($bot_phrase).'</a> -->';
+							break;
+						case 'c':
+						case 'd':
+							$value='<div style="position: absolute; top: -250px; left: -250px;"><a rel="nofollow" href="'.escape_html($honeypot_url).'">'.escape_html($bot_phrase).'</a></div>';
+							break;
+						case 'e':
+							$value='<a rel="nofollow" href="'.escape_html($honeypot_url).'"><span style="display: none;">'.escape_html($bot_phrase).'</span></a>';
+							break;
+						case 'f':
+							$value='<a rel="nofollow" href="'.escape_html($honeypot_url).'"><div style="height: 0px; width: 0px;"></div></a>';
+							break;
+					}
+				}
+				break;
+
 			case 'MAILTO':
 				require_code('obfuscate');
 
diff --git a/themes/default/templates/ACTION_LOGS_TOGGLE_LINK.tpl b/themes/default/templates/ACTION_LOGS_TOGGLE_LINK.tpl
index 6b5d610..21ee666 100755
--- a/themes/default/templates/ACTION_LOGS_TOGGLE_LINK.tpl
+++ b/themes/default/templates/ACTION_LOGS_TOGGLE_LINK.tpl
@@ -1 +1 @@
- &ndash; <form title="{!TOGGLE}" class="inline" action="{URL*}" method="post"><input class="buttonhyperlink" type="submit" value="{!TOGGLE}" /></form>
+ <span class="associated_details">[<form title="{!TOGGLE}" class="inline" action="{URL*}" method="post"><input class="buttonhyperlink" type="submit" value="{+START,IF_PASSED,LABEL}{LABEL*}{+END}{+START,IF_NON_PASSED,LABEL}{!TOGGLE}{+END}" /></form>]</span>
diff --git a/themes/default/templates/BLOCK_MAIN_NEWSLETTER_SIGNUP.tpl b/themes/default/templates/BLOCK_MAIN_NEWSLETTER_SIGNUP.tpl
index 536f2a6..f0f27d7 100644
--- a/themes/default/templates/BLOCK_MAIN_NEWSLETTER_SIGNUP.tpl
+++ b/themes/default/templates/BLOCK_MAIN_NEWSLETTER_SIGNUP.tpl
@@ -5,6 +5,8 @@
 
 {+START,BOX,{!NEWSLETTER}{$?,{$NEQ,{NEWSLETTER_TITLE},{!GENERAL}},: {NEWSLETTER_TITLE*}},,{$?,{$GET,in_panel},panel,classic}}
 	<form title="{!NEWSLETTER}" onsubmit="if ((checkFieldForBlankness(this.elements['address'],event)) &amp;&amp; (this.elements['address{NID*}'].value.match(/^[a-zA-Z0-9\._\-\+]+@[a-zA-Z0-9\._\-]+$/))) { disable_button_just_clicked(this); return true; } window.fauxmodal_alert('{!NOT_A_EMAIL;=*}'); return false;" action="{URL*}" method="post">
+		{$INSERT_SPAMMER_BLACKHOLE}
+
 		<p class="accessibility_hidden"><label for="baddress">{!EMAIL_ADDRESS}</label></p>
 
 		<div class="constrain_field">
diff --git a/themes/default/templates/CATALOGUE_ADDING_SCREEN.tpl b/themes/default/templates/CATALOGUE_ADDING_SCREEN.tpl
index 52e13a8..df4b9ce 100644
--- a/themes/default/templates/CATALOGUE_ADDING_SCREEN.tpl
+++ b/themes/default/templates/CATALOGUE_ADDING_SCREEN.tpl
@@ -5,6 +5,8 @@
 <div class="required_field_warning"><span class="required_star">*</span> {!REQUIRED}</div>
 
 <form title="{!PRIMARY_PAGE_FORM}" method="post" action="{URL*}" target="_top">
+	{$INSERT_SPAMMER_BLACKHOLE}
+
 	<div>
 		{HIDDEN}
 	
diff --git a/themes/default/templates/CHAT_SCREEN.tpl b/themes/default/templates/CHAT_SCREEN.tpl
index 63bdeff..5891922 100755
--- a/themes/default/templates/CHAT_SCREEN.tpl
+++ b/themes/default/templates/CHAT_SCREEN.tpl
@@ -9,6 +9,8 @@
 <div class="float_surrounder chat_posting_area">
 	<div style="float: {!en_left};">
 		<form title="{!MESSAGE}" action="{MESSAGES_PHP*}?action=post&amp;room_id={ROOM_ID*}" method="post" style="display: inline;">
+			{$INSERT_SPAMMER_BLACKHOLE}
+
 			<div style="display: inline;">
 				<p class="accessibility_hidden"><label for="post">{!MESSAGE}</label></p>
 				<textarea style="font-family: {FONT_NAME_DEFAULT*;}" class="input_text_required"{+START,IF,{$NOT,{$MOBILE}}} onkeyup="manageScrollHeight(this);"{+END} onkeypress="if (enter_pressed(event)) return chat_post(event,{ROOM_ID*},'post',document.getElementById('font_name').options[document.getElementById('font_name').selectedIndex].value,document.getElementById('text_colour').value); return true;" id="post" name="message" onfocus="if (typeof window.picker_node!='undefined') picker_node.style.visibility='hidden';" cols="{$?,{$MOBILE},37,39}" rows="1"></textarea>
diff --git a/themes/default/templates/COMMENTS_POSTING_FORM.tpl b/themes/default/templates/COMMENTS_POSTING_FORM.tpl
index e25eec1..f0cfb4d 100644
--- a/themes/default/templates/COMMENTS_POSTING_FORM.tpl
+++ b/themes/default/templates/COMMENTS_POSTING_FORM.tpl
@@ -1,6 +1,7 @@
 {+START,IF_NON_EMPTY,{COMMENT_URL}}
 <form{$?,{$VALUE_OPTION,html5}, role="form"} title="{TITLE*}" id="comments_form" onsubmit="return ({+START,IF_PASSED,MORE_URL}(this.getAttribute('action')=='{MORE_URL*}') || {+END}(checkFieldForBlankness(this.elements['post'],event)){+START,IF,{$AND,{GET_EMAIL},{$NOT,{EMAIL_OPTIONAL}}}} &amp;&amp; (checkFieldForBlankness(this.elements['email'],event)){+END});" action="{COMMENT_URL*}{+START,IF_PASSED,COMMENTS}#last_comment{+END}" method="post" enctype="multipart/form-data">
-<input type="hidden" name="_comment_form_post" value="1" />
+	{$INSERT_SPAMMER_BLACKHOLE}
+	<input type="hidden" name="_comment_form_post" value="1" />
 {+END}
 
 	<input type="hidden" name="_validated" value="1" />
diff --git a/themes/default/templates/FOOTER.tpl b/themes/default/templates/FOOTER.tpl
index 81cc429..8d2630c 100644
--- a/themes/default/templates/FOOTER.tpl
+++ b/themes/default/templates/FOOTER.tpl
@@ -73,6 +73,7 @@
 				{+START,IF,{$CONFIG_OPTION,bottom_show_feedback_link}}<a rel="site_contact" accesskey="9" href="{$PAGE_LINK*,:feedback}{+START,IF,{$NOT,{$IN_STR,{$PAGE_LINK,:feedback},?}}}?{+END}{+START,IF,{$NOT,{$NOT,{$IN_STR,{$PAGE_LINK,:feedback},?}}}}&amp;{+END}redirect={$SELF_URL*&,1}">{!FEEDBACK}</a> <span class="linkcolor">&middot;</span>{+END}
 				{+START,IF,{$CONFIG_OPTION,mobile_support}}{+START,IF,{$MOBILE,1}}<a href="{$SELF_URL*,1,0,0,keep_mobile=0}">{!NONMOBILE_VERSION}</a>{+END}{+START,IF,{$NOT,{$MOBILE,1}}}<a href="{$SELF_URL*,1,0,0,keep_mobile=1}">{!MOBILE_VERSION}</a>{+END} <span class="linkcolor">&middot;</span>{+END}
 				{+START,IF,{$NOR,{$IS_HTTPAUTH_LOGIN},{$IS_GUEST}}}<form title="{!LOGOUT}" class="inline" method="post" action="{$PAGE_LINK*,:login:logout}"><input class="buttonhyperlink" type="submit" title="{!_LOGOUT,{$USERNAME*}}" value="{!LOGOUT}" /></form>{+END}{+START,IF,{$OR,{$IS_HTTPAUTH_LOGIN},{$IS_GUEST}}}<a href="{$PAGE_LINK*,:login:{$?,{$NOR,{$GET,login_screen},{$EQ,{$ZONE}:{$PAGE},:login}},redirect={$SELF_URL*&,1}}}">{!_LOGIN}</a>{+END}
+				{$HONEYPOT_LINK}
 
