Forum Moderators: phranque
Web Server
Apache Version 1.3.27
Operating System
Linux Redhat Version 7.3 (Valhalla)
but don't worry, there should be a lot more of these entries if you really are an OpenProxy
If you cannot unload proxy modules try to use Limit directive
Limit GET, POST, HEAD -> Allow from all
Limit except GET, POST, HEAD -> Deny from all
find in the apache manual correct syntax
The limit directive, Is that for my .htaccess, and if so, how do I know if I have it right? Will I see a 403 or a 405?
For servers with proxy enabled outside of my control, I use something like this in .htaccess:
# Block unsupported HTTP methods
RewriteCond %{REQUEST_METHOD} !^(GET¦HEAD¦POST¦OPTIONS¦TRACE)$
RewriteRule .* - [F]
#
# Block attempts to use our server as a proxy, but allow absolute URIs
RewriteCond %{THE_REQUEST} ^(GET¦HEAD¦POST)\ /?http:// [NC]
RewriteCond %{THE_REQUEST} !^(GET¦HEAD¦POST)\ /?http://(www\.)?example\.com/ [NC]
RewriteRule .* - [F]
This assumes you've already got
Options +FollowSymLinks
RewriteEngine on
Jim
which IP? XX.XXX.240.11? That's was false info from them.
> The 200 meant they were successful in viewing the site with a spoofed IP.
No, that's also false, I belive the sniffer got the content of your own site, the next number after 200 is the size of the reply. 10kB is a typical www page. Since 1.3.3.7 is not answering the 10kB comes from your www.
> They also said it was perfectly harmless.
Being OpenProxy? Wow. That's a was a disinterest from their side. Have they checked if you OP or not?
you can do:
telnet your_ip 80
CONNECT 1.3.3.7:1337 HTTP/1.0 [2xEnter here]
and see for yourself what your serwer will return.
> Are there any characters I need to change because of ww format?
Yes. There is a solid pipe sign, for eg. bettween GET and HEAD in jdMorgan post.
> Is there any way someone could use this, or some other method, to hijack cgi-script form submissions?
that's a subject for 1000 pages of book concerning security. Yes, sniffers often look for insecure formmail scripts. But CONNECT and formail doesn't mix.
> Where does this go in relation to my 'order deny,allow', or is it important?
jdMorgan code does the same thing and a little more than Limit directive "with differend words"
2) As Msr. Lemat said, the broken pipes "¦" need to be edited to make them solid pipes.
3) This exploit has more to do with someone using your server to surf, download, and send e-mail anonymously, while using your bandwidth to do it. If they use an automated agent, then they could run up your bandwidth bill very quickly.
4) Not a movie-quotes expert...
Jim
for the movie title you have all the info necessary [google.com] too.