mod-security-users Mailing List for ModSecurity (Page 556)
Brought to you by:
victorhora,
zimmerletw
You can subscribe to this list here.
| 2003 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
(17) |
Aug
(7) |
Sep
(8) |
Oct
(11) |
Nov
(14) |
Dec
(19) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2004 |
Jan
(46) |
Feb
(14) |
Mar
(20) |
Apr
(48) |
May
(15) |
Jun
(20) |
Jul
(36) |
Aug
(24) |
Sep
(31) |
Oct
(28) |
Nov
(23) |
Dec
(12) |
| 2005 |
Jan
(69) |
Feb
(61) |
Mar
(82) |
Apr
(53) |
May
(26) |
Jun
(71) |
Jul
(27) |
Aug
(52) |
Sep
(28) |
Oct
(49) |
Nov
(104) |
Dec
(74) |
| 2006 |
Jan
(61) |
Feb
(148) |
Mar
(82) |
Apr
(139) |
May
(65) |
Jun
(116) |
Jul
(92) |
Aug
(101) |
Sep
(84) |
Oct
(103) |
Nov
(174) |
Dec
(102) |
| 2007 |
Jan
(166) |
Feb
(161) |
Mar
(181) |
Apr
(152) |
May
(192) |
Jun
(250) |
Jul
(127) |
Aug
(165) |
Sep
(97) |
Oct
(135) |
Nov
(206) |
Dec
(56) |
| 2008 |
Jan
(160) |
Feb
(135) |
Mar
(98) |
Apr
(89) |
May
(115) |
Jun
(95) |
Jul
(188) |
Aug
(167) |
Sep
(153) |
Oct
(84) |
Nov
(82) |
Dec
(85) |
| 2009 |
Jan
(139) |
Feb
(133) |
Mar
(128) |
Apr
(105) |
May
(135) |
Jun
(79) |
Jul
(92) |
Aug
(134) |
Sep
(73) |
Oct
(112) |
Nov
(159) |
Dec
(80) |
| 2010 |
Jan
(100) |
Feb
(116) |
Mar
(130) |
Apr
(59) |
May
(88) |
Jun
(59) |
Jul
(69) |
Aug
(67) |
Sep
(82) |
Oct
(76) |
Nov
(59) |
Dec
(34) |
| 2011 |
Jan
(84) |
Feb
(74) |
Mar
(81) |
Apr
(94) |
May
(188) |
Jun
(72) |
Jul
(118) |
Aug
(109) |
Sep
(111) |
Oct
(80) |
Nov
(51) |
Dec
(44) |
| 2012 |
Jan
(80) |
Feb
(123) |
Mar
(46) |
Apr
(12) |
May
(40) |
Jun
(62) |
Jul
(95) |
Aug
(66) |
Sep
(65) |
Oct
(53) |
Nov
(42) |
Dec
(60) |
| 2013 |
Jan
(96) |
Feb
(96) |
Mar
(108) |
Apr
(72) |
May
(115) |
Jun
(111) |
Jul
(114) |
Aug
(87) |
Sep
(93) |
Oct
(97) |
Nov
(104) |
Dec
(82) |
| 2014 |
Jan
(96) |
Feb
(77) |
Mar
(71) |
Apr
(40) |
May
(48) |
Jun
(78) |
Jul
(54) |
Aug
(44) |
Sep
(58) |
Oct
(79) |
Nov
(51) |
Dec
(52) |
| 2015 |
Jan
(55) |
Feb
(59) |
Mar
(48) |
Apr
(40) |
May
(45) |
Jun
(63) |
Jul
(36) |
Aug
(49) |
Sep
(35) |
Oct
(58) |
Nov
(21) |
Dec
(47) |
| 2016 |
Jan
(35) |
Feb
(81) |
Mar
(43) |
Apr
(41) |
May
(77) |
Jun
(52) |
Jul
(39) |
Aug
(34) |
Sep
(107) |
Oct
(67) |
Nov
(54) |
Dec
(20) |
| 2017 |
Jan
(99) |
Feb
(37) |
Mar
(86) |
Apr
(47) |
May
(57) |
Jun
(55) |
Jul
(34) |
Aug
(31) |
Sep
(16) |
Oct
(49) |
Nov
(53) |
Dec
(33) |
| 2018 |
Jan
(25) |
Feb
(11) |
Mar
(79) |
Apr
(77) |
May
(5) |
Jun
(19) |
Jul
(17) |
Aug
(7) |
Sep
(13) |
Oct
(22) |
Nov
(13) |
Dec
(68) |
| 2019 |
Jan
(44) |
Feb
(17) |
Mar
(40) |
Apr
(39) |
May
(18) |
Jun
(14) |
Jul
(20) |
Aug
(31) |
Sep
(11) |
Oct
(35) |
Nov
(3) |
Dec
(10) |
| 2020 |
Jan
(32) |
Feb
(16) |
Mar
(10) |
Apr
(22) |
May
(2) |
Jun
(34) |
Jul
(1) |
Aug
(8) |
Sep
(36) |
Oct
(16) |
Nov
(13) |
Dec
(10) |
| 2021 |
Jan
(16) |
Feb
(23) |
Mar
(45) |
Apr
(28) |
May
(6) |
Jun
(17) |
Jul
(8) |
Aug
(1) |
Sep
(2) |
Oct
(35) |
Nov
|
Dec
(5) |
| 2022 |
Jan
|
Feb
(17) |
Mar
(23) |
Apr
(23) |
May
(9) |
Jun
(8) |
Jul
|
Aug
|
Sep
(7) |
Oct
(5) |
Nov
(16) |
Dec
(4) |
| 2023 |
Jan
|
Feb
|
Mar
(3) |
Apr
|
May
(1) |
Jun
(4) |
Jul
(1) |
Aug
|
Sep
(2) |
Oct
(1) |
Nov
|
Dec
|
| 2024 |
Jan
(7) |
Feb
(13) |
Mar
(18) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(2) |
Oct
(1) |
Nov
(5) |
Dec
(3) |
| 2025 |
Jan
|
Feb
|
Mar
|
Apr
(12) |
May
(12) |
Jun
(2) |
Jul
(3) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
|
From: Alex <gra...@we...> - 2005-08-03 09:01:57
|
Hello, we´re using Plesk 7.5 for Unix on Fedora Core2 Server, and my question is: Which rules is prefered to us: Application protection rules UserAgent rules Comment spam rules RootKit/Owned boxes blacklist Proxy scan rules Additional Apache 2.x rules Must we all take to the httpd.conf? Thanks for help |
|
From: Wally <car...@gm...> - 2005-08-03 08:53:45
|
Hey guys, i need to know how to block this one call in mod_security. Here is the error_log with the errors that i want to stop happening. The problem is that these errors take up the bandwidth, so i need to know how to stop apache handling them. /usr/local/apache/logs]# tail -f access_log 211.229.230.115 - - [02/Aug/2005:01:21:21 -0400] "6bNLilgBIbuJkWI3pww0QhnhnM" 501 - 65.10.248.190 - - [02/Aug/2005:01:21:24 -0400] "Kgd365YCZadmlioSqs8" 501 - 211.195.177.209 - - [02/Aug/2005:01:21:25 -0400] "CSwG8ImRNvWzpEsjntEnASp" = 501 - 219.104.191.68 - - [02/Aug/2005:01:21:25 -0400] "9kX7QLZbtIhLKCaq2qm9bpEKgoHNkYOkLJ0CW9igCN8ttTqYGRMH3zNCOfxOIJnlYlnMG31fA1= gKpHmJG1oYzS7oDYYIuzgv" 501 - 206.149.212.240 - - [02/Aug/2005:01:21:27 -0400] "UXrSXYDCKyq6RJmJQzhw" 501= - 200.106.17.162 - - [02/Aug/2005:01:21:28 -0400] "LuoWg58vto0JSfk0l6veD1luOAKBK1DaO54rfEP9TKTk3l58paSL10JjCFqCcMUyPCuWD4" 501 - 219.66.107.70 - - [02/Aug/2005:01:21:28 -0400] "s8fEcwNOx0SqYlOGIwqnnp5oxx3TG8qR1mlyN2H4bWgJAvz19RKtuZdQYqsAJdsaay6NydjrKW= 30RcyUA44womsD" 501 - 61.235.157.180 - - [02/Aug/2005:01:21:29 -0400] "vTiFxczhCX2tQ1XNehWfxyruQLDtH6uaCJuFmxlJggLoEUuC6fhHIB4rpj27" 501 - 221.185.120.244 - - [02/Aug/2005:01:21:29 -0400] "ptmrUX5v" 501 - 70.177.54.195 - - [02/Aug/2005:01:21:29 -0400] "mLRoUP6DdIj52v5voMxmsksz" 5= 01 - 210.213.147.250 - - [02/Aug/2005:01:21:31 -0400] "xfxeKjsQjg5A6SWDkG" 501 - 60.214.223.1 - - [02/Aug/2005:01:21:34 -0400] "-" 408 - 24.45.203.10 - - [02/Aug/2005:01:21:34 -0400] "1sLtDPrGScL0uIoz" 501 - 67.168.31.96 - - [02/Aug/2005:01:21:35 -0400] "-" 408 - 68.219.29.135 - - [02/Aug/2005:01:21:35 -0400] "S9vtUMgKOoMHgi5QARCLQlMWCNGP2Pv6TugQXLSNH01e5e7bTl0OszkQJ1zlVeDQsWUjjt3yKR= A8ZbLxJZ" 501 - Thanks, Matt |
|
From: Ivan R. <iv...@we...> - 2005-08-02 15:15:41
|
Alex wrote: > Hello, > > we installed ht efine mod_security on our Plesk 7.5.3 Unix Server, based on > Fedora Core2. > We installed the Rule regression-v2. > > Now some customer/users said to us, that the visitor gots an Internal Error > 500, so mod_security gots a pattern match. > But when we looked on the site, all seems to be fine! > > So i don´t know the problem what is wrong! > > Has someone for us a standard working ruleset, that works with our plesk > server? "Rule regression-v2" is *not* a working ruleset. You need to remove it from your configuration. For sets of rules have a look at http://www.gotroot.com -- Ivan Ristic Apache Security (O'Reilly) - http://www.apachesecurity.net Open source web application firewall - http://www.modsecurity.org |
|
From: Alex <gra...@we...> - 2005-08-02 15:02:22
|
Hello, we installed ht efine mod_security on our Plesk 7.5.3 Unix Server, based on Fedora Core2. We installed the Rule regression-v2. Now some customer/users said to us, that the visitor gots an Internal Error 500, so mod_security gots a pattern match. But when we looked on the site, all seems to be fine! So i don´t know the problem what is wrong! Has someone for us a standard working ruleset, that works with our plesk server? Many thanks for help Alex |
|
From: Terry D. <tdo...@na...> - 2005-08-02 10:10:43
|
Terry Dooher wrote: [snip] > Depending on the rule you're matching, it might simply be possible to > skip mod_security and just add a Redirect directive to your VirtualHost, > issuing a 301 for the specific file: > > Redirect 301 /files/hiddenfile.txt http://main.example.com > > This doesn't do any pattern matching however. the mod_security way would > be to issue a "redirect:http://main.example.com" for the specific rule. > (I think this is a 301, but I haven't used this) My mistake. You _can_ do pattern matching with redirect. RedirectMatch does regexp pattern matching. 'tis all in here: http://httpd.apache.org/docs/2.0/mod/mod_alias.html Terry. |
|
From: Terry D. <tdo...@na...> - 2005-08-02 10:01:57
|
Lonnie wrote: > Greeting All, > > I am working to get mod_security installed and running well for our > systems and am wondering if you can please tell me how i can customize > it for each virtual server that we have? This is simply a matter of adding your ruleset to the configuration inside your chosen VirtualHost directive. The rules should then only be enabled for that host and not the others. > What I mean is that I think that there is supposed to be some way to > redirect the user if any of the SecFilters are triggered to a particular > web address, right? Depending on the rule you're matching, it might simply be possible to skip mod_security and just add a Redirect directive to your VirtualHost, issuing a 301 for the specific file: Redirect 301 /files/hiddenfile.txt http://main.example.com This doesn't do any pattern matching however. the mod_security way would be to issue a "redirect:http://main.example.com" for the specific rule. (I think this is a 301, but I haven't used this) > I want to set this up so that if a SecFilter is triggered by a > particular virtual server in my httpd.conf for ssl.conf then I will > redirect them to that main server instead of an error message page. You could issue a "deny,log,status:403" as is recommended and specify a custom ErrorDocument directive for that VirtualHost, such as: ErrorDocument 403 http://main.example.com Though this would redirect all 403s, not just this specific example. Is there a specific reason you want to hide the error in this way? Do you only want to hide it for this one specific rule match? Terry. |
|
From: Lonnie <lo...@ou...> - 2005-08-02 01:45:14
|
Greeting All, I am working to get mod_security installed and running well for our systems and am wondering if you can please tell me how i can customize it for each virtual server that we have? What I mean is that I think that there is supposed to be some way to redirect the user if any of the SecFilters are triggered to a particular web address, right? I want to set this up so that if a SecFilter is triggered by a particular virtual server in my httpd.conf for ssl.conf then I will redirect them to that main server instead of an error message page. How can this be done? Thanks, Lonnie |
|
From: Ivan R. <iv...@we...> - 2005-08-01 10:43:49
|
Lonnie wrote: > Never mind...... > > I solved the problem and all is working well at this point..... > > If you see any additional SecFilter statements that should be added then > please let me know, ok. We can't tell you which rules to add, as that depends entirely on your application and your defence strategy. We can, however, tell you to remove all of the SecFilter statements from the configuration sent in your previous email (they are just examples). Then you can put back some you think you need. -- Ivan Ristic Apache Security (O'Reilly) - http://www.apachesecurity.net Open source web application firewall - http://www.modsecurity.org |
|
From: Lonnie <lo...@ou...> - 2005-08-01 01:32:41
|
Never mind...... I solved the problem and all is working well at this point..... If you see any additional SecFilter statements that should be added then please let me know, ok. Thanks, Lonnie Lonnie wrote: > Sir, > > I have subscribed to your mod_security list but after replying to the > confirmation, I get no notice that i can go ahead and post or welcome > message. > > My problem is that even after installing the mod_security on my Linux > Fedora3 Apache2 system and adding your quick example to the httpd.conf > and restarting my server, I can still do a traversal attack on my system. > > http://www.paysafenet.com/?x=../../../../../../../etc/passwd > > with > <IfModule mod_security.c> > > # Turn the filtering engine On or Off > SecFilterEngine On > > # Make sure that URL encoding is valid > SecFilterCheckURLEncoding On > > # Only allow bytes from this range > SecFilterForceByteRange 32 126 > > # The audit engine works independently and > # can be turned On of Off on the per-server or > # on the per-directory basis > SecAuditEngine RelevantOnly > > # The name of the audit log file > SecAuditLog