 				{+START,IF,{$AND,{$NOT,{$_GET,keep_has_js}},{$JS_ON}}}
 					<noscript>&middot; <a href="{$SELF_URL*,1,0,1}&amp;keep_has_js=0">{!MARK_JAVASCRIPT_DISABLED}</a></noscript>
diff --git a/themes/default/templates/FORM.tpl b/themes/default/templates/FORM.tpl
index 099b2fb..3b8a1ab 100644
--- a/themes/default/templates/FORM.tpl
+++ b/themes/default/templates/FORM.tpl
@@ -12,6 +12,8 @@
 
 {$JAVASCRIPT_INCLUDE,javascript_validation}
 <form title="{!PRIMARY_PAGE_FORM}" {+START,IF_PASSED,TARGET}target="{TARGET*}" {+END} {+START,IF_NON_PASSED,GET}method="post" action="{URL*}"{+START,IF,{$IN_STR,{FIELDS},"file"}} enctype="multipart/form-data"{+END}{+END}{+START,IF_PASSED,GET}method="get" action="{$URL_FOR_GET_FORM*,{URL}}"{+END} {+START,IF_NON_PASSED,TARGET}target="_top" {+END}{+START,IF_PASSED,AUTOCOMPLETE}{+START,IF,{AUTOCOMPLETE}}class="autocomplete" {+END}{+END}>
+	{+START,IF_NON_PASSED,GET}{$INSERT_SPAMMER_BLACKHOLE}{+END}
+
 	{+START,IF_PASSED,GET}{$HIDDENS_FOR_GET_FORM,{URL}}{+END}
 
 	{+START,IF_PASSED,SKIPPABLE}
diff --git a/themes/default/templates/FORM_GROUPED.tpl b/themes/default/templates/FORM_GROUPED.tpl
index 7a9fb1d..a270637 100755
--- a/themes/default/templates/FORM_GROUPED.tpl
+++ b/themes/default/templates/FORM_GROUPED.tpl
@@ -4,6 +4,8 @@
 
 {$JAVASCRIPT_INCLUDE,javascript_validation}
 <form title="{!PRIMARY_PAGE_FORM}" {+START,IF_NON_PASSED,GET}method="post" action="{URL*}"{+START,IF,{$IN_STR,{FIELD_GROUPS},"file"}} enctype="multipart/form-data"{+END}{+END}{+START,IF_PASSED,GET}method="get" action="{$URL_FOR_GET_FORM*,{URL}}"{+END} target="_top" {+START,IF_PASSED,AUTOCOMPLETE}{+START,IF,{AUTOCOMPLETE}}class="autocomplete" {+END}{+END}>
+	{+START,IF_NON_PASSED,GET}{$INSERT_SPAMMER_BLACKHOLE}{+END}
+
 	{+START,IF_PASSED,GET}{$HIDDENS_FOR_GET_FORM,{URL}}{+END}
 
 	<div>
diff --git a/themes/default/templates/FORM_SCREEN.tpl b/themes/default/templates/FORM_SCREEN.tpl
index 7eea9d8..1f27d8c 100644
--- a/themes/default/templates/FORM_SCREEN.tpl
+++ b/themes/default/templates/FORM_SCREEN.tpl
@@ -18,10 +18,14 @@
 {$JAVASCRIPT_INCLUDE,javascript_validation}
 {+START,IF_NON_PASSED,IFRAME_URL}
 <form title="{!PRIMARY_PAGE_FORM}" id="main_form" {+START,IF_NON_PASSED,GET}method="post" action="{URL*}"{+START,IF,{$IN_STR,{FIELDS},"file"}} enctype="multipart/form-data"{+END}{+END}{+START,IF_PASSED,GET}method="get" action="{$URL_FOR_GET_FORM*,{URL}}"{+END} {+START,IF_PASSED,TARGET}target="{TARGET*}" {+END}{+START,IF_NON_PASSED,TARGET}target="_top" {+END}{+START,IF_PASSED,AUTOCOMPLETE}{+START,IF,{AUTOCOMPLETE}}class="autocomplete" {+END}{+END}>
+	{+START,IF_NON_PASSED,GET}{$INSERT_SPAMMER_BLACKHOLE}{+END}
+
 	{+START,IF_PASSED,GET}{$HIDDENS_FOR_GET_FORM,{URL}}{+END}
 {+END}
 {+START,IF_PASSED,IFRAME_URL}
 <form title="{!PRIMARY_PAGE_FORM}" id="main_form" {+START,IF_NON_PASSED,GET}method="post" action="{IFRAME_URL*}"{+START,IF,{$IN_STR,{FIELDS},"file"}} enctype="multipart/form-data"{+END}{+END}{+START,IF_PASSED,GET}method="get" action="{$URL_FOR_GET_FORM*,{IFRAME_URL}}"{+END} target="iframe_under" {+START,IF_PASSED,AUTOCOMPLETE}{+START,IF,{AUTOCOMPLETE}}class="autocomplete" {+END}{+END}>
+	{$INSERT_SPAMMER_BLACKHOLE}
+
 	{+START,IF_PASSED,GET}{$HIDDENS_FOR_GET_FORM,{IFRAME_URL}}{+END}
 {+END}
 
