public inbox for gentoo-user@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-user] Apache security tips
@ 2006-03-11  1:59 Jim
  2006-03-11  5:00 ` Willie Wong
  0 siblings, 1 reply; 5+ messages in thread
From: Jim @ 2006-03-11  1:59 UTC (permalink / raw
  To: gentoo-user

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hey group,

I was wondering if anyone has some easy to do tips for checking the
security of Apache.  I am running Apache/2.0.55.  Is apache good with
handling bad URL's?  I remember with an IIS server I use to have I
needed to install a url filter to help it out.  I noticed that I get
requests like the following in my apache log:

70.121.133.60 - - [07/Mar/2006:21:31:05 -0500] "SEARCH
/\x90\xc9\xc9\xc9\xc9\xc9\

The above is one line and it is 30,000 characters long in the log file.

Thanks for any tips,

Jim
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEEi7teqJ5Vbm4CxYRAjt0AJ9tVjVWHQ2H9OzBVhxGkqbhL5vizQCfSVPo
B/IHirSOHB3Xr4izkO48Rug=
=ubVq
-----END PGP SIGNATURE-----
-- 
gentoo-user@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [gentoo-user] Apache security tips
  2006-03-11  1:59 [gentoo-user] Apache security tips Jim
@ 2006-03-11  5:00 ` Willie Wong
  2006-03-11  7:27   ` Michael Stewart (vericgar)
  2006-03-11 18:19   ` Jim
  0 siblings, 2 replies; 5+ messages in thread
From: Willie Wong @ 2006-03-11  5:00 UTC (permalink / raw
  To: gentoo-user

On Fri, Mar 10, 2006 at 08:59:09PM -0500, Penguin Lover Jim squawked:
> I was wondering if anyone has some easy to do tips for checking the
> security of Apache.  I am running Apache/2.0.55.  Is apache good with
> handling bad URL's?  I remember with an IIS server I use to have I
> needed to install a url filter to help it out.  I noticed that I get
> requests like the following in my apache log:
> 
> 70.121.133.60 - - [07/Mar/2006:21:31:05 -0500] "SEARCH
> /\x90\xc9\xc9\xc9\xc9\xc9\
> 
> The above is one line and it is 30,000 characters long in the log file.
> 

Near the end of that line should be the HTTP return code Apache gave
for that request. What is it? 

On my box it always returns 414 (Request-URI too long), so I doubt it
would be a problem, beyond a major annoyance when going through the
logs with 'less'. 

A URI string like that is almost certainly a client trying to exploit
a buffer overflow. I've never seen it being a problem with my
(limited) experience running apache. 

HTH,

W
-- 
You're not paranoid.
The world _IS_ fucked.
Sortir en Pantoufles: up 118 days, 21:18
-- 
gentoo-user@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [gentoo-user] Apache security tips
  2006-03-11  5:00 ` Willie Wong
@ 2006-03-11  7:27   ` Michael Stewart (vericgar)
  2006-03-11 19:39     ` Jim
  2006-03-11 18:19   ` Jim
  1 sibling, 1 reply; 5+ messages in thread
From: Michael Stewart (vericgar) @ 2006-03-11  7:27 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 913 bytes --]

Willie Wong wrote:
> On Fri, Mar 10, 2006 at 08:59:09PM -0500, Penguin Lover Jim squawked:
> 
>>I was wondering if anyone has some easy to do tips for checking the
>>security of Apache.  I am running Apache/2.0.55.  Is apache good with
>>handling bad URL's?  I remember with an IIS server I use to have I
>>needed to install a url filter to help it out.  I noticed that I get
>>requests like the following in my apache log:
>>
>>70.121.133.60 - - [07/Mar/2006:21:31:05 -0500] "SEARCH
>>/\x90\xc9\xc9\xc9\xc9\xc9\
>>
>>The above is one line and it is 30,000 characters long in the log file.
>>

You may want to look into mod_security for apache as well. IIRC it is
designed to protect from such attacks.


-- 
Michael Stewart                                     vericgar@gentoo.org
Gentoo Developer                        http://dev.gentoo.org/~vericgar

GnuPG Key ID 0x08614788 available on http://pgp.mit.edu
--

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 256 bytes --]

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [gentoo-user] Apache security tips
  2006-03-11  5:00 ` Willie Wong
  2006-03-11  7:27   ` Michael Stewart (vericgar)
@ 2006-03-11 18:19   ` Jim
  1 sibling, 0 replies; 5+ messages in thread
From: Jim @ 2006-03-11 18:19 UTC (permalink / raw
  To: gentoo-user

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 159610784 Willie Wong <wwong@Princeton.EDU> wrote:
> On Fri, Mar 10, 2006 at 08:59:09PM -0500, Penguin Lover Jim squawked:
>> I was wondering if anyone has some easy to do tips for checking the
>> security of Apache.  I am running Apache/2.0.55.  Is apache good with
>> handling bad URL's?  I remember with an IIS server I use to have I
>> needed to install a url filter to help it out.  I noticed that I get
>> requests like the following in my apache log:
>>
>> 70.121.133.60 - - [07/Mar/2006:21:31:05 -0500] "SEARCH
>> /\x90\xc9\xc9\xc9\xc9\xc9\
>>
>> The above is one line and it is 30,000 characters long in the log file.
>>
> 
> Near the end of that line should be the HTTP return code Apache gave
> for that request. What is it? 
> 
> On my box it always returns 414 (Request-URI too long), so I doubt it
> would be a problem, beyond a major annoyance when going through the
> logs with 'less'. 
> 
> A URI string like that is almost certainly a client trying to exploit
> a buffer overflow. I've never seen it being a problem with my
> (limited) experience running apache. 
> 
> HTH,
> 
> W

I have not see it be a problem either, Apache returned the same code for
me.  I noticed it because I get "errors" from webalizer like:

Error: Skipping oversized log record

It is not a big deal.  I just wanted to make sure I have apache locked
down OK.

The long entries look like someone trying to hack into IIS with requests
for exe files.

Thanks for the info,

Jim
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEExSdeqJ5Vbm4CxYRAqgdAJ0YYDqFV8cAtf6IXGEOLMjuTLAH4QCcDyE4
/F0PCKAW/x6OB5O6foHYA6A=
=ukRJ
-----END PGP SIGNATURE-----
-- 
gentoo-user@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [gentoo-user] Apache security tips
  2006-03-11  7:27   ` Michael Stewart (vericgar)
@ 2006-03-11 19:39     ` Jim
  0 siblings, 0 replies; 5+ messages in thread
From: Jim @ 2006-03-11 19:39 UTC (permalink / raw
  To: gentoo-user

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 159600160 "Michael Stewart (vericgar)" <vericgar@gentoo.org> wrote:
> You may want to look into mod_security for apache as well. IIRC it is
> designed to protect from such attacks.

Thanks for the tip.  I will give mod_security a try.

Jim
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEEyeEeqJ5Vbm4CxYRAvvtAJ9YQ9cZYUW4VkVc9w55vHg166snhQCfUP1k
w7zGfSfyktK0Fj3vl+0JkYk=
=PaNp
-----END PGP SIGNATURE-----
-- 
gentoo-user@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2006-03-11 19:46 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-03-11  1:59 [gentoo-user] Apache security tips Jim
2006-03-11  5:00 ` Willie Wong
2006-03-11  7:27   ` Michael Stewart (vericgar)
2006-03-11 19:39     ` Jim
2006-03-11 18:19   ` Jim

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox