LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Security (https://www.linuxquestions.org/questions/linux-security-4/)
-   -   noob with httpd-access.log (Attempting to Crack me?) (https://www.linuxquestions.org/questions/linux-security-4/noob-with-httpd-access-log-attempting-to-crack-me-349595/)

kwlskwlguy 08-03-2005 10:27 AM

noob with httpd-access.log (Attempting to Crack me?)
 
Concerned w/ security, I read my logs with a compulsive fervor. Usually in the httpd-access.log I see things like:

Code:

[20/Jul/2005:18:14:50 -0400] "GET / HTTP/1.0" 200 1456 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
5.1; SV1)"
[20/Jul/2005:18:27:00 -0400] "GET / HTTP/1.0" 200 341 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5
.1; SV1)"
[20/Jul/2005:18:27:01 -0400] "GET /upiheader.html HTTP/1.0" 200 160 "" "Mozilla/4.0
(compatible; MSIE 6.0; Windows NT 5.1; SV1)"
[20/Jul/2005:18:27:01 -0400] "GET /linkside.html HTTP/1.0" 200 652  "Mozilla/4.0
compatible; MSIE 6.0; Windows NT 5.1; SV1)"
[20/Jul/2005:18:27:01 -0400] "GET /home.html HTTP/1.0" 200 820

Today I noticed oddities like:

Code:

[30/Jul/2005:10:09:24 -0400] "GET //bin/awstats/awstats.pl HTTP/1.1" 404 307 "-" "Mozilla/4.0 (compatible;
 MSIE 6.0; Windows 98)"
[30/Jul/2005:10:09:39 -0400] "GET //scripts/ awstats.pl HTTP/1.1" 400 377 "-" [30/Jul/2005:10:09:39 -0400] "GET //scripts/awstats.pl HTTP/1.1" 404 303 "-" "Mozilla/4.0 (compatible; MSI
E 6.0; Windows 98)"

And,

Code:

[26/Jul/2005:21:43:44 -0400] "SEARCH /\x90\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\
x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\x
b1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\

In my doc-root I have no such folders as 'bin','scripts','cgi-bin'. Is this an attempt to crack into my system? I run a (very) slightly configured-from-default install of Apache 1.3x, and I've tentatively looked into running httpd in a chroot sandbox (jail?, unsure which applies if not both), but have yet to fully investigate its machinations.

If required, I'd be happy to furnish more info.


Thank You Kindly.

Capt_Caveman 08-03-2005 02:49 PM

The first one is looking for webservers running vulnerable versions of awstats which had a significant vulnerability several months ago. If you don't have awstats installed, then you don't have anything to worry about (the 4XX http status codes would suggest that you don't have it installed).

The second one I believe is an older WebDAV exploit for Windows IIS webservers and doesn't affect linux.

So I don't think you have anything to worry about. It's a good thing that you're vigillant about keeping up with your logs though.

kwlskwlguy 08-03-2005 05:46 PM

Thank you Oh Captain, My Captain, for the reply. Being new to serving a web-page I'd like to know, in your opinion, if I should block the offending IP address via firewall, or if this would only be the first in a multitude of attempts, and therefore a waste of time?

KimVette 08-03-2005 06:33 PM

It's a waste of time. Some script kiddie is playing. There will be others. The idiot is likely on a dynamic IP so block the nitwit today, he'll be back again two days from now scanning you again when his IP address changes.

Capt_Caveman 08-03-2005 10:08 PM

I'd have agree. If you start adding iptables rules for everyone who scans you, you'll have an extremely long blacklist which can actually degrade network performance (i.e. if every packet has to traverse several thousand iptables rules, it can eventually become noticeable). I usually reserve bannination for persistant abusers or probes that don't look particularly automated.

basileus 08-07-2005 05:13 PM

If you have not already done these, then you should do them now...

Firsts, run the webserver in a "chroot jail", meaning that it can only access filesystem below the jail directory. Apache has at least two modules with which you can put it to run inside a jail: mod_security and mod_chroot. I might remember the names wrong...

Second, remove ALL unneeded modules from the webserver. Those that can't be uninstalled should be disabled, if at all possible.

Third, check manual regarding securing your webserver. There are lots of useful manuals and howtos for Apache.

kwlskwlguy 08-10-2005 06:47 AM

Merci Beaucoup, My Friends for the input. I'll track for persistant consistant IPs and try to block only those. For the Jail will I have to recompile, and also change the BASEDIR in order to do so? or can i Jail this server on-the-fly? Again, Much Thanks.


All times are GMT -5. The time now is 12:47 AM.