diff --git a/themes/default/templates/IPBAN_SCREEN.tpl b/themes/default/templates/IPBAN_SCREEN.tpl
index 18494c6..b16b308 100755
--- a/themes/default/templates/IPBAN_SCREEN.tpl
+++ b/themes/default/templates/IPBAN_SCREEN.tpl
@@ -10,14 +10,23 @@
 	{!DESCRIPTION_BANNED_ADDRESSES_B}
 </p>
 
+<br />
+
 <form title="{!PRIMARY_PAGE_FORM}" action="{URL*}" method="post">
-	<div>
+	<p>
 		<label for="bans" class="field_name">{!BANNED_ADDRESSES}:</label>
-	</div>
+	</p>
 	<div class="constrain_field">
 		<textarea cols="30" rows="14" class="wide_field textarea_scroll" id="bans" name="bans">{BANS*}</textarea>
 	</div>
 
+	<p>
+		<label for="locked_bans" class="field_name">{!EXTERNALLY_BANNED_ADDRESSES}:</label>
+	</p>
+	<div class="constrain_field">
+		<textarea readonly="readonly" cols="30" rows="14" class="wide_field textarea_scroll" id="locked_bans" name="locked_bans">{LOCKED_BANS*}</textarea>
+	</div>
+
 	<div class="proceed_button">
 		<input accesskey="u" onclick="disable_button_just_clicked(this);" class="button_page" type="submit" value="{!SAVE}" />
 	</div>
diff --git a/themes/default/templates/LOOKUP_SCREEN.tpl b/themes/default/templates/LOOKUP_SCREEN.tpl
index 09e930b..16d831e 100755
--- a/themes/default/templates/LOOKUP_SCREEN.tpl
+++ b/themes/default/templates/LOOKUP_SCREEN.tpl
@@ -2,7 +2,7 @@
 
 <h2>{!DETAILS}</h2>
 
-<div class="wide_table_wrap"><table summary="{!MAP_TABLE}" class="solidborder wide_table">
+<div class="wide_table_wrap"><table summary="{!MAP_TABLE}" class="solidborder wide_table spaced_table">
 	<colgroup>
 		<col style="width: 140px" />
 		<col style="width: 100%" />
@@ -17,14 +17,30 @@
 	<tr>
 		<th>{!MEMBER_ID}</th>
 		<td>
-			#<strong>{ID*}</strong> &nbsp;&nbsp;&nbsp;&nbsp; <em>{!MEMBER_BANNED}: {MEMBER_BANNED*}</em>{+START,IF_PASSED,MEMBER_BAN_LINK} {MEMBER_BAN_LINK}{+END} &nbsp;&nbsp;&nbsp;&nbsp; <em>{!SUBMITTER_BANNED}: {SUBMITTER_BANNED*}</em>{+START,IF_PASSED,SUBMITTER_BAN_LINK} {SUBMITTER_BAN_LINK}{+END}
+			#<strong>{ID*}</strong><br />
+
+			<div class="mini_indent">
+				<em>{!MEMBER_BANNED}, {$LCASE,{MEMBER_BANNED*}}</em>{+START,IF_PASSED,MEMBER_BAN_LINK} {MEMBER_BAN_LINK}{+END}<br />
+				<em>{!SUBMITTER_BANNED}, {$LCASE,{SUBMITTER_BANNED*}}</em>{+START,IF_PASSED,SUBMITTER_BAN_LINK} {SUBMITTER_BAN_LINK}{+END}
+			</div>
 		</td>
 	</tr>
 {+END}
 {+START,IF_NON_EMPTY,{IP}}
 	<tr>
 		<th>{!IP_ADDRESS}</th>
-		<td><strong>{IP*}</strong> &nbsp;&nbsp;&nbsp;&nbsp; <em>{!_BANNED}: {IP_BANNED*}</em>{+START,IF_PASSED,IP_BAN_LINK} {IP_BAN_LINK}{+END}</td>
+		<td>
+			<strong>{IP*}</strong><br />
+
+			<div class="mini_indent">
+				<em>{!_BANNED}, {$LCASE,{IP_BANNED*}}</em>{+START,IF_PASSED,IP_BAN_LINK} {IP_BAN_LINK}{+END}
+
+				{+START,IF_NON_EMPTY,{$CONFIG_OPTION,stopforumspam_api_key}{$CONFIG_OPTION,tornevall_api_username}}
+					<br />
+					<span class="associated_details">[<a href="{$PAGE_LINK*,_SEARCH:admin_actionlog:syndicate_ip_ban:ip={IP}:member_id={ID}:redirect={$SELF_URL&}}">{!SYNDICATE_TO_STOPFORUMSPAM}</a>]</span>
+				{+END}
+			</div>
+		</td>
 	</tr>
 {+END}
 	<tr>
@@ -80,7 +96,7 @@
 	</p>
 {+END}
 
