Jump to content

Jim M

Invision Community Team
  • Posts

  • Joined

  • Last visited

  • Days Won


 Content Type 


Release Notes

IPS4 Guides

IPS4 Developer Documentation

Invision Community Blog

Development Blog

Deprecation Tracker

Providers Directory





Everything posted by Jim M

  1. At a basic level, we are not seeing any direct logs, errors, brute force attempts, etc... The user in question logged straight in which can only be done with having the credentials. The email on the most recent user which you banned also has had passwords exposed from different other, non-IPS websites. Which is why we're asking for further examples of why you believe it to be an issue with the software. It isn't pointing that way but of course, if you have further information, we're happy to explore it. Also, what Randy is stating here, they would not just attack normal members hold no importance significance to the community who can be deleted/banned/etc.... They would want to do more damage, gain more exposure, etc...
  2. As mentioned, please provide an example and we'd be happy to investigate further your particular case. However, what we have seen on your website is not a breach on your community or in our software but we're happy, of course, to confirm that with a specific example user.
  3. Please be advised I have split this off for you to the Feedback forum.
  4. As Randy, us, and others mentioned several times through these conversations, spam is a walk of life on the internet and odds are you will never be able to 100% combat it. It also comes in cycles. Points that are high, turn to lows as people adapt spam measures and combat spam accounts or our spam defense grows aware of individuals, etc... However, our methods posted here will make it significantly less annoying and to a degree remove it from being a daily hassle. As Randy mentioned, we take significant measures with each release to ensure that we release the best software possible to our customers. We have mentioned several times in this topic that we're happy to look at what you're seeing but we have not gotten a specific example. We have, however, looked at a recent example of a banned member and they have compromised email/password combinations from other websites around the web (non-IPS) so that would explain how a malicious-intended spammer could gain access directly, with no brute force. If this is not an active member, banning them, as you've done, is the right measure. If it is an active member, you may wish to change their password and contact them. However, it could be that the spammer/attacker has access to their email inbox so be mindful of that. If you would like us to take another look at another example or have a further complex example than just a username, please feel free to us the Contact Us form at the bottom of each page and we'll be happy to take a look.
  5. While I understand what you're stating here, I would advise putting in a suggestion in the Feedback forum. As this is the support forum, there is very little from a standpoint of support we can do to assist as currently, it is not supported.
  6. Unfortunately, I do not see that you have seen all measures taken. Unfortunately, without an example, we cannot review that. However, I looked at the user who you just recently banned in your administrator log, and they have indeed been a part of a data breach of non-IPS sites. You can use https://haveibeenpwned.com/ to check their email and see if their password(s) have been exposed from other website breaches.
  7. webp is not a supported extension of the Gallery by default.
  8. These images are .webp extensions. Our software, by default, does not support these as embedded images in content. They appear as downloaded files. If you're using a third-party service/application to convert these, you would need to work with them to assist you here.
  9. Keep in mind that we only support Amazon S3. Using another service's S3 may not work completely as intended as their API may be just slightly different and cause different results/issues. If you use any CDN or other server caching services, you will also want to clear these after doing a move of this magnitude. The current page is rendering a 500 Internal Server Error so I cannot access it currently.
  10. You can make a test installation of your community for you and your staff to test by appending -TESTINSTALL to the end of your license key. You can read more about it here:
  11. Thank you. I have reported what you mentioned here to our developers. However, I am unable to reproduce the exact error which has been originally reported. Therefore, we cannot guarantee this will resolve the OPs issue without access to their instance.
  12. ACP > Members > Force password reset
  13. Keep in mind that the biggest hole in any authentication/identity system is the human using it. Odds are that if that user setup several accounts around the internet with the same credentials, their email is more than likely also to be one of those. Your solution may solve the issue in some cases but odds are likely not in its favor. As the attacker, likely has access to their email as well. Which is why using a non-email source, like a Two Factor Authentication code generation with a cell phone app, is generally more secure. As an attacker obtaining access to that 2FA source is harder. The best case, would have been requiring it from the start of any community. That’s not always possible but the good news, you can require 2FA starting today and any new members or members who login will have it implemented. You can also use the logout all members and change password requirements to ensure that users need to reset their password prior to logging in again. In conjunction with requirements around password difficulty, this will help hopefully change passwords for your users. However, if you feel strongly about the code generating link to an email to login, you’re more than welcome to suggest that in our Feedback forum for further evaluation.
