Link to home
Start Free TrialLog in
Avatar of ChanYiuPong
ChanYiuPong

asked on

Deny from

when I looked at the access log, I saw from time to time something like this
218.254.54.240 - - [20/Mar/2005:11:07:18 +0800] "SEARCH
/\x90\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\......

what is this, some kind of attack ?  

I tried place the "Deny from " lines in the httpd.conf, but do not know why, still one or two such IP can pas thru. How do I stop this kind of attack from messing up my access log.
Avatar of caterham_www
caterham_www
Flag of Germany image

where did you place the deny from? Dou you have also some "Allow from" in your httpd.conf?

But if access is blocked, you'll find a log entry with the status code 403 like

127.0.0.1 - - [19/Mar/2005:17:54:38 +0200] "HEAD /..... HTTP/1.0" 403 - "-" "-"
in your access log
Avatar of ChanYiuPong
ChanYiuPong

ASKER

HIi caterham,

I have the line inside the doucment root
I have
  Order allow,deny
  Allow from all
before the line

never seen the status code 403 before in the access log, do you mean the error log ?
Caterham_www is right, It will be in the access log.

An easier way to fight this kind of abuse is to put in your httpd.conf

AllowOverride Limit

And just maintain an .htaccess file inside the websites root directory with

Deny from 192.156.24.34
Deny from 23.45.34.235

and so on in the .htaccess

pmrussell892,

will try on that, let's see how it goes for 1 day.  Is there any other way to block such attack rather than until the IP is shown in the log. It seem to be of a pattern but unluckily it is from a lot of different IPs.
If it is from a block of identivcal ip addresses you can block that range of ip

EX:

From

23.45.234.45
23.45.234.44
23.45.234.46

you could put

Deny from 23.45.234.

or if the first two match up on all
you could put just the first two

23.45

BUT you must be careful while doing this as you may end up blocking legitimate users.

It may be extra work but i find it better to just put the exact ip of the abusers so as to not block legit users.

This may also just be homework or some script kiddy looking for an easy target.

Here are some security tools you should be running to check for an actual breach of security.
 
AIDE http://www.cs.tut.fi/~rammer/aide.html or
Tripwire http://www.tripwire.org/

And  

chkrootk http://www.chkrootkit.org  is  a good one for checking for activity of a root kit being setup.

Armed with these security tools you should be able to detect if your server has been hacked or if it is just noise.

hope some of this helps.
Unluckily I am using apache on windows platform, so the tools cannot be used. I have changed the .htaccess to htaccess format to cop and it is functioning, at least in 8 hours only 1 of such is found.
ASKER CERTIFIED SOLUTION
Avatar of modulo
modulo

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial