Solved What's up with not being able to post simple replies?

It's more likely to be bots that they set up rather than actual people sitting there doing the posting.

It would be cleverer if you could whitelist internal links (www.access-programmers.co.uk/...) from the blocker though.

We often ask new posters not to tack on to old threads but start a new one and post a link back to the old one as reference - that gets the generic 'Oops!'
I'm going back a few years for that observation about teams of people. There may have been bots involved, but someone was keeping track of accounts set up for spamming. I suppose once the set up accounts were in place they could then automate the spamming. Gnarly Bastids they are.
 
They often use a well knowing spamming bit of software called Xrumer. It automates everything.
 
My previous response has disappeared so let me try one more time. As before, I was entering plain text in a new thread. Here is a copy from my Notepad:View attachment 119247

What in here is deserving of being blocked?
Probably the ldap that looks like a URL
Not that I'm defending it of course it's ridiculous that you're being blocked
 
OK, so it seems as if it is purely dependent on finding ://

Trying explicitly:
View attachment 119271
results in:
View attachment 119272

Whereas simply doing:
View attachment 119273
is OK:
View attachment 119274

Using a resource but without completing the double forward slash is also OK:
View attachment 119275
The post goes through:
View attachment 119276

Curiously, getting the colon and slashes back to front also triggers the blocker:
View attachment 119277
like so:
View attachment 119278


So, @HavingDatabaseRelations, it really isn't anything personal against you - it's a PITA for everyone!
Correct: The use of "://" is there to trap the urls and that would cause the Oops. There is not much we can do about that if we want to stop spammers dropping links.

Edit: It would be nice if the software had some method of informing the user what the issue was, although some would argue that doing so informs the spammers what to avoid and hence prefer to keept it opaque.
 
Last edited:
Still not sure why you can't whitelist links back to AWF.
Here is the admin section that blocks certain phrases. No facilities to whitelist anything. What you see is just part of the phrases targeted.

1744789903454.png
 
Here is the admin section that blocks certain phrases. No facilities to whitelist anything.
The first line looks like a Regular Expression to me. If this is correct, it should be possible to rewrite the "*//*" line to something that does not match links back to this site but every other occurrence of "//".
 
There is also "//".
 
There is an addon for this but it costs $45.
 
Not sure what relevance that does bear.

It appears, it is possible to use RegExps to only reject links to other sites.
Here is a thread in the Xenforo community showing examples: https://xenforo.com/community/threads/spam-phrases-to-detect-external-links-moderate.199113/
Nice find. I ran it through ChatGPT and it suggests it will work, despite the poster on the end of that thread saying it doesn't.
I'm not sure of the implications because I put "//" in there because some spammers might have this kind of thing in their posts:

http: // myspamsite.com

I suppose it all depends on the frequency of that.
 
Still not sure why you can't whitelist links back to AWF.

The question is whether Xenforo SUPPORTS the concept of a whitelist. If Jon's list shows exclusion filters rather than specific blacklist entries (which is what I see by context), then you would be asking for an anti-filter(?). I don't know if you can do that.
 
There is an addon for this but it costs $45.
I guess that might be the one I mentioned in Post #12

I thought if you were already using such an addon then you may have missed the whitelist capability - but now we know you're not using one.

All these always come with extra wallet pressure 😖
 
I did miss that addon because I use dark theme and the links don't show up unless you hover over them. Long story why that is the case now. And I will have to remove that link because it goes to a website for pirate software.

There is no budget for any addons anymore. Post-Covid, advertising revenue for the site is now a tiny fraction of what it was and so the only direction I am looking at is downgrading the hosting costs.
 
Something like this should get you quite far:
Code:
/(([http|ftp|file|mailto|imap|tel|ldap]s?):\/\/(?!(www.)?access-programmers.co.uk)[\w\.\/\-=?#]+)/i
(based on the pattern in Philipp's link)
I think it certainly deserves a test, don't you?
 
I think it certainly deserves a test, don't you?
The only problem is that it won't match straight urls's like www.spamsite.com - the offending text needs to include the protocol and ://

Whether that is a real issue, I don't know. It depends on at which point the spam filter runs the check.

Does it occur after whatever other forum code has run to turn what it sees as a url into an actual html link? In which case it doesn't matter as the protocol will have been added.

If not (which I suspect is the case) then extra checks will be required and may override the above pattern anyway.

I was limited for time yesterday, so only did quick testing. RegExp is a dark art to me where I am never really certain that the pattern will do exactly what I want!

If I have time later I will look at seeing if I can improve it.
 
New members are not able to post links.

Out of interest how long until a user can post links? I think it is a good measure & is required, quite frustrating sometimes, I'm 50 or so posts in & still unable to link :eek:.
 

Users who are viewing this thread

Back
Top Bottom