logs/audit_log > > SecFilterDebugLog logs/modsec_debug_log > SecFilterDebugLevel 0 > > # Should mod_security inspect POST payloads > SecFilterScanPOST On > > # Action to take by default > SecFilterDefaultAction "deny,log,status:406" > > # Redirect user on filter match > SecFilter xxx redirect:http://www.webkreator.com > > # Execute the external script on filter match > SecFilter yyy log,exec:/home/ivanr/apache/bin/report-attack.pl > > # Simple filter > SecFilter 111 > # Only check the QUERY_STRING variable > SecFilterSelective QUERY_STRING 222 > > # Only check the body of the POST request > SecFilterSelective POST_PAYLOAD 333 > > # Only check arguments (will work for GET and POST) > SecFilterSelective ARGS 444 > > # Test filter > SecFilter "/cgi-bin/keyword" > > # Another test filter, will be denied with 404 but not logged > # action supplied as a parameter overrides the default action > SecFilter 999 "deny,nolog,status:404" > > # Prevent OS specific keywords > SecFilter /etc/password > > # Prevent path traversal (..) attacks > SecFilter "\.\./" > > # Weaker XSS protection but allows common HTML tags > SecFilter "<( |\n)*script" > > # Prevent XSS atacks (HTML/Javascript injection) > SecFilter "<(.|\n)+>" > > # Very crude filters to prevent SQL injection attacks > SecFilter "delete[[:space:]]+from" > SecFilter "insert[[:space:]]+into" > SecFilter "select.+from" > > # Require HTTP_USER_AGENT and HTTP_HOST headers > SecFilterSelective "HTTP_USER_AGENT|HTTP_HOST" "^$" > > # Forbid file upload > SecFilterSelective "HTTP_CONTENT_TYPE" multipart/form-data > > # Only watch argument p1 > SecFilterSelective "ARG_p1" 555 > > # Watch all arguments except p1 > SecFilterSelective "ARGS|!ARG_p2" 666 > > # Only allow our own test utility to send requests (or Mozilla) > SecFilterSelective HTTP_USER_AGENT "!(mod_security|mozilla)" > > # Do not allow variables with this name > SecFilterSelective ARGS_NAMES 777 > > # Do now allow this variable value (names are ok) > SecFilterSelective ARGS_VALUES 888 > > </IfModule> > > can you please help me to figure out why this is not working? > > Thanks, > Lonnie Cumberland > > > ------------------------------------------------------- > SF.Net email is sponsored by: Discover Easy Linux Migration Strategies > from IBM. Find simple to follow Roadmaps, straightforward articles, > informative Webcasts and more! Get everything you need to get up to > speed, fast. http://ads.osdn.com/?ad_id=7477&alloc_id=16492&op=click > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users |
|
From: Lonnie <lo...@ou...> - 2005-08-01 01:20:47
|
Sir, I have subscribed to your mod_security list but after replying to the confirmation, I get no notice that i can go ahead and post or welcome message. My problem is that even after installing the mod_security on my Linux Fedora3 Apache2 system and adding your quick example to the httpd.conf and restarting my server, I can still do a traversal attack on my system. http://www.paysafenet.com/?x=../../../../../../../etc/passwd with <IfModule mod_security.c> # Turn the filtering engine On or Off SecFilterEngine On # Make sure that URL encoding is valid SecFilterCheckURLEncoding On # Only allow bytes from this range SecFilterForceByteRange 32 126 # The audit engine works independently and # can be turned On of Off on the per-server or # on the per-directory basis SecAuditEngine RelevantOnly # The name of the audit log file SecAuditLog logs/audit_log SecFilterDebugLog logs/modsec_debug_log SecFilterDebugLevel 0 # Should mod_security inspect POST payloads SecFilterScanPOST On # Action to take by default SecFilterDefaultAction "deny,log,status:406" # Redirect user on filter match SecFilter xxx redirect:http://www.webkreator.com # Execute the external script on filter match SecFilter yyy log,exec:/home/ivanr/apache/bin/report-attack.pl # Simple filter SecFilter 111 # Only check the QUERY_STRING variable SecFilterSelective QUERY_STRING 222 # Only check the body of the POST request SecFilterSelective POST_PAYLOAD 333 # Only check arguments (will work for GET and POST) SecFilterSelective ARGS 444 # Test filter SecFilter "/cgi-bin/keyword" # Another test filter, will be denied with 404 but not logged # action supplied as a parameter overrides the default action SecFilter 999 "deny,nolog,status:404" # Prevent OS specific keywords SecFilter /etc/password # Prevent path traversal (..) attacks SecFilter "\.