-<h2>{!_VIEWS}</h2>
+<h2>{!_VIEWS} ({!IP_ADDRESS})</h2>
 
 {STATS}
 
diff --git a/themes/default/templates/POLL.tpl b/themes/default/templates/POLL.tpl
index 2e9b9fc..7bef039 100755
--- a/themes/default/templates/POLL.tpl
+++ b/themes/default/templates/POLL.tpl
@@ -3,6 +3,8 @@
 
 	<a name="poll_jump" id="poll_jump" rel="dovote"></a>
 	<form title="{!VOTE}" target="_self" action="{VOTE_URL*}" method="post" class="poll_form">
+		{$INSERT_SPAMMER_BLACKHOLE}
+
 		<div>
 			{CONTENT}
 		</div>
diff --git a/themes/default/templates/POSTING_FORM.tpl b/themes/default/templates/POSTING_FORM.tpl
index 8ca6c0c..89493a0 100644
--- a/themes/default/templates/POSTING_FORM.tpl
+++ b/themes/default/templates/POSTING_FORM.tpl
@@ -3,6 +3,8 @@
 {+END}
 
 <form title="{!PRIMARY_PAGE_FORM}" id="posting_form" method="post" enctype="multipart/form-data" action="{URL*}" {+START,IF_PASSED,AUTOCOMPLETE}{+START,IF,{AUTOCOMPLETE}}class="autocomplete" {+END}{+END}>
+	{$INSERT_SPAMMER_BLACKHOLE}
+
 	<div>
 		{+START,IF_PASSED,DEFAULT_PARSED}
 		<textarea cols="1" rows="1" style="display: none" readonly="readonly" name="post_parsed">{DEFAULT_PARSED*}</textarea>
diff --git a/themes/default/templates/RATING_FORM.tpl b/themes/default/templates/RATING_FORM.tpl
index a1feff8..dc2579b 100644
--- a/themes/default/templates/RATING_FORM.tpl
+++ b/themes/default/templates/RATING_FORM.tpl
@@ -2,6 +2,7 @@
 	{+START,IF,{$OR,{$JS_ON},{$NOT,{$GET,block_embedded_forms}}}}
 		{+START,IF,{$NOT,{$GET,block_embedded_forms}}}
 		<form title="{!RATE}" onsubmit="if (this.elements[0].selectedIndex==0) { window.fauxmodal_alert('{!IMPROPERLY_FILLED_IN=;}'); return false; } else return true;" action="{URL*}" method="post">
+			{$INSERT_SPAMMER_BLACKHOLE}
 		{+END}
 			{+START,LOOP,ALL_RATING_CRITERIA}
 				<a name="rating__{CONTENT_TYPE*}__{TYPE*}__{ID*}_jump" id="rating__{CONTENT_TYPE*}__{TYPE*}__{ID*}_jump" rel="dorating"></a>
diff --git a/themes/default/templates/VIEW_SPACE_SCREEN.tpl b/themes/default/templates/VIEW_SPACE_SCREEN.tpl
index 02dd975..36e1e85 100755
--- a/themes/default/templates/VIEW_SPACE_SCREEN.tpl
+++ b/themes/default/templates/VIEW_SPACE_SCREEN.tpl
@@ -4,7 +4,7 @@
 	<p>{TEXT*}</p>
 {+END}
 
-<div class="wide_table_wrap"><table summary="{!MAP_TABLE}" class="wide_table solidborder">
+<div class="wide_table_wrap"><table summary="{!MAP_TABLE}" class="wide_table solidborder spaced_table">
 	{+START,IF,{$NOT,{$MOBILE}}}
 		<colgroup>
 			<col style="width: 300px" />
antispam.patch (93,486 bytes)   
Time estimation (hours)3
Sponsorship open

Sponsor

Date Added Member Amount Sponsored

Activities

Guest

2011-10-09 13:55

reporter   ~213

I think it would be better to lookup IP/Username/Email and flag with option to block user (or quarantine with option to allow user).

Guest

2011-10-10 23:40

reporter   ~216

This should check both at member registration and for each post.

Guest

2011-10-11 00:55

reporter   ~217

@Bobs: Most spammer databases contain only IP numbers, Email addresses, and user names. if you are checking for spammers at registration time, most likely you won't have any getting the chance to make posts.

A better spam filter would be needed for post submission checking. Perhaps something that would allow admins to enter the new word violation directly from the post.

Guest

2011-10-11 01:12

reporter   ~218

I'm thinking of the situation where the above information is used to register and then the registration lays idle for a period of time. Checking again at time of post would catch those situations although I guess you could also employ member ranks with appropriate permissions to catch most of this stuff.

Guest

2011-10-11 01:54

reporter   ~219

Last edited: 2011-10-11 01:56

View 2 revisions

I understand what you are thinking about. The extra queries at post submission would put a lot of added traffic on the database website especially if you have a busy forum. Most spammers make it into the database after they have done a lot of spamming and flagging and quarantining them at registration would keep them from making any posts.

The mod I used on the old SMF allowed you to check any/all members against the database at anytime and at registration time.

Guest

2011-12-30 22:06

reporter   ~294

what i can see in this that what we can do is add block and module for maxmind...
or a other services. that will auto look up ISP/IP/and if they are spammers or not.. in this module it will also have block for sign up with captcha that will auto match with there real IP and not proxy IP... this can or will help to save you time... it will also stop from the posting on your site and forums and there Sig.. please note that maxmind is not free.. but they do have free sign up to get you started. any questions?

Guest

2012-03-21 03:46

reporter   ~370

I have been using the Cloudflare service which has support built-in for anti-spam and other threats, They use the Project Honeypot service to issue a challenge-response. All unsuccessful challenges are left in quarantine for permanent disposition or they can be left there indefinitely. I really like this system which has caught a lot of threats I would have otherwise missed just checking a spammer database.

I think it would be worthwhile seeing if you could build this service based on Project Honeypot with the possible inclusion of a honeypot to catch and report spammers back to the project. They have fairly demanding requirements to work with them (in order to protect their assets) but it might be worth looking into.

Guest

2012-04-06 05:07

reporter   ~374

API info for Project Honey Pot's Http:BL

https://www.projecthoneypot.org/httpbl_api.php

Chris Graham

2012-04-16 22:34

administrator   ~389

"Most spammer databases contain only IP numbers, Email addresses, and user names"

As far as I can tell, it is only IP numbers. Do you know of one that does email addresses and user names? I suspect that'd be a privacy issue actually.

Chris Graham

2012-04-16 22:37

administrator   ~390

I am seeing some discussion here about checking at registration, or at posting. From my perspective I think it should be both. Both these things are relatively rare compared to page views, and checks are not awfully complex things.

I note a popular HTTP:BL implementation checks on every page view and apparently still has great performance (I think it probably relies on the server's DNS caching for that, as the checks happen via DNS).

Chris Graham

2012-04-16 23:11

administrator   ~391

NB: Also see discussion topic http://compo.sr/forum/topicview/misc/deploying/sponsorship-for-feature_2.htm

sholzy

2012-04-16 23:51

developer   ~392

"Most spammer databases contain only IP numbers, Email addresses, and user names"

"As far as I can tell, it is only IP numbers. Do you know of one that does email addresses and user names? I suspect that'd be a privacy issue actually."

This is the mod I was using for my SMF based forum: http://custom.simplemachines.org/mods/index.php?mod=1547
It did an excellent job of weeding out the spammers. That mod pulls from the StopForumSpam database.

Here is a short list:
http://www.stopforumspam.com/
http://www.fspamlist.com/
http://www.spambusted.com/

Other resources:
http://akismet.com/development/api/
http://www.anatoa.com/
http://www.block-disposable-email.com/
http://blogspam.net/api/
http://www.easyantispam.com/wiki/api:home
http://spamid.servebeer.com:8081/spamid/spamid/apis.jsp
http://blocklistpro.com/
http://dnsbl.tornevall.org/

sholzy

2012-04-17 00:13

developer   ~393

"I am seeing some discussion here about checking at registration, or at posting. From my perspective I think it should be both. Both these things are relatively rare compared to page views, and checks are not awfully complex things."

