Forum Moderators: phranque

Message Too Old, No Replies

Unusual (to me) entries in the access_log

         

gardinerdm

4:17 pm on Nov 18, 2005 (gmt 0)

10+ Year Member



ww.#*$!.yyy.zzz - - [xx/Nov/2005:xx:xx:xx -0500] "CONNECT mx2.#*$!.com:25 HTTP/1.0" 200 25682 "-" "-"
ww.xxx.yyy.zzz - - [xx/Nov/2005:xx:xx:xx -0500] "POST http://ww.xxx.yyy.zzz:25/ HTTP/1.1" 200 25691 "-" "-"

This is two lines from my access_log... These were the only two lines from this IP and there has been no other activity from this IP. In the 2nd line the POST after the word POST the originating IP was included before the :25 - I'm curious as to what was being attempted. Has anyone seen this behaviour before?

gardinerdm

6:59 pm on Nov 18, 2005 (gmt 0)

10+ Year Member



I found this document [dsbl.org] from dsbl.org with regard to my own post...

Was this person successful in relaying mail via my server? If so, how do configure Apache to keep this kind of exploit from being successful?

I suspect by restricting access to the CONNECT and POST methods but will I lose some functionality?

jdMorgan

8:55 pm on Nov 18, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



gardinerdm,

Welcome to WebmasterWorld!

Yes, he was successful -- Expect more soon.

I see this behaviour attempted all the time, but I block it and return a 403-Forbidden response.

Restricting the CONNECT method using <LIMIT>, mod_access and mod_setenvif, or mod_rewrite will solve this particular problem.

If you use forms on your site, then you cannot restrict the POST method without breking them. But blocking CONNECT will be sufficient, anyway.

Jim

gardinerdm

9:57 pm on Nov 18, 2005 (gmt 0)

10+ Year Member



Thanks Jim,

I added the fol to my .htaccess file

<LimitExcept POST GET>
Require valid-user
</LimitExcept>

this, if I'm not mistaken, should limit anonymous users to POST and GET - which is fine for me...

I tried using the same code in httpd.conf but the server would not start where I had it...

Thanks again...

Dan