\./" # Weaker XSS protection but allows common HTML tags SecFilter "<( |\n)*script" # Prevent XSS atacks (HTML/Javascript injection) SecFilter "<(.|\n)+>" # Very crude filters to prevent SQL injection attacks SecFilter "delete[[:space:]]+from" SecFilter "insert[[:space:]]+into" SecFilter "select.+from" # Require HTTP_USER_AGENT and HTTP_HOST headers SecFilterSelective "HTTP_USER_AGENT|HTTP_HOST" "^$" # Forbid file upload SecFilterSelective "HTTP_CONTENT_TYPE" multipart/form-data # Only watch argument p1 SecFilterSelective "ARG_p1" 555 # Watch all arguments except p1 SecFilterSelective "ARGS|!ARG_p2" 666 # Only allow our own test utility to send requests (or Mozilla) SecFilterSelective HTTP_USER_AGENT "!(mod_security|mozilla)" # Do not allow variables with this name SecFilterSelective ARGS_NAMES 777 # Do now allow this variable value (names are ok) SecFilterSelective ARGS_VALUES 888 </IfModule> can you please help me to figure out why this is not working? Thanks, Lonnie Cumberland |
|
From: ffolkes <ff...@ff...> - 2005-07-29 04:02:37
|
I happened to notice that the error was in suexec_log - it said the current user apache was running as didn't have permission to access the script, despite the confusing EOF error. What baffles me is, this is running on a box administered by Plesk, so why are two domains unable to gain permission to run it, while all the others can? Obviously something must be set wrong in my apache configuration, but that's beyond the scope of this mailing list. Thanks. TM Ivan Ristic wrote: > ffolkes wrote: > >> Hello- >> >> I've setup a PHP script to ban offending IPs, but some filters fail >> with this: >> >> Executing command "path/to/my/script" >> File execution failed: End of file found (70014) >> >> Anyone have any ideas why? > > > Does that script create any output to stdout? If not, make > it print something (e.g. one line of text) and let me know if the > problem goes away. > |
|
From: ffolkes <ff...@ff...> - 2005-07-29 04:02:00
|
What I had initially done was make a PHP script to add offending IPs to APF, or optionally just notify me. Thus the use of flags, to tell it if I wanted it to run in notifyonly mode or not. I've since gotten around this problem by just copying the script and hardcoding the options. TM Ivan Ristic wrote: > ffolkes wrote: > >> Hello- >> >> Is there a way to put arguments in the exec action? For example: >> >> "exec:/path/to -a=123" >> >> I tried but it appeared to never run the command at all. > > > Correct. At the moment the whole thing is treated as the > path to the script. It would help if you could explain why > you need this feature. > |
|
From: Ivan R. <iv...@we...> - 2005-07-28 16:35:00
|
ffolkes wrote: > Hello- > > Is there a way to put arguments in the exec action? For example: > > "exec:/path/to -a=123" > > I tried but it appeared to never run the command at all. Correct. At the moment the whole thing is treated as the path to the script. It would help if you could explain why you need this feature. -- Ivan Ristic Apache Security (O'Reilly) - http://www.apachesecurity.net Open source web application firewall - http://www.modsecurity.org |
|
From: Ivan R. <iv...@we...> - 2005-07-28 16:24:54
|
M.Saeed Shaikh wrote:
> Hi,
>
> Someone is spamming from our mail server. Is there any way to create
> sendmail commands log file. So at least I can see who is using