You need to watch out for a maximum amount of free queries from these databases. Some of these databases have a limit on the number of queries per day. Checking at post time may not seem like much, but when you have 100's or 1000's of forums querying a database at each post it could create an extra load on the database provider that the provider may not be happy about. Most of these databases are provided free of charge as a service to forum administrators.

If you are stopping them at registration time, they will not get the chance to create a spam post. If by chance you do get a spam post, more than likely that poster is using a new ip/email/username that was never on a database to begin with and you will most likely will miss catching them at post time. A spammer can make many posts on different forums before they are caught and reported, providing they are even reported.

A busy forum should have active moderators catching the very few spammers that will slip through past detection.

Guest

2012-04-17 01:00

reporter   ~395

"You need to watch out for a maximum amount of free queries from these databases. Some of these databases have a limit on the number of queries per day. Checking at post time may not seem like much, but when you have 100's or 1000's of forums querying a database at each post it could create an extra load on the database provider that the provider may not be happy about. Most of these databases are provided free of charge as a service to forum administrators."

This is an advantage for Project Honey Pot/HTTP:BL which, to my knowledge, does not impose a quota although they do encourage high-traffic sites to download the BL to their DNS servers and keep them synced.

I agree that whatever automated solutions are developed, manual moderation is still a requirement but, hopefully, with a much smaller number of issues.

Chris Graham

2012-04-18 19:08

administrator   ~405

Ok so this is currently being implemented, 60% done so far.

However before I forget I want to mention that this is going to do a DB version jump of one of the core modules, so when the patch is released it'll be necessary to run a database upgrade in the upgrader.

This code is not going to be in v8. A patch will be released for v8, for people wanting to try it ahead of whenever is released (v9?). This is as per new policy - feature sponsorship results in supported patches for the latest version at the patch construction time, and the code is added to Composr's unstable branch, but does release roadmaps are unaffected.

Chris Graham

2012-04-18 19:09

administrator   ~406

"This is an advantage for Project Honey Pot/HTTP:BL which, to my knowledge, does not impose a quota although they do encourage high-traffic sites to download the BL to their DNS servers and keep them synced.". There'll be an option controlling when it happens. stopwebspam will never run for all page views, but RBL checks will be able to.

Chris Graham

2012-04-18 19:10

administrator   ~407

Btw, thanks sholzy, as you may have noticed your notes were incorporated into the plans.

Chris Graham

2012-04-19 09:38

administrator   ~408

Code written. Code Quality Checker passed. Test set written (but not ran through yet)...


"Spammer checking level": "Every page view", really does run RBL checks on each page view
"Spammer checking level": "Every page view", does not run Stop Web Spam checks on each page view
"Spammer checking level": "Every page view", does run Stop Web Spam checks on posting
"Spammer checking level": "Actions", really does run Stop Web Spam checks on posting as a member
"Spammer checking level": "Guest Actions", really does run Stop Web Spam checks on posting as a Guest
"Spammer checking level": "Guest Actions", really does run Stop Web Spam checks on joining
"Spammer checking level": "Never", really does not run RBL checks on joining
"Spammer checking level": "Never", really does not run Stop Web Spam checks on joining
RBL check works for tornevall, with a confidence equal to the "Implied spammer confidence" option
RBL check works for HTTP:BL with a correct confidence level (HTTP:BL needs setting up in config first, with a key)
If an invalid RBL is configured,it does not kill Composr, but it does send an error notification
If an RBL check bans a spammer, it is only for as long as the configured "Block list cache time"
If an IP is in "Spammer checking exclusions", it is not checked against RBLs
If an IP is in "Spammer checking exclusions", it is not checked against Stop Web Spam
If an IP is in "Spammer checking exclusions", any existing IP bans for it will be ignored
HTTP:BL bans over the "Spammer ban threshold" result in bans
Bans result in appropriate ban notifications indicating the reason and IP
HTTP:BL bans over the "Spammer block threshold" but less than "Spammer ban threshold" result in blocks
Blocks result in appropriate block notifications indicating the reason and IP
HTTP:BL bans over the "Spammer approval threshold" but less than "Spammer block threshold" result in content requiring approval, even for an admin
Approval-requires result in appropriate approval notifications indicating the reason and IP
Stop Web Spam results older than "Spammer staleness threshold" but above an action threshold do not result in any action
Stop Web Spam results newer than "Spammer staleness threshold" but above an action threshold do result in any action
If "Honeypot URL" is configured, honeypots are correctly advertised
If "Honeypot URL" is configured, honeypot URL injection methods are different on different pages, but are constant on each particular page
If the "Check usernames against known spammers" option is enabled then known Stop Web Spam usernames will be blocked on joining
If the "Check usernames against known spammers" option is enabled then known Stop Web Spam usernames will not blocked on joining
Stop Web Spam email addresses will be blocked on joining
If a service request to Stop Web Spam fails, an error notification is sent
If "Blackhole detection" is enabled, fiddling with browser developer tools to fill up the blackhole will result in a hack-attack alert
If "Blackhole detection" is enabled, NOT fiddling with browser developer tools to fill up the blackhole will NOT result in a hack-attack alert
The Blackhole is marked up so as not to be visible
The Blackhole is marked up so as someone with a screenreader would not accidentally fill it in
Ban syndication not available from the action log if no key provided
Ban syndication works from the action log
Ban syndication not available from investigate user if no key provided
Ban syndication works from investigate user
Ban syndication not available from punish member if no key provided
Ban syndication works from punish member
IP ban management correctly shows the temporary bans, with all the details required (including IP, expiry time, and block reason) but they are uneditable directly
When saving IP ban management, temporary bans are not wiped
Marking a trackback as spam results in ban syndication
"Scattergun link injection" spam (detected spam that creates a hack-attack in Composr) results in ban syndication
The privacy policy mentions spam checks, if not set to 'Never'
The privacy policy does not mention spam checks, if set to 'Never'

