> I'll reply soon off list, as I don't think it appropriate to give > potential spammers an archive full of new tricks. I don't know -- I think its always better to discuss this in the open if there is a real security risk that people should be aware of. A couple days after your posting to PHP-General, I saw the same kind of probe on my system: <begin clueless code> Content-Type: multipart/mixed; boundary="===============0493326424==" MIME-Version: 1.0 Subject: c3b8e7fc To: wmlhlk@xxxxxxxx bcc: bergkoch8@xxxxxxx From: wmlhlk@xxxxxxxx This is a multi-part message in MIME format. --===============0493326424== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit awhvtr --===============0493326424==-- </end clueless code> This was submitted through a simple web contact form with a message, subject, and body form fields. The hakor submitted the above as the body of the message 3-4 times than seemed to give up (although he did send a few obnoxious threats). I don't believe this did anything because 1) I never got a bounce message from the made-up address he attempted to send to ("wmlhlk@xxxxxxxx") 2) I believe that since the mail function already sent out the headers, any subsequent "headers" would just be ignored. Or they would be treated as text since they occurred in the message portion and not parsed literally. Not sure that there is any risk here, but I'm shrouding my contact script (changing the form variables and script name to something less obvious) just in case. - Greg -- PHP General Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php