  14. A while back, we created a notifications area in for ACP items like this. You will want to check your configuration in ACP -> Notification bell -> Notification Settings. Please note that these settings are independent for each administrator so everyone will need to configure them how they would like.
  15. Please see what I have quoted from Marc, who posted above you, in response to the individual replying to your topic here. Again, it does not sound like our application was compromised but if you have specific details, please send them in a response to the accounts inbox at the Contact Us form at the bottom of each page.
  16. You will want to disable plugins and switch to an unmodified theme to see if the issue is still present. If it is not, enable each one by one again to see if it comes back. If you run into the error again, you will want to contact the author of the plugin/theme for assistance. As the warning indicates, this may be a sign of a plugin or theme is out of date. It does not confirm it is. There are specific functions which are guarded with a CSRF protection key. In those cases, the software is functioning as it should as your CSRF protection key does not match the key which the process generated.
  17. You will want to do the following Spam Prevention items mentioned in this guide: https://invisioncommunity.com/4guides/security-and-rules/spam-prevention-r9/ Looking at your registration form, you are still using CAPTCHA2. You will want to switch to hCAPTCHA to prevent more automated spam bots. Check that your Spam Defense is configured correctly for our services in ACP -> Members -> Spam Prevention. Configure the Flag as Spammer option to be used by you and your administrator/moderator teams to quickly remove spam posts and ban spammers. You will also want to rotate your Question and Answer challenges frequently and ensure that they are things which you are target audience knows but is not easily Googled. This will prevent spam human users from registering. If you are seeing spammers from a certain country that your community does not serve, you can also block them in ACP -> Members -> Spam Prevention -> Geolocation Settings. Finally, if you believe spammers are gaining access to accounts through means of exposed credentials from the dark web. Enabling and requiring Two Factor Authentication will help prevent that. Outside of the items mentioned above, the next steps would be to take moderation action. Require your base member group to have 1 or more posts approved by a moderator prior to them showing up to the rest of your community without being moderated. Use the automated moderation tools so that if a post is reported x times as spam, the system will automatically hide it for your team to review. If any spammers do get through, be sure to use the Flag as Spammer option as that will report it to our system and help your fellow administrators. I will say that no 1 spam prevention method will be 100%. However, hopefully, with all the above, it should cut enough down that you are able to not just wake up to a bunch of spam posts that plague your community. If you deploy the moderation techniques, you will not have your community publicly plagued by spammers. Unfortunately, in the event that a spammer has dormant account(s) on your site and they have already surpassed an acceptable amount of posts (I say acceptable as some may be borderline that your moderation team may still allow) to bypass the moderation queue, the only thing that will help are successful moderation practices by humans and staying vigilant about the future with the above.
  18. It would not prevent the page from showing, no.
  19. You would want to contact your hosting provider or server administrator to ensure that you are properly logging errors.
  20. I'm afraid, this is not a security issue. However, it is a case of spammers trying to sneak under the radar and access counts they've setup in the past.. Keep in mind that a spammer can reset a password to an account if they have access to the email address tied to the account.
  21. This would indicate that you're hitting a server resource issue. It may be the file you're attempting to send is too large and you're hitting a timeout, it could be the server simply can't process it, etc... Only your hosting provider would be able to inform you what that is if there is nothing in your logs related to this request/resource consumption. This is not related to the process here. This is stating that someone tried to access that directory on your webserver but there is no index file to serve them.
  22. I don't believe this is something which we provide and if one is not provided, typically the email service would cover that. Like in an example I just sent through Amazon SES, SES provided the Message-ID header for me as I did not supply it. I have tagged this to a developer to confirm.
  23. CloudFlare Pro has managed firewall rules and improved bot filtering. You would need to review it. I'm afraid, it is outside our scope of support so you would need to contact CloudFlare if you have any questions.
  24. That would be dependent on your server capabilities. If you are unsure, you will want to have your hosting provider or server administrator run that query via the command line.
  25. A blank page is the sign of a suppressed PHP error, you will want to obtain the logs from your server error log for further details on what the issue is.
  • Create New...