> sendmail command. I think its usie php/FormMail script for send mail.
> However i alreay implement FormMail rule.
>
> I just want to create log file whenever sendmail command use.
As Tom already mentioned, it's likely you already have a log of
all sendmail invocations. Some other ideas:
* Replace the sendmail binary with a "fake" one that logs the
parameters, and then calls the real thing.
* Enable process accounting on the server (differs from OS to OS,
use Google to find out more).
* Use grsecurity (http://www.grsecurity.org) to log process creation.
--
Ivan Ristic
Apache Security (O'Reilly) - http://www.apachesecurity.net
Open source web application firewall - http://www.modsecurity.org
|
|
From: Ivan R. <iv...@we...> - 2005-07-28 16:18:54
|
Ivan Ristic wrote: > Pierre Henriot wrote: > >> Hi >> >> I use photoshare, there is a form with 8 possible file uploads. >> >> I always get a rejection from mod_security with the comment "invalid >> multipart/form-data format" >> >> I don't see why the form data is invalid. Any ideas? > > You should find more information in your error log, right above the > "invalid multipart/form-data format" message. My guess is that > mod_security is unable to create a temporary file on disk. > > I'll see to make the error message better. FYI, it was a permission problem. -- Ivan Ristic Apache Security (O'Reilly) - http://www.apachesecurity.net Open source web application firewall - http://www.modsecurity.org |
|
From: Ivan R. <iv...@we...> - 2005-07-28 16:18:07
|
ffolkes wrote: > Hello- > > I've setup a PHP script to ban offending IPs, but some filters fail with > this: > > Executing command "path/to/my/script" > File execution failed: End of file found (70014) > > Anyone have any ideas why? Does that script create any output to stdout? If not, make it print something (e.g. one line of text) and let me know if the problem goes away. -- Ivan Ristic Apache Security (O'Reilly) - http://www.apachesecurity.net Open source web application firewall - http://www.modsecurity.org |
|
From: Tom A. <tan...@oa...> - 2005-07-28 15:08:34
|
Firstly, disconnect your server from the internet so as to stop spamming people. Try "ps" or "top" to see if there are any unidentified processes running, especially ones using lots of cpu or memory. You may have been compromised in some other way than FormMail, and a zombie mailserver installed somewhere like /tmp or /usr/tmp. Eliminate that possibility before assuming mail is being sent via sendmail through your form. Run one or more rootkit detection programs such as "rkhunter" or "chkrootkit". If it is being sent with sendmail, then your syslog daemon should be keeping logs in a standard location such as /var/log/mail. Look in your apache logs to see if any weird parameters were passed into any of your scripts at the time the spamming started, or each time it occurs. If so, create a mod_security rule to prevent it from happening again. Hope that helps. Tom ----- Original Message ----- From: "M.Saeed Shaikh" <sha...@gm...> To: <mod...@li...> Sent: Thursday, July 28, 2005 4:53 AM Subject: [mod-security-users] create sendmail command log file > Hi, > > Someone is spamming from our mail server. Is there any way to create > sendmail commands log file. So at least I can see who is using > sendmail command. I think its usie php/FormMail script for send mail. > However i alreay implement FormMail rule. > > I just want to create log file whenever sendmail command use. > > Thanx. > > -- > M.A.Shaikh > Linux System Administrator > > > ------------------------------------------------------- > SF.Net email is Sponsored by the Better Software Conference & EXPO > September > 19-22, 2005 * San Francisco, CA * Development Lifecycle Practices > Agile & Plan-Driven Development * Managing Projects & Teams * Testing & QA > Security * Process Improvement & Measurement * http://www.sqe.com/bsce5sf > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > |
|
From: M.Saeed S. <sha...@gm...> - 2005-07-28 08:53:21
|
Hi, Someone is spamming from our mail server. Is there any way to create sendmail commands log file. So at least I can see who is using sendmail command. I think its usie php/FormMail script for send mail. However i alreay implement FormMail rule. I just want to create log file whenever sendmail command use. Thanx. --=20 M.A.Shaikh Linux System Administrator |
|
From: M.Saeed S. <sha...@gm...> - 2005-07-28 08:53:19
|
Hi, Someone is spamming from our mail server. Is there any way to create sendmail commands log file. So at least I can see who is using sendmail command. I think its usie php/FormMail script for send mail. However i alreay implement FormMail rule. I just want to create log file whenever sendmail command use. Thanx. --=20 M.A.Shaikh Linux System Administrator |
|
From: ffolkes <ff...@ff...> - 2005-07-28 05:51:10
|
Hello- I've setup a PHP script to ban offending IPs, but some filters fail with this: Executing command "path/to/my/script" File execution failed: End of file found (70014) Anyone have any ideas why? Thanks. TM |
|
From: Ivan R. <iv...@we...> - 2005-07-26 18:47:39
|
Pierre Henriot wrote: > Hi > > I use photoshare, there is a form with 8 possible file uploads. > > I always get a rejection from mod_security with the comment "invalid > multipart/form-data format" > > I don't see why the form data is invalid. Any ideas? You should find more information in your error log, right above the "invalid multipart/form-data format" message. My guess is that mod_security is unable to create a temporary file on disk. I'll see to make the error message better. -- Ivan Ristic Apache Security (O'Reilly) - http://www.apachesecurity.net Open source web application firewall - http://www.modsecurity.org |
|
From: Pierre H. <pie...@sw...> - 2005-07-26 06:13:06
|
Hi=20 I use photoshare, there is a form with 8 possible file uploads. I always get a rejection from mod_security with the comment "invalid = multipart/form-data format" I don't see why the form data is invalid. Any ideas? |
|
From: ffolkes <ff...@ff...> - 2005-07-19 23:21:56
|
Hello- Is there a way to put arguments in the exec action? For example: "exec:/path/to -a=123" I tried but it appeared to never run the command at all. Thanks. ffolkes |
|
From: Ivan R. <iv...@we...> - 2005-07-15 11:51:26
|
Daniel Fdez. Bleda wrote: > Hello, > > I'm having some problems parsing the HTML with libxml2. > I thought I could use the request_rec->content_encoding but I see that > where some web pages specify UTF-8 as encoding this info in not in > this structure My guess that field is populated only when the content encoding information is in the HTTP headers. > when I'm in sec_filter_out() so I don't know how now > the encription type to use (or use some as "ISO-8859-1" by default). The correct procedure may be to start parsing using the default encoding. If a change of the encoding is encountered, go back and start all over. -- Ivan Ristic Apache Security (O'Reilly) - http://www.apachesecurity.net Open source web application firewall - http://www.modsecurity.org |
|
From: Daniel F. B. <dfe...@is...> - 2005-07-14 16:54:47
|
Hello, I'm having some problems parsing the HTML with libxml2. I thought I could use the request_rec->content_encoding but I see that where some web pages specify UTF-8 as encoding this info in not in this structure when I'm in sec_filter_out() so I don't know how now the encription type to use (or use some as "ISO-8859-1" by default). Thanks, --=20 _________________________________ Daniel Fern=E1ndez Bleda Gerente de cuentas e-Security Engineer OPSA/OPST Trainer, CISSP dfernandez<arroba>isecauditors.com Internet Security Auditors, S.L. c. Santander, 101. Edif. A. 2=BA 1=AA. 08030 Barcelona Tel: 93 305 13 18 Fax: 93 278 22 48 www.isecauditors.com |