Chris Graham

2012-04-19 10:13

administrator   ~409

Uploaded an image of the config options. As you can see, we now have some serious power, and a new USP for Composr :).

sholzy

2012-04-19 10:25

developer   ~410

"Btw, thanks sholzy, as you may have noticed your notes were incorporated into the plans."

Welcome. :-)
I might not have been able to help sponsor this monetarily, but I was able to help sponsor in another way -- sharing my knowledge from research.

sholzy

2012-04-19 10:41

developer   ~411

I may need to unblock the Punjab region spammers (182.178.*.*, 110.36.*.*, 182.177.*.*) to try out this mod. They were the only real problem I had after moving the old SMF forum to Composr.

Guest

2012-04-19 13:31

reporter   ~412

In the image and the description, there is reference to Stop Web Spam. Is this supposed to be Stop Forum Spam or is this something different?

Chris Graham

2012-04-19 13:33

administrator   ~413

Good catch :).

sholzy

2012-04-19 14:16

developer   ~414

I saw that and was thinking Chris added a new feature - a spam filter for the whole internet. ;-)

Chris Graham

2012-04-19 15:04

administrator   ~415

Somewhat irritatingly, Stop Forum Spam API submission requires all of IP address, username, and password. So therefore is not suitable for automated submission of detected Guest spammers.

http://www.stopforumspam.com/forum/viewtopic.php?id=2256

So Tornevall API support will also be there. We support tornevall RBL already, so that means we both can feed off and into this.

HOWEVER! It requires PHP to have the SoapClient installed, and I'm also not sure how readily they give out API keys. You have to email to ask for access and I'm still awaiting mine.

Guest

2012-04-19 15:32

reporter   ~416

This is one of the reasons that I like HTTP: BL (and probably others) as they seem anxious to identify potential threats and start reporting on them. As much as I like all the new features, I will continue using CloudFront to catch the most egregious scoundrels, plus it provides for efficient blocking by country. This will produce a nice "funnel" where IPs let through are challenged using a separate system (stopforumspam) which parallels what I currently do manually.

I can sort of see where StopForumSpa is coming from — they want to be a spammer database only. I just question whether that is a good long-term strategy.

Chris Graham

2012-04-19 16:15

administrator   ~417

Done! Well, my time estimate was off by a factor of 4, but I did a good job ;).

Chris Graham

2012-04-19 16:21

administrator   ~418

Before I forget to mention, the patch I post will be compatible with the next v8 RC. I found a few small v8 bugs whilst doing this, and those will be fixed in there (if I put them into the patch, it'll create conflicts later).

Chris Graham

2012-04-19 16:26

administrator   ~419

Actually, ignore that. I'm going to post the patch now, and the above statement is true. However I will roll in the handful of v8 RC5 fixes to the zip I attach later on today.

In theory the attached zip will be fine with v8-final as well as v8 RC6, as we are so close to release now.

Chris Graham

2012-04-20 20:10

administrator   ~421

And ignore that again - as RC6 is coming out now, this will be require RC6.

Issue History

Date Modified Username Field Change